Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Based on the telecom operator mobile network topology, whereas the requirements of secure service for network information security, the key technologies such as convergence diversion, security audit, user association analysis, etc, were analyzed. The architecture of audit analysis platform was descr...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2015-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015337/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|