Implementación y evaluación de una herramienta distribuida de anonimización de capturas de red

Nowadays, companies have computer networks feeding their operational systems, on these networks travels the invaluable information. In some cases that movement is the center of the business. Failures, delays, modifications or robbery can cause serious problems in the mentioned data movement. Due to...

全面介绍

Saved in:
书目详细资料
主要作者: Rigazio, Emilio (author)
其他作者: Morocho, David (author), Abad, Cristina (author)
格式: article
语言:spa
出版: 2010
主题:
在线阅读:http://www.dspace.espol.edu.ec/handle/123456789/9087
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:Nowadays, companies have computer networks feeding their operational systems, on these networks travels the invaluable information. In some cases that movement is the center of the business. Failures, delays, modifications or robbery can cause serious problems in the mentioned data movement. Due to mentioned log files contain the information that has traveled through the network in a certain period of time, they become delicate to handle because they may contain sensible information which represents security risks. This obstructs the analysis of these logs, because the organizations avoid the management of these archives, difficulting the possibility to generate best solutions to the problems networks present. It exists an anonymization process that consists in the pre-processing of log files in order for the sensible information they contain could be hidden. However, the processing becomes extensive because data that we probably are working with might be very heavy. This work is looking forward to resolve the problem set out during the distributed data processing, generating the possibility of the anonymization of a large amount of data in less time.