CN103916397A - Safety monitoring method under distributed network environment - Google Patents

Safety monitoring method under distributed network environment Download PDF

Info

Publication number
CN103916397A
CN103916397A CN201410146931.2A CN201410146931A CN103916397A CN 103916397 A CN103916397 A CN 103916397A CN 201410146931 A CN201410146931 A CN 201410146931A CN 103916397 A CN103916397 A CN 103916397A
Authority
CN
China
Prior art keywords
module
safety
security
monitoring
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410146931.2A
Other languages
Chinese (zh)
Other versions
CN103916397B (en
Inventor
胡俊
白鑫
张松鸽
林莉
寇文心
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201410146931.2A priority Critical patent/CN103916397B/en
Publication of CN103916397A publication Critical patent/CN103916397A/en
Application granted granted Critical
Publication of CN103916397B publication Critical patent/CN103916397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Multi Processors (AREA)

Abstract

The invention discloses a safety monitoring method under a distributed network environment and relates to the safety monitoring problem in the field of information security. According to the method, the system is composed of a monitoring module, a safety module and a safety mechanism, wherein the safety module is composed of a safety function cooperation module, a safety control module, a safety measurement module, a safety decision module and a local benchmark database. Monitored dynamic data are transmitted out by the monitoring module, and the monitored dynamic data are transmitted to the safety measurement module for measurement and used for measuring safety of behaviors of monitoring nodes; the safety problem is determined by the safety decision module according to the measurement result; the safety mechanism in a monitored system is dispatched by the safety control module according to the decision result to perform a coping strategy; the safety function cooperation module is responsible for having communication with the safety measurement module, the safety decision module and the safety control module so that the safety function cooperation work can be achieved. A safety strategy can be dynamically made for the distributed network environment, and safety of the monitoring nodes under the distributed network environment is maintained.

