Font Size: a A A

Large-scale Internet Cafes Audit System

Posted on:2011-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:L J LiFull Text:PDF
GTID:2208360308466607Subject:Communication and Information Engineering
Abstract/Summary:PDF Full Text Request
As the most mainstream of public Internet sites, NetBar have been the focus of information monitoring; At present, the network supervision departments have been through the installation of real names, audit software, NetBar were monitored way, but in practical work, there are still some shortcomings, the need to improve in order to strengthen management, and give users access to the Internet to create a good environment for hardware and software. As some of the illegal NetBar, public security departments do not have the record for these "black" NetBar to monitor the efforts have been inadequate. In view of this situation, in 2008, Ministry of Public Security issued a "billing software integrated in the audit function" call.The research project to develop a suspicious suspects in NetBar to capture the real-name information and a virtual identity for the analysis of public security personnel detection, and provides real-time automatic SMS alarm. The system at the provincial level as a unit, through the Chengdu XX's "XX Network" NetBar NetBar billing products pushed to install the remote deployment, reporting real name, and virtual identity information to various network monitoring Corps Provincial Public Security Bureau.In this system, the dissertation design and realization of the main functions of the following 6 points: 1, to support large-scale concurrent network connections for data transmission; 2, IM chats tool to decrypt the data; 3, capture real name, and virtual identity activities, information, and in each Provincial Public Security Bureau to establish the identity of the real-name and virtual correspondence; 4, and efficient access to massive data processing (preliminary research every day about 30 million new data, the need to retain 60 days of historical data) ; 5, SMTP mail messages capture analysis; 6, build a distributed database to store large amounts of information for data analysis.System uses a more security-related technologies for data collection and capture, is the cornerstone of system implementation; use of efficient access to massive data processing analysis techniques, similar products with relatively large technological leadership.
Keywords/Search Tags:NetBar, Audit, Mass data, Decryption, Virtual Identity
PDF Full Text Request
Related items