Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Implementation Scheme of Internet behavior Management based on Open Source Technology

2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Implementation Scheme of Internet behavior Management based on Open Source Technology

The Internet has become an indispensable tool in people's work and life process. There is a serious problem of computer and Internet abuse in enterprises. Online shopping, live streaming, movies, P2P tools downloading and other non-work-related behaviors occupy limited bandwidth and affect work. How to supervise as an enterprise? Buy business software? I think it may not be suitable for your company.

How about choosing open source tools? Next, I would like to introduce two open source tools and cases. It is used to realize the online content audit and behavior monitoring of users. The foundation of these technologies is based on sniffing technology, so when you browse the following, you must have a deep understanding of network sniffing technology.

1. Open source tool Xplico

The working principle of Xplico is to extract network traffic and capture the information contained in the application data. There are many simple introductions and installations about it on the Internet, but rarely mentioned about application examples. Combined with the author's practice, the following introduces some little-known application cases.

URL:www.51cto.com

2. Security Onion

As for network abnormal behavior monitoring, we have to talk about security onion Security Onion, which integrates many open source security tools such as OSSEC, NIDS, HIDS and various monitoring tools. Instead of talking about the theory, let's talk about something practical.

URL: http://chenguang.blog.51cto.com/350944/1783994

3. Open source security access tool

NAC, the acronym of network admission control, this technology can ensure the true identity of users before they visit the network. The open source tools to achieve this function are PacketFence and FreeNAC, which will explain the practical application below.

URL: http://chenguang.blog.51cto.com/350944/1737794

4.Panabit

On the basis of accurately identifying protocols, that is, classifying applications, Panabit provides flexible and convenient traffic management mechanisms according to user-defined policies: bandwidth speed limit, bandwidth guarantee, bandwidth reservation, and parameterized policy settings based on protocols / protocol groups and IP/IP groups.

In the selection of excellent lecturers in 51CTO College, I look forward to your valuable vote!

Http://edu.51cto.com/lecturer/user_id-350944.html

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report