Please wait a minute...
New Technology of Library and Information Service  2012, Vol. Issue (10): 77-82    DOI: 10.11925/infotech.1003-3513.2012.10.13
Current Issue | Archive | Adv Search |
Research and Implementation of Drive-level Local User Behavior Monitoring System
Guo Xiaoqing, Ren Shougang, Xie Zhonghong
College of Information Science and Technology, Nanjing Agricultural University, Nanjing 210095, China
Download: PDF(1432 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  In order to obtain the behavior of local users which include operation on digital libraries and personalized push service, and application software on the system, a driver stage-based application access control strategy is proposed, which can implement real-time monitoring and recording of the I/O operation. This paper implementes the drive-level local user behavior monitoring system based on VC++, using technologies of file driver stage, Web crawler and database. Operation log obtained through the system also can be used as the electronic survey data designed for personalized push service of the library.
Key wordsUser behavior monitoring      File filter driver      Kernel mode     
Received: 05 October 2012      Published: 24 January 2013
:  TP393  

Cite this article:

Guo Xiaoqing, Ren Shougang, Xie Zhonghong. Research and Implementation of Drive-level Local User Behavior Monitoring System. New Technology of Library and Information Service, 2012, (10): 77-82.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2012.10.13     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2012/V/I10/77

[1] 胡宏银,姚峰,何成万. 一种基于文件过滤驱动的Windows文件安全保护方案[J]. 计算机应用, 2009,29(1):168-171.(Hu Hongyin,Yao Feng,He Chengwan.Solution of Windows Files Security Protection Based on File System Filter Driver[J]. Journal of Computer Applications, 2009,29(1):168-171.)
[2] 李高虎,高嵩,唐小新,等. 个性化新书通报推荐系统的设计与实现[J]. 现代图书情报技术,2012(6):89-93.(Li Gaohu,Gao Song,Tang Xiaoxin,et al. Design and Implementation of New Books Noting Personalized Recommendation System Based on Circulation Logs[J]. New Technology of Library and Information Service, 2012(6):89-93.)
[3] 余慧佳,刘奕群,张敏,等. 基于大规模日志分析的搜索引擎用户行为分析[J]. 中文信息学报, 2007,21(1):109-114.(Yu Huijia,Liu Yiqun,Zhang Min, et al. Research in Search Engine User Behavior Based on Log Analysis[J]. Journal of Chinese Information Processing, 2007,21(1):109-114.)
[4] 王霞. 基于WEB浏览的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Wang Xia. The Study and Design of User Behavior Analysis System Based on Web Browsing[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[5] 刘鹏. 网络用户行为分析的若干问题研究[D]. 北京:北京邮电大学,2010.(Liu Peng. Behavior of Network Users Research Based on Time-varying & Services[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[6] 董富强. 网络用户行为分析研究及其应用[D].西安:西安电子科技大学,2005.(Dong Fuqiang. Study on Network Users’Behaviors Analysis and Its Application[D]. Xi’an:Xidian University,2005.)
[7] 周岳. 基于兴趣分类的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Zhou Yue. Research and Design of the Analysis of User Behavior System Based on Interest Classification[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[8] Microsoft. Microsoft Security Essentials Product Information[EB/OL].[2012-10-11]. http://windows.microsoft.com/en-US/windows/security-essentials-product-information#tabs1=features.
[9] 360浏览器抓取用户隐私流程[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.(Processes of the 360 Browser Crawl User Privacy[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.)
