|
|
Research and Implementation of Drive-level Local User Behavior Monitoring System |
Guo Xiaoqing, Ren Shougang, Xie Zhonghong |
College of Information Science and Technology, Nanjing Agricultural University, Nanjing 210095, China |
|
|
Abstract In order to obtain the behavior of local users which include operation on digital libraries and personalized push service, and application software on the system, a driver stage-based application access control strategy is proposed, which can implement real-time monitoring and recording of the I/O operation. This paper implementes the drive-level local user behavior monitoring system based on VC++, using technologies of file driver stage, Web crawler and database. Operation log obtained through the system also can be used as the electronic survey data designed for personalized push service of the library.
|
Received: 05 October 2012
Published: 24 January 2013
|
|
[1] 胡宏银,姚峰,何成万. 一种基于文件过滤驱动的Windows文件安全保护方案[J]. 计算机应用, 2009,29(1):168-171.(Hu Hongyin,Yao Feng,He Chengwan.Solution of Windows Files Security Protection Based on File System Filter Driver[J]. Journal of Computer Applications, 2009,29(1):168-171.) [2] 李高虎,高嵩,唐小新,等. 个性化新书通报推荐系统的设计与实现[J]. 现代图书情报技术,2012(6):89-93.(Li Gaohu,Gao Song,Tang Xiaoxin,et al. Design and Implementation of New Books Noting Personalized Recommendation System Based on Circulation Logs[J]. New Technology of Library and Information Service, 2012(6):89-93.) [3] 余慧佳,刘奕群,张敏,等. 基于大规模日志分析的搜索引擎用户行为分析[J]. 中文信息学报, 2007,21(1):109-114.(Yu Huijia,Liu Yiqun,Zhang Min, et al. Research in Search Engine User Behavior Based on Log Analysis[J]. Journal of Chinese Information Processing, 2007,21(1):109-114.) [4] 王霞. 基于WEB浏览的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Wang Xia. The Study and Design of User Behavior Analysis System Based on Web Browsing[D]. Beijing:Beijing University of Posts and Telecommunications,2010.) [5] 刘鹏. 网络用户行为分析的若干问题研究[D]. 北京:北京邮电大学,2010.(Liu Peng. Behavior of Network Users Research Based on Time-varying & Services[D]. Beijing:Beijing University of Posts and Telecommunications,2010.) [6] 董富强. 网络用户行为分析研究及其应用[D].西安:西安电子科技大学,2005.(Dong Fuqiang. Study on Network Users’Behaviors Analysis and Its Application[D]. Xi’an:Xidian University,2005.) [7] 周岳. 基于兴趣分类的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Zhou Yue. Research and Design of the Analysis of User Behavior System Based on Interest Classification[D]. Beijing:Beijing University of Posts and Telecommunications,2010.) [8] Microsoft. Microsoft Security Essentials Product Information[EB/OL].[2012-10-11]. http://windows.microsoft.com/en-US/windows/security-essentials-product-information#tabs1=features. [9] 360浏览器抓取用户隐私流程[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.(Processes of the 360 Browser Crawl User Privacy[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.) [10] 腾讯360之争[EB/OL].[2012-10-07]. http://baike.baidu.com/view/4633773.htm.(The Dispute Between Tencent and 360 [EB/OL]. [2012-10-07].http://baike.baidu.com/view/4633773.htm.) [11] 谭文,杨潇. Windows内核安全编程[M]. 北京:电子工业出版社,2009: 476-478.(Tan Wen, Yang Xiao. Windows Kernel Security Programming[M].Beijing:Publishing House of Electronics Industry, 2009: 476-478.) [12] 翟进,李清宝,白燕,等. 文件过滤驱动在网络安全终端中的应用 [J]. 计算机应用,2007,27(3):624-626.(Zhai Jin,Li Qingbao,Bai Yan,et al. Application of File System Filter Driver in NetWork Security Terminal[J]. Computer Applications, 2007,27(3):624-626.) [13] 郑磊,马兆丰,顾明. 基于文件系统过滤驱动的安全增强型加密系统技术研究[J]. 小型微型计算机系统, 2007, 28(7):1181-1184.(Zheng Lei,Ma Zhaofeng,Gu Ming.Techniques of File System Filter Driver-based and Security-enhanced Encryption System[J]. Journal of Chinese Computer Systems, 2007, 28(7):1181-1184.) [14] 魏丕会,卿斯汉,刘海峰. 基于安全操作系统的透明加密文件系统的设计[J]. 计算机科学,2003,30(7):132-135.(Wei Pihui,Qing Sihan,Liu Haifeng.Design and Implementation of a Transparent Cryptographic File System Based on Security Operating System[J].Computer Science, 2003,30(7):132-135.) |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|