Description

Method for safety monitoring under a kind of distributed network environment
Technical field
The present invention relates to information security field, method for safety monitoring under a kind of distributed network environment, cooperative cooperating and dynamically updating between secure subsystem on distributed node, for distributed network environment customization dynamic security strategy, realizes a kind of security monitoring flow process.
Background technology
21 century rapid development of information technology, meanwhile information security issue is also more and more subject to people's attention.Distributed network: be to be formed by the node machine interconnection that is distributed in different location and there are multiple terminals.In net any point all at least with two circuit necklaces, allow any line failure be, communication can turn through other links and completes, and has higher reliability, network is easy to expansion.Advantage is, distributed network does not have center, thus not can because of centered by destroyed and caused entirety collapse.Shortcoming is to be unfavorable for centralized management, the bad control of fail safe.
The security risk that cloud computing faces is caused and caused by the technical characterstic of himself and service mode.First, the introducing of virtual technology of sharing, improving in the level of resources utilization, the weak fail safe of the relative physical environment bringing due to dynamic and the technical leak of virtual machine environment, for the safety of virtualized environment has left hidden danger.Secondly, user separates ownership, administrative power and the right to use of resource to cloud service business's application model service outsourcing, and user has the absolute control to resource no longer, naturally brings data security risk.In addition, many tenants feature of cloud computing requires cloud service provider externally providing in the process of service, tackle many tenants' running environment simultaneously, assurance different user can only be accessed data, application program and the storage resources of self, the data leakage problem that isolation mech isolation test leak brings, can cause negative effect to the service quality of cloud computing.Finally, cloud computing provides the computing environment of an opening, this opening is mainly reflected in the opening that the opening of service to user and internal interface externally call, a little less than open lower Authentication mechanism nature relative thin, this makes disabled user to attack to steal the information needing to cloud computing environment, optimum cloud computing environment also may, by disabled user for improper purposes, all can bring impact to the safety problem of cloud.The development of therefore, cloud computing industry must solve above-mentioned main cloud security problem.
Internet of Things, the i.e. connected the Internet of object.It has two-layer definition.1, the core of Internet of Things and basis remain the Internet, are the networks that extends and expand on Internet basic; 2, its user side extends and has expanded between any article and article, carries out information exchange and communicates by letter.Internet of Things by Intellisense, recognition technology and general fit calculation, be widely used in the fusion of network.By various information sensing equipment, the information of any various needs such as object or process that need monitoring, connection, interaction of Real-time Collection, is combined with the Internet and forms a huge network.Its objective is and realize thing and thing, thing and people, all article are connected, conveniently identify, manage and control with network.
Summary of the invention
For the feature of distributed network environment, as cloud computing environment and environment of internet of things, the present invention proposes a kind of method for safety monitoring.A method for safety monitoring under distributed network environment, the method is disposed a distributed security supervisory control system in distributed network environment, and this system is made up of the security monitoring subsystem that structure is identical on distributed system node.Security monitoring subsystem is connected to each other, use distributed security monitoring strategies, realize under distributed network environment, customizable interconnected topological structure, capable of dynamic upgrades monitoring strategies, can carry out distributed real-time response to monitor event, with the security mechanism of the new distribution type systems such as holder networking, cloud computing.
The present invention adopts following technological means to realize:
Method for safety monitoring under a kind of distributed network environment, at each distributed system node deploy secure subsystem, use distributed security monitoring strategies, realize a kind of under distributed network environment, the customization of actual time safety policy response, solves computer security issue under distributed environment.For existing distributed network environment feature, by the cooperation between each distributed node secure subsystem, realize security monitoring flow process under a kind of distributed network environment.It is characterized in that: the method for safety monitoring under a kind of distributed network environment, be made up of monitoring module, distributed node secure subsystem and security mechanism three parts, wherein distributed node secure subsystem is made up of safety function cooperative module, scheduler module, safety control module, security measure module, security decision module and local reference database;
Monitoring module is made up of monitoring program, for monitor node information and dynamic monitoring, by data upload to distributed node secure subsystem;
Safety function cooperative module is responsible for communication for coordination between distributed node subsystem;
Security measure module, for the analysis monitoring information content, is responsible for according to monitor message metric data credibility;
Security decision module, according to tolerance result, generates security decision data;
Safety control module, according to security decision data, generates and controls data, customization actual time safety mechanism;
Scheduler module, Dispatch Safety metric module, security decision module and safety control module, communication topology and the communication redirection of responsible distributed node secure subsystem;