[10] 腾讯360之争[EB/OL].[2012-10-07]. http://baike.baidu.com/view/4633773.htm.(The Dispute Between Tencent and 360 [EB/OL]. [2012-10-07].http://baike.baidu.com/view/4633773.htm.)
[11] 谭文,杨潇. Windows内核安全编程[M]. 北京:电子工业出版社,2009: 476-478.(Tan Wen, Yang Xiao. Windows Kernel Security Programming[M].Beijing:Publishing House of Electronics Industry, 2009: 476-478.)
[12] 翟进,李清宝,白燕,等. 文件过滤驱动在网络安全终端中的应用 [J]. 计算机应用,2007,27(3):624-626.(Zhai Jin,Li Qingbao,Bai Yan,et al. Application of File System Filter Driver in NetWork Security Terminal[J]. Computer Applications, 2007,27(3):624-626.)
[13] 郑磊,马兆丰,顾明. 基于文件系统过滤驱动的安全增强型加密系统技术研究[J]. 小型微型计算机系统, 2007, 28(7):1181-1184.(Zheng Lei,Ma Zhaofeng,Gu Ming.Techniques of File System Filter Driver-based and Security-enhanced Encryption System[J]. Journal of Chinese Computer Systems, 2007, 28(7):1181-1184.)
[14] 魏丕会,卿斯汉,刘海峰. 基于安全操作系统的透明加密文件系统的设计[J]. 计算机科学,2003,30(7):132-135.(Wei Pihui,Qing Sihan,Liu Haifeng.Design and Implementation of a Transparent Cryptographic File System Based on Security Operating System[J].Computer Science, 2003,30(7):132-135.)
[1] Qingtian Zeng,Xiaohui Hu,Chao Li. Extracting Keywords with Topic Embedding and Network Structure Analysis[J]. 数据分析与知识发现, 2019, 3(7): 52-60.
[2] Lixin Xia,Jieyan Zeng,Chongwu Bi,Guanghui Ye. Identifying Hierarchy Evolution of User Interests with LDA Topic Model[J]. 数据分析与知识发现, 2019, 3(7): 1-13.
[3] Yang Ning, Huang Feihu, Wen Yi, Chen Yunwei. An Opinion Evolution Model Based on the Behavior of Micro-blog Users[J]. 现代图书情报技术, 2015, 31(12): 34-41.
[4] Yu Xincong, Li Honglian, Lv Xueqiang. Research on the Application of Hyponymy in the Enrollment Robot[J]. 现代图书情报技术, 2015, 31(12): 65-71.
[5] Wang Zhengjun, Yu Xiaoyi, Jin Yuling. Using Sniffer Technology to Constraint Electronic Resource Excessive Downloading[J]. 现代图书情报技术, 2015, 31(12): 95-100.
[6] Liu Zhanbing, Xiao Shibin. Collaborative Filtering Recommended Algorithm Based on User's Interest Fuzzy Clustering[J]. 现代图书情报技术, 2015, 31(11): 12-17.
[7] Wu Wankun, Wu Qinglie, Gu Jinjiang. Hot Topic Extraction from E-commerce Microblog Based on EM-LDA Integrated Model[J]. 现代图书情报技术, 2015, 31(11): 33-40.
[8] Qiang Shaohua, Wu Peng. The Research of Spatial Measure of Users' Mental Model of Website Category from the View of Regional Differences[J]. 现代图书情报技术, 2015, 31(11): 68-74.
[9] Qin Xuedong. Solution for KVM Private Cloud Management System Based on Drupal[J]. 现代图书情报技术, 2015, 31(11): 91-95.
[10] Wu Jiang, Zhang Jinfan. Research on Follow Influence of Triadic Structure in Social Network——Take Student Relation Network as an Example[J]. 现代图书情报技术, 2015, 31(10): 72-80.
[11] Jiang Chuntao. Automatic Annotation of Bibliographical References in Chinese Patent Documents[J]. 现代图书情报技术, 2015, 31(10): 81-87.
[12] Wang Ying, Zhang Zhixiong, Li Chuanxi, Liu Yi, Tang Yijie, Zhou Zijian, Qian Li, Fu Honghu. The Design and Implementation of Open Engine System for Scientific & Technological Knowledge Organization Systems[J]. 现代图书情报技术, 2015, 31(10): 95-101.
[13] Gui Sisi, Lu Wei, Huang Shihao, Zhou Pengcheng. User Interest Prediction Combing Topic Model and Multi-time Function[J]. 现代图书情报技术, 2015, 31(9): 9-16.
[14] Qin Xiaohui, Le Xiaoqiu. Topic Sources and Trends Tracking Towards Citation Network of Single Paper[J]. 现代图书情报技术, 2015, 31(9): 52-59.
[15] Deng Qiping, Wang Xiaomei. Identifying Influential Authors Based on LeaderRank[J]. 现代图书情报技术, 2015, 31(9): 60-67.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn