netflow 中文意思是什麼

netflow 解釋
網路流
  1. The article is about billing of ip network, especially on the aspects of theory and structure. it has researched the reality of ip billing, include three tiers web structure, cmm of sei, oob technology, radius protocol, netflow and the technology of integration

    本文深入研究了網路計費技術的原理和體系結構,探索了網路計費系統的實現技術,包括基於web的信息系統三層體系結構、軟體開發標準? cmm 、面向對象技術、 radius認證記費技術、網路數據流量採集與整合技術等。
  2. This paper introduce and compare snmp agreement and cisco netflow technology on the network flux monitoring technology, and have realized the analysis and handling the data flow of wide area network using netflow technology

    在網路流量監控技術上,本文介紹和對比了snmp協議和cisconetflow技術,並利用netflow技術實現了廣域網數據流量的分析和處理。
  3. The traffic monitoring approaches such as snmp, netflow have limitations ; while special devices such as smartbit are expensive

    Snmp 、 netflow等流量監測方式存在很大局限性;而專用的流量監測設備如smartbit等則價格昂貴。
  4. There are many techniques based on netflow to analyse the traffic flow and provide accounting and billing information of the network service. it has been applied to monitor behavior of network user and traffic flow and usage of network services

    目前netflow技術用於對ip網路通信流量進行分析和計量,為網路的運行提供準確的統計數據,在園區網用戶行為監控、流量監控、網路服務使用狀況監控等方面有很成熟的應用。
  5. Netflow is a technology which is used to accelerate data switch in network equipment by cisco system. it has a powerful data collection and analysis capability and is becoming the uppermost criterion for ip / mpls traffic flow. which is applied widely in network management field

    Netflow技術是思科公司用在網路設備上進行數據加速交換的一項技術,它的數據採集和測量功能成為最主要的ip / mpls流量分析和計量標準,廣泛應用於網路管理領域。
  6. In the first part of the article, i enumerated several solutions to email filter, and analyzied their advantage " and disadvantage. then email ' s characteristic has been presented in the paper. at last, i main introduced the copied netflow and the filtered netflow

    文章第一部分主要是介紹了郵件過濾方面,幾種主要的解決方案,並且分析了每種解決方案的優點和缺點。然後從郵件的基本特點出發,介紹了郵件傳輸過程、延遲交付、文電格式等相關的技術。
  7. The test shows that the method has the positive results on determining the anomaly traffic and on the threats assessment process. this method can distinguish the abnormal traffic, which is harmful for the bandwith, from the netflow sample and gives a reference value of its threat level and never need analyzing the content of the packets

    實驗和分析表明本文提出的威脅評估方法對網路中的異常流量確定和威脅的定量分析是有效的,並不需要對netflow數據數據包內容的進行分析,就可以確定對網路可用性影響較大的異常網路流,並給出其威脅度的量化指標。
  8. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。
分享友人