In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Implementation Scheme of Internet behavior Management based on Open Source Technology
The Internet has become an indispensable tool in people's work and life process. There is a serious problem of computer and Internet abuse in enterprises. Online shopping, live streaming, movies, P2P tools downloading and other non-work-related behaviors occupy limited bandwidth and affect work. How to supervise as an enterprise? Buy business software? I think it may not be suitable for your company.
How about choosing open source tools? Next, I would like to introduce two open source tools and cases. It is used to realize the online content audit and behavior monitoring of users. The foundation of these technologies is based on sniffing technology, so when you browse the following, you must have a deep understanding of network sniffing technology.
1. Open source tool Xplico
The working principle of Xplico is to extract network traffic and capture the information contained in the application data. There are many simple introductions and installations about it on the Internet, but rarely mentioned about application examples. Combined with the author's practice, the following introduces some little-known application cases.
URL:www.51cto.com
2. Security Onion
As for network abnormal behavior monitoring, we have to talk about security onion Security Onion, which integrates many open source security tools such as OSSEC, NIDS, HIDS and various monitoring tools. Instead of talking about the theory, let's talk about something practical.
URL: http://chenguang.blog.51cto.com/350944/1783994
3. Open source security access tool
NAC, the acronym of network admission control, this technology can ensure the true identity of users before they visit the network. The open source tools to achieve this function are PacketFence and FreeNAC, which will explain the practical application below.
URL: http://chenguang.blog.51cto.com/350944/1737794
4.Panabit
On the basis of accurately identifying protocols, that is, classifying applications, Panabit provides flexible and convenient traffic management mechanisms according to user-defined policies: bandwidth speed limit, bandwidth guarantee, bandwidth reservation, and parameterized policy settings based on protocols / protocol groups and IP/IP groups.
In the selection of excellent lecturers in 51CTO College, I look forward to your valuable vote!
Http://edu.51cto.com/lecturer/user_id-350944.html
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.