Local reference database is updatable data storehouse, Memory Reference data and configuration information.
Distributed node secure subsystem is made up of safety function cooperative module, scheduler module, safety control module, security measure module, security decision module and local reference database, it is characterized in that:
Step 2.1: safety function cooperative module is responsible for communication for coordination between distributed node subsystem, realizes collaborative monitoring and dynamically updates;
Step 2.2: security measure module, for the analysis monitoring information content, be responsible for according to monitor message metric data credibility;
Step 2.3: security decision module, according to tolerance result, generates security decision data;
Step 2.4: safety control module, according to security decision data, generates and control data, customization actual time safety mechanism;
Step 2.5: scheduler module, Dispatch Safety metric module, security decision module and safety control module, communication topology and the communication redirection of responsible distributed node secure subsystem;
Step 2.6: local reference database is updatable data storehouse, Memory Reference data and configuration information.
Method for safety monitoring under a kind of distributed network environment, it is characterized in that, for distributed network environment feature, obtain monitored object real time data by monitoring module, send to distributed node secure subsystem, collaborative work between secure subsystem between distributed node, according to real time data customization security mechanism, solve actual time safety problem, it is characterized in that:
Step 3.1: monitoring module is carried out monitoring program, gathers real-time dynamic data, and sends real-time dynamic data to security measure module;
Step 3.2: security measure module obtains real time data, generates tolerance report by process scheduling module inquiry local reference database.If metric data is correct, do not send report; Otherwise, send tolerance report to scheduler module;
Step 3.3: scheduler module obtains tolerance report, according to local reference database configuration information, wakes security decision module and safety control module up, and metric is transmitted to security decision module;
Step 3.4: security decision module, inquiry local reference database, according to tolerance report, generates security decision report, and definition safety problem, sends to the same module of scheduling by decision-making report;
Step 3.5: scheduler module receives decision data, can process safety problem if decision data is defined as, and, according to local reference database configuration information, decision data is sent to safety control module.Otherwise be redirected, work in coordination with and mail to other distributed node secure subsystems by safety function, solve security decision problem, and return to the result of decision;
Step 3.6: safety control module receives decision-making report, inquiry local reference database, generates security control data, and security control data is sent to security mechanism, customization actual time safety mechanism;
The present invention compared with prior art, has following obvious advantage and beneficial effect:
The present invention introduces computation schema in many ways, with respect to conventional frame, proposes a kind of distributed multi-node collaborative and processes safety problem method.Meanwhile, to transfer credible behavior different from the behavior of conventional security mechanism, and method for supervising of the present invention uses credible behavior to transfer security mechanism, and the former security mechanism belongs to static configuration, cannot be competent at the behavior particularity of many distributed nodes.The method for safety monitoring that the present invention proposes can be according to node own characteristic, and the configuration of customized personal security mechanism, solves real-time safety problem.
Accompanying drawing explanation
Fig. 1 module principle figure;
Fig. 2 security monitoring flow chart.
Embodiment
Below in conjunction with accompanying drawing 1 and Fig. 2, the present invention is described in further detail.
The present invention proposes a kind of net environment method for safety monitoring, and each distributed node arranges as the monitoring module of Fig. 1, distributed security subsystem and the supervisory control system by the local security mechanism composition existing under distributed environment.By the cooperation between distributed node secure subsystem, customize in real time security mechanism, realize security monitoring flow process under a kind of distributed network environment.
As shown in Figure 1, security module obtains monitor message by monitoring module, then through processing, security customization strategy is sent to security mechanism, and customization actual time safety mechanism, solves actual time safety problem.Secure subsystem is made up of safety function cooperative module, scheduler module, security measure module, security decision module, safety control module and local reference database.Wherein, local reference database is deposited the reference data of configuration data and the security measure of security module, for configuration and the data base contrast of secure subsystem; Scheduler module assists to implement tolerance, decision-making, three steps of control, is responsible for process scheduling and transfer of data orientation, realizes the process scheduling of security measure module, security decision module and safety control module and the transfer of data with local reference database; Safety function cooperative module is responsible for the internodal communication of distributed terminal, the collaborative safe procedures that realizes; Security measure module is for measuring the monitor data receiving and generating metric data; Security decision module generates security decision data according to tolerance result; Safety control module generates security mechanism customization data according to security decision data, is transferred to security mechanism, customizes in real time security mechanism, and whole monitoring flow process is as Fig. 2.
Distributed node secure subsystem initial method is as follows:
Step 2.1: monitoring module process initialization, in distributed terminal implant monitor program, as hook, real-time monitoring distributed terminal dynamic change.Wait for security cooperate module initialization, set up and communicate by letter with security measure module.
