Please wait a minute...
New Technology of Library and Information Service  2012, Vol. Issue (10): 77-82    DOI: 10.11925/infotech.1003-3513.2012.10.13
Current Issue | Archive | Adv Search |
Research and Implementation of Drive-level Local User Behavior Monitoring System
Guo Xiaoqing, Ren Shougang, Xie Zhonghong
College of Information Science and Technology, Nanjing Agricultural University, Nanjing 210095, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  In order to obtain the behavior of local users which include operation on digital libraries and personalized push service, and application software on the system, a driver stage-based application access control strategy is proposed, which can implement real-time monitoring and recording of the I/O operation. This paper implementes the drive-level local user behavior monitoring system based on VC++, using technologies of file driver stage, Web crawler and database. Operation log obtained through the system also can be used as the electronic survey data designed for personalized push service of the library.
Key wordsUser behavior monitoring      File filter driver      Kernel mode     
Received: 05 October 2012      Published: 24 January 2013
:  TP393  

Cite this article:

Guo Xiaoqing, Ren Shougang, Xie Zhonghong. Research and Implementation of Drive-level Local User Behavior Monitoring System. New Technology of Library and Information Service, 2012, (10): 77-82.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2012.10.13     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2012/V/I10/77

[1] 胡宏银,姚峰,何成万. 一种基于文件过滤驱动的Windows文件安全保护方案[J]. 计算机应用, 2009,29(1):168-171.(Hu Hongyin,Yao Feng,He Chengwan.Solution of Windows Files Security Protection Based on File System Filter Driver[J]. Journal of Computer Applications, 2009,29(1):168-171.)
[2] 李高虎,高嵩,唐小新,等. 个性化新书通报推荐系统的设计与实现[J]. 现代图书情报技术,2012(6):89-93.(Li Gaohu,Gao Song,Tang Xiaoxin,et al. Design and Implementation of New Books Noting Personalized Recommendation System Based on Circulation Logs[J]. New Technology of Library and Information Service, 2012(6):89-93.)
[3] 余慧佳,刘奕群,张敏,等. 基于大规模日志分析的搜索引擎用户行为分析[J]. 中文信息学报, 2007,21(1):109-114.(Yu Huijia,Liu Yiqun,Zhang Min, et al. Research in Search Engine User Behavior Based on Log Analysis[J]. Journal of Chinese Information Processing, 2007,21(1):109-114.)
[4] 王霞. 基于WEB浏览的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Wang Xia. The Study and Design of User Behavior Analysis System Based on Web Browsing[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[5] 刘鹏. 网络用户行为分析的若干问题研究[D]. 北京:北京邮电大学,2010.(Liu Peng. Behavior of Network Users Research Based on Time-varying & Services[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[6] 董富强. 网络用户行为分析研究及其应用[D].西安:西安电子科技大学,2005.(Dong Fuqiang. Study on Network Users’Behaviors Analysis and Its Application[D]. Xi’an:Xidian University,2005.)
[7] 周岳. 基于兴趣分类的用户行为分析系统的研究与设计[D]. 北京:北京邮电大学,2010.(Zhou Yue. Research and Design of the Analysis of User Behavior System Based on Interest Classification[D]. Beijing:Beijing University of Posts and Telecommunications,2010.)
[8] Microsoft. Microsoft Security Essentials Product Information[EB/OL].[2012-10-11]. http://windows.microsoft.com/en-US/windows/security-essentials-product-information#tabs1=features.
[9] 360浏览器抓取用户隐私流程[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.(Processes of the 360 Browser Crawl User Privacy[EB/OL]. [2012-10-07].http://baike.baidu.com/albums/1458023/1458023/0/0.html#0$b8014a90f603738d06a96ea2b31bb051f919ec4b.)
[10] 腾讯360之争[EB/OL].[2012-10-07]. http://baike.baidu.com/view/4633773.htm.(The Dispute Between Tencent and 360 [EB/OL]. [2012-10-07].http://baike.baidu.com/view/4633773.htm.)
[11] 谭文,杨潇. Windows内核安全编程[M]. 北京:电子工业出版社,2009: 476-478.(Tan Wen, Yang Xiao. Windows Kernel Security Programming[M].Beijing:Publishing House of Electronics Industry, 2009: 476-478.)
[12] 翟进,李清宝,白燕,等. 文件过滤驱动在网络安全终端中的应用 [J]. 计算机应用,2007,27(3):624-626.(Zhai Jin,Li Qingbao,Bai Yan,et al. Application of File System Filter Driver in NetWork Security Terminal[J]. Computer Applications, 2007,27(3):624-626.)
[13] 郑磊,马兆丰,顾明. 基于文件系统过滤驱动的安全增强型加密系统技术研究[J]. 小型微型计算机系统, 2007, 28(7):1181-1184.(Zheng Lei,Ma Zhaofeng,Gu Ming.Techniques of File System Filter Driver-based and Security-enhanced Encryption System[J]. Journal of Chinese Computer Systems, 2007, 28(7):1181-1184.)
[14] 魏丕会,卿斯汉,刘海峰. 基于安全操作系统的透明加密文件系统的设计[J]. 计算机科学,2003,30(7):132-135.(Wei Pihui,Qing Sihan,Liu Haifeng.Design and Implementation of a Transparent Cryptographic File System Based on Security Operating System[J].Computer Science, 2003,30(7):132-135.)
[1] Chen Jie,Ma Jing,Li Xiaofeng. Short-Text Classification Method with Text Features from Pre-trained Models[J]. 数据分析与知识发现, 2021, 5(9): 21-30.
[2] Li Wenna,Zhang Zhixiong. Research on Knowledge Base Error Detection Method Based on Confidence Learning[J]. 数据分析与知识发现, 2021, 5(9): 1-9.
[3] Sun Yu, Qiu Jiangnan. Research on Influence of Opinion Leaders Based on Network Analysis and Text Mining [J]. 数据分析与知识发现, 0, (): 1-.
[4] Wang Qinjie, Qin Chunxiu, Ma Xubu, Liu Huailiang, Xu Cunzhen. Recommending Scientific Literature Based on Author Preference and Heterogeneous Information Network[J]. 数据分析与知识发现, 2021, 5(8): 54-64.
[5] Li Wenna, Zhang Zhixiong. Entity Alignment Method for Different Knowledge Repositories with Joint Semantic Representation[J]. 数据分析与知识发现, 2021, 5(7): 1-9.
[6] Wang Hao, Lin Kerou, Meng Zhen, Li Xinlei. Identifying Multi-Type Entities in Legal Judgments with Text Representation and Feature Generation[J]. 数据分析与知识发现, 2021, 5(7): 10-25.
[7] Yang Hanxun, Zhou Dequn, Ma Jing, Luo Yongcong. Detecting Rumors with Uncertain Loss and Task-level Attention Mechanism[J]. 数据分析与知识发现, 2021, 5(7): 101-110.
[8] Xu Yuemei, Wang Zihou, Wu Zixin. Predicting Stock Trends with CNN-BiLSTM Based Multi-Feature Integration Model[J]. 数据分析与知识发现, 2021, 5(7): 126-138.
[9] Huang Mingxuan,Jiang Caoqing,Lu Shoudong. Expanding Queries Based on Word Embedding and Expansion Terms[J]. 数据分析与知识发现, 2021, 5(6): 115-125.
[10] Wang Xiwei,Jia Ruonan,Wei Yanan,Zhang Liu. Clustering User Groups of Public Opinion Events from Multi-dimensional Social Network[J]. 数据分析与知识发现, 2021, 5(6): 25-35.
[11] Ruan Xiaoyun,Liao Jianbin,Li Xiang,Yang Yang,Li Daifeng. Interpretable Recommendation of Reinforcement Learning Based on Talent Knowledge Graph Reasoning[J]. 数据分析与知识发现, 2021, 5(6): 36-50.
[12] Liu Tong,Liu Chen,Ni Weijian. A Semi-Supervised Sentiment Analysis Method for Chinese Based on Multi-Level Data Augmentation[J]. 数据分析与知识发现, 2021, 5(5): 51-58.
[13] Chen Wenjie,Wen Yi,Yang Ning. Fuzzy Overlapping Community Detection Algorithm Based on Node Vector Representation[J]. 数据分析与知识发现, 2021, 5(5): 41-50.
[14] Zhang Guobiao,Li Jie. Detecting Social Media Fake News with Semantic Consistency Between Multi-model Contents[J]. 数据分析与知识发现, 2021, 5(5): 21-29.
[15] Yan Qiang,Zhang Xiaoyan,Zhou Simin. Extracting Keywords Based on Sememe Similarity[J]. 数据分析与知识发现, 2021, 5(4): 80-89.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn