高级检索
    孙钦东, 管晓宏, 周亚东. 网络信息内容审计研究的现状及趋势[J]. 计算机研究与发展, 2009, 46(8): 1241-1250.
    引用本文: 孙钦东, 管晓宏, 周亚东. 网络信息内容审计研究的现状及趋势[J]. 计算机研究与发展, 2009, 46(8): 1241-1250.
    Sun Qindong, Guan Xiaohong, Zhou Yadong. A Survey of Network Information Content Audit[J]. Journal of Computer Research and Development, 2009, 46(8): 1241-1250.
    Citation: Sun Qindong, Guan Xiaohong, Zhou Yadong. A Survey of Network Information Content Audit[J]. Journal of Computer Research and Development, 2009, 46(8): 1241-1250.

    网络信息内容审计研究的现状及趋势

    A Survey of Network Information Content Audit

    • 摘要: 网络信息内容审计技术针对网络流量中不良信息传播的问题,综合运用网络数据包获取、信息处理、不良流量阻断等技术实现对网络信息内容传播的有效监管.按照从整体到局部的思路,以从底层到高层的视角对内容审计所涉及的关键技术进行研究与论述.首先讨论了审计系统模型的研究现状及不足,进而分析了审计数据获取及相关的负载均衡技术;介绍了内容审计中模式匹配、文本语义分析、不良图像内容识别等核心技术的研究进展,接下来分析了内容安全态势评估与预测、在线阻断等审计结果处理技术;最后针对目前研究中的不足,给出需要进一步研究的热点内容及研究建议并给出了结论.

       

      Abstract: Nowadays, large scale spreading of the pornographic and rumour content on the Internet has been a serious problem of network security. The authors give a survey of the main network information content audit techniques, which usually sniffers network packets from key point of network, filters packets to find the contents against security policy, and could effectively prevent the spreading of harmful contents. With the viewpoint from global to local and from bottom to top, the key issues in content auditing are discussed. Firstly, the current works of the auditing model are introduced and the main deficiencies of existing models are presented. Secondly, the techniques for auditing data capturing and load balancing are analyzed. Thirdly, the development of content analysis technologies are introduced, such as, pattern matching, text semantics analysis, hot topic extraction, malicious images recognition, etc. Fourthly, the methods of evaluation and prediction of the content security situation, and technologies of data online processing and blocking are discussed. Through analyzing the open problems and issues, which include streaming video content auditing, key words dynamic updating, analysis of dynamic information flow characteristics, and dynamic propagation prosess of network information, the directions and suggestions for further research are proposed as the concluding remarks.

       

    /

    返回文章
    返回