Step 2.2: scheduler module initialization, communicate by letter with local reference Database.Set up and communicate by letter with security measure module, security decision module and safety control module, set up monitoring module and security measure module communication, setting up safety control module communicates by letter with security mechanism, Real-Time Scheduling security decision module and safety control module, be responsible for security measure module, security decision module and safety control module and the inquiry of local reference database data and data retransmission.Set up safety function cooperative module and communicate by letter with the secure subsystem on other nodes under distributed system, associated treatment safety problem.
Scheduler module, as the process scheduling in single secure subsystem and data forwarding module, the orientation problem of simultaneously also communicating by letter between responsible distributed node.As the scheduler module in single secure subsystem, Dispatch Safety metric module, security decision module and safety control module.Configuration data, reference data, communication and the configuration of monitoring flow process of local reference data-storing secure subsystem, provide Data support.
Step 2.3: according to local reference data base configuration file initialization security measure module, communicate by letter with monitoring module and safety function cooperative module, receive monitoring module monitor data, and tolerance result is sent to scheduler module.
Security measure module is responsible for measuring the distributed terminal dynamic data that monitoring module obtains, and with local reference database data contrast tolerance, generates tolerance report, and report is submitted to safety function cooperative module.For security decision module, complete metrology step, for steps in decision-making provides tolerance foundation.
Step 2.4: according to local reference data base configuration file initialization security decision module, keep communicating by letter with scheduler module, host process enters resting state, waits for the scheduling of safety function cooperative module.
The monitor data that will wait for monitoring module transmission from the security measure module moment is different, and security decision module completes after initialization, and host process enters resting state, assists to carry out process scheduling by scheduler module, waits for tolerance report.If send tolerance report, according to tolerance report, generate decision-making report, submit to safety function cooperative module, complete steps in decision-making, provide decision-making foundation for controlling step.
Step 2.5: according to the configurable file initialization of local reference data safety control module, keep communicating by letter with scheduler module, host process enters resting state, waits for scheduler module program scheduler.
Step 2.6: the initialization of safety function cooperative module, set up and communicate by letter with the secure subsystem on other nodes in distributed environment, realize follow-up associated treatment safety problem and configuration data and dynamically update, realize the monitoring flow process under distributed environment.
Distributed security subsystem monitors method is as follows:
Step 3.1: monitoring module is carried out monitoring program, gathers real-time dynamic data, and sends real-time dynamic data to security measure module.System call on the responsible monitoring distributed node of monitoring module and the audit information of local security mechanism, find that there is general authority user and attempt to revise system file, unauthorized operation, and monitoring module sends to security measure module by Audit data with form of message.The attribute of message can be divided into: other attributes of message sender, message receiver, type of message and message.
Step 3.2: security measure module obtains real time data, generates metric data by safety function cooperative module inquiry local reference database.If metric data is correct, do not send report; Otherwise, send tolerance result to safety function cooperative module.
Step 3.3: scheduler module obtain metric data, according to local reference database configuration information, wake security decision module and safety control module up, simultaneously by metric data directional transmissions to security decision module.
Step 3.4: security decision module, inquiry local reference database, according to metric data, generates security decision data, and definition safety problem, sends to transfer module by decision data.
Step 3.5: scheduler module receives decision data, inquiry local reference database, can process safety problem if decision data is defined as, and, according to local reference database configuration information, decision data is sent to safety control module.Otherwise, by safety function cooperative module, mail to the secure subsystem associated treatment on other distribution nodes, and result is returned to the secure subsystem of former distributed node, complete steps in decision-making.
Associated treatment safety issue is an emphasis in distributed security monitoring flow process.Under distributed environment, node disperses, and purposes is different, can not be by the guarantee of single security mechanism Configuration safety.Therefore, for can be according to real time data, the configuration of personalized customization security mechanism overcomes constant that distributed environment brings simultaneously, and the present invention proposes the collaborative method realizing of safety function.Each distributed node secure subsystem is furnished with a safety function cooperative module, be responsible for the collaborative work of secure subsystem between each node, realize the safe procedures under distributed environment, for the realization that the dynamic data of follow-up whole distributed environment upgrades, provide function basis.
Finally it should be noted that: above example is only in order to illustrate the present invention and unrestricted technical scheme described in the invention; Therefore,, although this specification has been described in detail the present invention with reference to above-mentioned example, those of ordinary skill in the art should be appreciated that still and can modify or be equal to replacement the present invention; And all do not depart from technical scheme and the improvement thereof of the spirit and scope of invention, it all should be encompassed in the middle of claim scope of the present invention.

Claims (3)

1. method for safety monitoring under a distributed network environment, the method is disposed a distributed security supervisory control system in distributed network environment, this system is made up of the security monitoring subsystem that structure is identical on distributed system node, security monitoring subsystem is connected to each other, and uses distributed security monitoring strategies, realizes under distributed network environment, customizable interconnected topological structure, capable of dynamic upgrades monitoring strategies, can carry out distributed real-time response to monitor event, it is characterized in that:
Security monitoring subsystem is made up of monitoring module, distributed node secure subsystem and security mechanism;
Monitoring module is made up of monitoring program, for monitor node information and dynamic monitoring, by data upload to distributed node secure subsystem;
Distributed node secure subsystem is deployed in distributed node, accepts monitor data, customization security mechanism;
Security mechanism is made up of different conventional security mechanism.
2. described in claim 1, distributed node secure subsystem is made up of safety function cooperative module, scheduler module, safety control module, security measure module, security decision module and local reference database, it is characterized in that:
Safety function cooperative module is responsible for communication for coordination between distributed node subsystem, realizes collaborative monitoring and dynamically updates;
Security measure module, for the analysis monitoring information content, is responsible for according to monitor message metric data credibility;
Security decision module, according to tolerance result, generates security decision data;
Safety control module, according to security decision data, generates and controls data, customization actual time safety mechanism;
Scheduler module, Dispatch Safety metric module, security decision module and safety control module, communication topology and the communication redirection of responsible distributed node secure subsystem;
Local reference database is updatable data storehouse, Memory Reference data and configuration information.
3. according to right 2 requirements, method for safety monitoring under a kind of distributed network environment, it is characterized in that, for distributed network environment feature, obtain monitored object real time data by monitoring module, send to distributed node secure subsystem, collaborative work between secure subsystem between distributed node, step is as follows:
Step 3.1: monitoring module is carried out monitoring program, gathers real-time dynamic data, and sends real-time dynamic data to security measure module;
Step 3.2: security measure module obtains real time data, generates tolerance report by process scheduling module inquiry local reference database, if metric data is correct, does not send report; Otherwise, send tolerance report to scheduler module;
Step 3.3: scheduler module obtains tolerance report, according to local reference database configuration information, wakes security decision module and safety control module up, and metric is transmitted to security decision module;
Step 3.4: security decision module, inquiry local reference database, according to tolerance report, generates security decision report, and definition safety problem, sends to the same module of scheduling by decision-making report;
Step 3.5: scheduler module receives decision data, if being defined as, decision data can process safety problem, according to local reference database configuration information, decision data is sent to safety control module, otherwise be redirected, work in coordination with and mail to other distributed node secure subsystems by safety function, solve security decision problem, and return to the result of decision;
Step 3.6: safety control module receives decision-making report, inquiry local reference database, generates security control data, and security control data is sent to security mechanism, customization actual time safety mechanism.
CN201410146931.2A 2014-04-13 2014-04-13 Method for safety monitoring under a kind of distributed network environment Active CN103916397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410146931.2A CN103916397B (en) 2014-04-13 2014-04-13 Method for safety monitoring under a kind of distributed network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410146931.2A CN103916397B (en) 2014-04-13 2014-04-13 Method for safety monitoring under a kind of distributed network environment

Publications (2)

Publication Number Publication Date
CN103916397A true CN103916397A (en) 2014-07-09
CN103916397B CN103916397B (en) 2017-09-29

Family

ID=51041804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410146931.2A Active CN103916397B (en) 2014-04-13 2014-04-13 Method for safety monitoring under a kind of distributed network environment

Country Status (1)

Country Link
CN (1) CN103916397B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378364A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Collaborative analysis method of information security operation centers
CN104811351A (en) * 2015-04-21 2015-07-29 中国电子科技集团公司第四十一研究所 Distributed communication network testing method and system based on XML
CN105718803A (en) * 2015-11-25 2016-06-29 烟台南山学院 Safety protection method for computer software
CN105871928A (en) * 2016-06-21 2016-08-17 佛山科学技术学院 Safety control method and safety control system of distributed network
CN106817693A (en) * 2015-11-27 2017-06-09 国网智能电网研究院 A kind of distributed network security control system and method
CN107733877A (en) * 2017-09-27 2018-02-23 中科鼎慧(天津)物联网技术有限公司 A kind of management method and system of Internet of Things wireless telecommunications framework
CN108874623A (en) * 2018-05-31 2018-11-23 郑州云海信息技术有限公司 Distributed type assemblies method for monitoring performance, device, equipment, system and storage medium
CN109086616A (en) * 2018-08-10 2018-12-25 重庆工程学院 A kind of Internet of Things network architecture security system and its safety method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694451A (en) * 2004-10-29 2005-11-09 北京航空航天大学 Distribution network system monitoring protocol
US20060230245A1 (en) * 2005-04-08 2006-10-12 Microsoft Corporation Data storage safety indicator and expander
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN101605065A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 The implementation method of security incident monitoring in the system of security centre
CN102457578A (en) * 2011-12-16 2012-05-16 中标软件有限公司 Distributed network monitoring method based on event mechanism
CN103281306A (en) * 2013-05-03 2013-09-04 四川省电力公司信息通信公司 Virtualized infrastructure platform for cloud data centers
CN103685575A (en) * 2014-01-06 2014-03-26 洪高颖 Website security monitoring method based on cloud architecture

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694451A (en) * 2004-10-29 2005-11-09 北京航空航天大学 Distribution network system monitoring protocol
US20060230245A1 (en) * 2005-04-08 2006-10-12 Microsoft Corporation Data storage safety indicator and expander
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
CN101605065A (en) * 2009-04-22 2009-12-16 网经科技(苏州)有限公司 The implementation method of security incident monitoring in the system of security centre
CN102457578A (en) * 2011-12-16 2012-05-16 中标软件有限公司 Distributed network monitoring method based on event mechanism
CN103281306A (en) * 2013-05-03 2013-09-04 四川省电力公司信息通信公司 Virtualized infrastructure platform for cloud data centers
CN103685575A (en) * 2014-01-06 2014-03-26 洪高颖 Website security monitoring method based on cloud architecture

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
尹海波: "云计算环境下分布式应用系统的监控平台设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378364A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Collaborative analysis method of information security operation centers
CN104378364B (en) * 2014-10-30 2018-02-27 广东电子工业研究院有限公司 A kind of Cooperative Analysis method at information security management center
CN104811351A (en) * 2015-04-21 2015-07-29 中国电子科技集团公司第四十一研究所 Distributed communication network testing method and system based on XML
CN105718803A (en) * 2015-11-25 2016-06-29 烟台南山学院 Safety protection method for computer software
CN106817693A (en) * 2015-11-27 2017-06-09 国网智能电网研究院 A kind of distributed network security control system and method
CN106817693B (en) * 2015-11-27 2020-10-27 国网智能电网研究院 Distributed network security control system and method
CN105871928A (en) * 2016-06-21 2016-08-17 佛山科学技术学院 Safety control method and safety control system of distributed network
CN105871928B (en) * 2016-06-21 2019-03-29 佛山科学技术学院 A kind of method of controlling security and system of distributed network
CN107733877A (en) * 2017-09-27 2018-02-23 中科鼎慧(天津)物联网技术有限公司 A kind of management method and system of Internet of Things wireless telecommunications framework
CN107733877B (en) * 2017-09-27 2020-06-16 中科鼎慧(天津)物联网技术有限公司 Management method and system for wireless communication architecture of Internet of things
CN108874623A (en) * 2018-05-31 2018-11-23 郑州云海信息技术有限公司 Distributed type assemblies method for monitoring performance, device, equipment, system and storage medium
CN109086616A (en) * 2018-08-10 2018-12-25 重庆工程学院 A kind of Internet of Things network architecture security system and its safety method

Also Published As

Publication number Publication date
CN103916397B (en) 2017-09-29

Similar Documents

Publication Publication Date Title
CN103916397A (en) Safety monitoring method under distributed network environment
CN101409614B (en) Data synchronization method, system and equipment
CN112600891B (en) Information physical fusion-based edge cloud cooperative system and working method
US11226614B2 (en) Use of a smart node in a universal, smart system for monitoring industrial processes
KR20170020311A (en) Wireless sensor network
CN106506595B (en) Upgrade method based on point-to-point Internet of Things intelligent Community equipment
CN106162639B (en) SDN wireless network management platform and authentication method based on Floodlight
CN103973815A (en) Method for unified monitoring of storage environment across data centers
CN109657003A (en) A method of hardware data is directly accessed big data platform
CN108985937A (en) A kind of computing resource sharing method and block catenary system based on block chain technology
CN109478056A (en) Intelligent node for distributed grid network
CN104038570B (en) A kind of data processing method and device
CN105516292A (en) Hot standby method of cloud platform of intelligent substation
Gao et al. Cyber-physical systems testbed based on cloud computing and software defined network
CN106453541A (en) Data synchronization method, server and data synchronization system
CN107942724B (en) Information security protection simulation verification platform for industrial key infrastructure
CN108111334A (en) The integrated system and method for a kind of network application node
CN106412108B (en) User data dispositions method and system based on cloud platform framework
CN103841595A (en) Base station information supervising system
CN104732449B (en) A kind of information system method of operation method for establishing model
CN113848834B (en) Workshop equipment access system and method based on edge cloud cooperation
CN110519330A (en) ARINC 661-based multi-display control data synchronization method and system
CN114745616A (en) Underground heat information remote monitoring and early warning system and method
CN108282373A (en) System and method based on the fast quick-recovery business datum of SPTN controllers
Gao et al. A Cost-Efficient Virtual Sensor Management Scheme for Manufacturing Network in Smart Factory.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant