Please wait a minute...
New Technology of Library and Information Service  2015, Vol. 31 Issue (12): 95-100    DOI: 10.11925/infotech.1003-3513.2015.12.14
Current Issue | Archive | Adv Search |
Using Sniffer Technology to Constraint Electronic Resource Excessive Downloading
Wang Zhengjun, Yu Xiaoyi, Jin Yuling
Dalian University of Technology Library, Dalian 116023, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] To solve the problem of excessive downloading of digital resources in university libraries, design digital resource monitoring and management system based on the network sniffer technology. [Context] There are some defects in the existing solutions for the excessive downloading problems. To compensate for these defects, the optimization solution scheme based on the network sniffer technology is proposed. [Methods] This paper introduces network sniffer technology to constraint electronic resource excessive downloading. Taking the digital resource monitoring and management system of Dalian University of Technology Library as an example, it describes the technical support principles, design thinking and modules achievement. [Results] Under the premise of not affecting the topology structure and users' habits of the original network, this system can identify and record the readers' access and download to electronic resources, and can finally effectively prevent the occurrence of the event of excessive downloading by warning and even blocking the shield of the suspect users of excessive downloading. [Conclusions] The digital resource monitoring system based on the sniffer technology can accurately monitor the digital resources and effectively prevent the occurrence of the event of excessive downloading.

Received: 20 April 2015      Published: 06 April 2016
:  TP393  
  G250  

Cite this article:

Wang Zhengjun, Yu Xiaoyi, Jin Yuling. Using Sniffer Technology to Constraint Electronic Resource Excessive Downloading. New Technology of Library and Information Service, 2015, 31(12): 95-100.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2015.12.14     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2015/V31/I12/95

[1] 赵俊颜. 国内外数字资源绩效评价研究综述[J]. 高校图书馆工作, 2012, 32(2): 62-66. (Zhao Junyan. Overview of the Research on the Performance Evaluation of Digital Resources at Home and Abroad [J]. Library Work in Colleges and Universities, 2012, 32(2): 62-66.)
[2] 曹建业, 董永吉, 冶晓隆, 等. 基于NetFlow的流量统计系统的设计与实现[J]. 计算机工程与设计, 2014, 35(2): 381-385. (Cao Jianye, Dong Yongji, Ye Xiaolong, et al. Design and Implementation of Network Traffic Statistics System Based on NetFlow [J]. Computer Engineering and Design, 2014, 35(2): 381-385.)
[3] 董凯. 基于Cacti的网络运行监测系统的设计与实现[D]. 济南: 山东大学, 2013. (Dong Kai. The Design and Implementation of Network Monitoring System Based on Cacti [D]. Ji'nan: Shandong University, 2013.)
[4] 马东, 袁志野. 基于MRTG软件的高校图书馆网络监控系统探究[J]. 现代情报, 2010, 30(12): 84-86. (Ma Dong, Yuan Zhiye. Study on Net Control System of University Library Based on MRTG [J]. Journal of Modern Information, 2010, 30(12): 84-86.)
[5] 朱强. 变化中的服务与管理——美国大学图书馆访问印象[J]. 图书情报研究, 2011, 4(4): 1-4. (Zhu Qiang. Services and Management in Change: Impression from a Visit to American University Libraries [J]. Library and Information Studies, 2011, 4(4): 1-4.)
[6] 袁方方. 基于Netfilter的内容过滤系统的设计与实现[D]. 北京: 北京邮电大学, 2012. (Yuan Fangfang. The Design and Implementation of the Netfilter-based Content Filtering System [D]. Beijing: Beijing University of Posts and Telecommunications, 2012.)
[7] 周旭晨. 网络流量监控系统的搭建, 应用与数据分析[D]. 武汉: 武汉科技大学, 2012. (Zhou Xuchen. The Structures, Application and Data Analysis of the Network Flow Monitoring System [D]. Wuhan: Wuhan University of Science and Technology, 2012.)
[8] 伍丽芳. 局域网安全行为监控系统的设计与实现[D]. 成都: 电子科技大学, 2012. (Wu Lifang. Design and Implementation of Security Behavior Monitoring System for LAN [D]. Chengdu: University of Electronic Science and Technology, 2012.)
[9] Duarte V, Farruca N. Using libPcap for Monitoring Distributed Applications [C]. In: Proceedings of 2010 International Conference on High Performance Computing and Simulation (HPCS), Caen, France. IEEE, 2010: 92-97.
[10] 叶兰. 电子资源管理系统实施与应用研究[J]. 图书情报工作, 2012, 56(13): 89-94. (Ye Lan. Planning and Implementing an Electronic Resource Management System [J]. Library and Information Service, 2012, 56(13): 89-94.)
[11] Silton K, LeMaistre T. Innovative Interfaces' Electronic Resources Management System: A Survey on the State of Implementation and Usage [J]. Serials Review, 2011, 37(2): 80-86.

[1] Chen Jie,Ma Jing,Li Xiaofeng. Short-Text Classification Method with Text Features from Pre-trained Models[J]. 数据分析与知识发现, 2021, 5(9): 21-30.
[2] Li Wenna,Zhang Zhixiong. Research on Knowledge Base Error Detection Method Based on Confidence Learning[J]. 数据分析与知识发现, 2021, 5(9): 1-9.
[3] Sun Yu, Qiu Jiangnan. Research on Influence of Opinion Leaders Based on Network Analysis and Text Mining [J]. 数据分析与知识发现, 0, (): 1-.
[4] Wang Qinjie, Qin Chunxiu, Ma Xubu, Liu Huailiang, Xu Cunzhen. Recommending Scientific Literature Based on Author Preference and Heterogeneous Information Network[J]. 数据分析与知识发现, 2021, 5(8): 54-64.
[5] Li Wenna, Zhang Zhixiong. Entity Alignment Method for Different Knowledge Repositories with Joint Semantic Representation[J]. 数据分析与知识发现, 2021, 5(7): 1-9.
[6] Wang Hao, Lin Kerou, Meng Zhen, Li Xinlei. Identifying Multi-Type Entities in Legal Judgments with Text Representation and Feature Generation[J]. 数据分析与知识发现, 2021, 5(7): 10-25.
[7] Yang Hanxun, Zhou Dequn, Ma Jing, Luo Yongcong. Detecting Rumors with Uncertain Loss and Task-level Attention Mechanism[J]. 数据分析与知识发现, 2021, 5(7): 101-110.
[8] Xu Yuemei, Wang Zihou, Wu Zixin. Predicting Stock Trends with CNN-BiLSTM Based Multi-Feature Integration Model[J]. 数据分析与知识发现, 2021, 5(7): 126-138.
[9] Huang Mingxuan,Jiang Caoqing,Lu Shoudong. Expanding Queries Based on Word Embedding and Expansion Terms[J]. 数据分析与知识发现, 2021, 5(6): 115-125.
[10] Wang Xiwei,Jia Ruonan,Wei Yanan,Zhang Liu. Clustering User Groups of Public Opinion Events from Multi-dimensional Social Network[J]. 数据分析与知识发现, 2021, 5(6): 25-35.
[11] Ruan Xiaoyun,Liao Jianbin,Li Xiang,Yang Yang,Li Daifeng. Interpretable Recommendation of Reinforcement Learning Based on Talent Knowledge Graph Reasoning[J]. 数据分析与知识发现, 2021, 5(6): 36-50.
[12] Liu Tong,Liu Chen,Ni Weijian. A Semi-Supervised Sentiment Analysis Method for Chinese Based on Multi-Level Data Augmentation[J]. 数据分析与知识发现, 2021, 5(5): 51-58.
[13] Chen Wenjie,Wen Yi,Yang Ning. Fuzzy Overlapping Community Detection Algorithm Based on Node Vector Representation[J]. 数据分析与知识发现, 2021, 5(5): 41-50.
[14] Zhang Guobiao,Li Jie. Detecting Social Media Fake News with Semantic Consistency Between Multi-model Contents[J]. 数据分析与知识发现, 2021, 5(5): 21-29.
[15] Yan Qiang,Zhang Xiaoyan,Zhou Simin. Extracting Keywords Based on Sememe Similarity[J]. 数据分析与知识发现, 2021, 5(4): 80-89.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn