CN106534185B - Device and method for monitoring effectiveness of airborne network security software in real time - Google Patents

Device and method for monitoring effectiveness of airborne network security software in real time Download PDF

Info

Publication number
CN106534185B
CN106534185B CN201611140724.1A CN201611140724A CN106534185B CN 106534185 B CN106534185 B CN 106534185B CN 201611140724 A CN201611140724 A CN 201611140724A CN 106534185 B CN106534185 B CN 106534185B
Authority
CN
China
Prior art keywords
function module
module
data
storage area
working state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611140724.1A
Other languages
Chinese (zh)
Other versions
CN106534185A (en
Inventor
张双
于沛
张拓智
郑涛
卢山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Aeronautics Computing Technique Research Institute of AVIC
Original Assignee
Xian Aeronautics Computing Technique Research Institute of AVIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Aeronautics Computing Technique Research Institute of AVIC filed Critical Xian Aeronautics Computing Technique Research Institute of AVIC
Priority to CN201611140724.1A priority Critical patent/CN106534185B/en
Publication of CN106534185A publication Critical patent/CN106534185A/en
Application granted granted Critical
Publication of CN106534185B publication Critical patent/CN106534185B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to computer software-system application software, and relates to a device and a method for monitoring the effectiveness of airborne network security software in real time. The device comprises: the system comprises an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103), an anti-virus function module (104), a state storage area (105), an effectiveness judgment module (106) and a state monitoring module (107). The invention realizes the real-time monitoring of effectiveness by adopting real-time state collection, effectiveness logic judgment and message communication to the network security software during operation, and provides the capability of realizing the real-time monitoring of the effectiveness of the airborne network security software.

Description

Device and method for monitoring effectiveness of airborne network security software in real time
Technical Field
The invention belongs to computer software-system application software, and relates to a device and a method for monitoring the effectiveness of airborne network security software in real time.
Background
With the large number of applications of information technology in civil avionics systems, in order to provide more and more convenient services to aircraft users (such as aircraft operators, pilots, maintenance personnel, etc.), an onboard network service system composed of different platforms and constructed by an ethernet network is introduced, so as to form an open environment with integrated air and ground. The Functional requirements of the onboard network service System for network Security (Security) are defined in ARINC821 (architecture Network Server System (NSS) Functional Definition). Because the airborne network service system not only exchanges data with the traditional avionics system with high security level, but also exchanges data with the cabin system with low security level and the aircraft external support system (such as a maintenance terminal, an information center and the like), a security gateway in the airborne network service system needs to complete the information security protection with high security level, and prevent the attack threat from the outside of the aircraft from influencing the security of the aircraft electronic system.
The security gateway is used as a key network security domain boundary protection component, and the improvement of the effectiveness monitoring capability of network security software used in the operation of the security gateway is one of key problems to be solved in the design of an airborne network service system.
Disclosure of Invention
The purpose of the invention is as follows:
the invention provides a device and a method for monitoring the effectiveness of airborne network security software in real time, which realize the effectiveness real-time monitoring by adopting real-time state collection, effectiveness logic judgment and message communication on the network security software during operation and provide the capability of realizing the real-time monitoring of the effectiveness of the airborne network security software.
The technical scheme of the invention is as follows:
an onboard network security software effectiveness real-time monitoring device, comprising:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, the warning message is immediately sent to the outside.
The check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
The runtime rule base data in the state storage area (105) is stored by using a Table (Table) mode; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format.
A real-time monitoring method for the effectiveness of airborne network security software comprises the following steps:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
The invention has the advantages and effects that:
the design can obtain the following beneficial effects in the use process:
1) and (3) checking the validity: the checking on the function validity of the airborne network security software is realized by using the timestamp and the working state data checking; by using the check value, the integrity check of the timestamp and the working state data is realized; the airborne network security soft is checked for validity from two levels. (ii) a
2) And (3) real-time monitoring: through periodic inspection during operation, the airborne network service system can monitor the functional effectiveness of safety software running on the safety gateway in real time.
3) Easy to expand: the design method is designed mainly from the system architecture and adopts a Table (Table) mode, so that a new network security function module is easy to add or expand.
Drawings
Fig. 1 is an overall structure of the present invention.
FIG. 2 is a data model of the present invention.
Fig. 3 illustrates the operation of the present invention.
Detailed Description
An apparatus for monitoring the validity of an onboard network security software in real time, as shown in fig. 1, includes:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, the warning message is immediately sent to the outside.
As shown in FIG. 2, the runtime rule base data in the state storage area (105) is saved in a Table (Table) manner; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format;
the check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
A real-time monitoring method for validity of security software of an airborne network, as shown in fig. 3, includes:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
Examples
1. Framework assembly
The architecture composition is shown in fig. 1.
The internal components of the architecture include:
(1) network security software access control module (access control function module for short, 101): during operation, the access control function working state data is generated in each period, the corresponding timestamp data and the working state data in the working state data storage area (105) are updated, and the check value is calculated and updated.
(2) Network security software virtual private network function module (virtual private network function module for short, 102):
and during operation, the working state data of the virtual private network function is generated every period, the corresponding timestamp data and the working state data in the working state data storage area (105) are updated, and the check value is calculated and updated.
(3) Network security software intrusion prevention function module (intrusion prevention function module for short, 103): during operation, the working state data of the intrusion prevention function is generated and the working state data storage area is updated every period
(105) The corresponding time stamp data and the working state data in (1) calculate and update the check value.
(4) Network security software antivirus function module (abbreviated as antivirus function module, 104): and during operation, generating anti-virus function working state data every period, updating corresponding timestamp data and working state data in the working state data storage area (105), and calculating and updating a check value. .
(5) Working status data storage area (status storage area for short, 105): and storing the working state data of each functional module in the safety software in a specified data format in a memory.
(6) A network security software validity judgment module (validity judgment module for short, 106): during operation, reading the working state data of each functional module in the working state data storage area every period, and judging whether the corresponding functional module is valid or not by checking the timestamp and the check value; and integrating the working state data of each functional module into a safety software working state message, and sending the safety software working state message to the state monitoring module. And when the invalid module is detected, generating an alarm message and sending the alarm message to the state monitoring module.
(7) Network security software state monitoring module (state monitoring module for short, 107): sending safety software working state information every period when the safety software works; when the warning message is received, the warning message is immediately sent.
2. Data model
The data model is shown in FIG. 2 as an operating state data store.
The runtime rule base data is saved using a Table (Table) approach. Each memory area in the table is composed of a time stamp, operating state data and a check value. The table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like. If a new function module is added, the function module can be realized by adding a new line in the table.
The time stamp data is binary data, is stored by 64-bit integer, records the updating time, and has the time precision of millisecond.
The working state data is binary data, and the working state of the functional module is recorded according to a specified format.
The check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
3. Operating process
The specific operation process of the method is shown in fig. 3 and is described in terms of functional modules in stages.
Reporting the state of each network security function module:
(1) during operation, each network security function module (101, 102, 103, 104) checks whether a state reporting period is reached, if not, continues to execute other tasks, and if the state reporting period is reached, enters a state reporting flow.
(2) Each network security function module (101, 102, 103, 104) writes its own working state data into a corresponding data area in the state storage area (105).
(3) Each network security function module (101, 102, 103, 104) acquires the current time and updates the corresponding time stamp data.
(4) Each network security function module (101, 102, 103, 104) calculates a checksum according to the timestamp data and the working state data, and updates corresponding checksum data.
The state processing flow of the network security function validity judging module comprises the following steps:
(1) during operation, the validity judging module (106) periodically accesses the state storage area (105) and reads the time stamp data written by each functional module.
(2) And (3) the validity judging module (106) checks whether each timestamp data is updated, if so, the step (3) is executed, and if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (5) is executed.
(3) The validity judging module (106) reads the working state data of each network security function module from the state storage area (105).
(4) The validity judgment module (106) checks whether the check value corresponding to each network security function module is correct, and if not, marks the corresponding network security function module as an invalid state.
(5) And the validity judgment module (106) integrates the working state data of each network safety function module into a software state message.
(6) The validity judging module (106) reports the software state information to the state monitoring module (107).
(7) And the validity judgment module (106) checks whether the network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (8) is executed.
(8) The validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107).
The message sending process of the network security software state monitoring module comprises the following steps:
(1) the state monitoring module (107) sends out software state messages according to a specified period.
(2) The status monitoring module (107) immediately issues an alert message if it receives an alert message.
In the network security function of the C919 airborne information system, the method is adopted to realize the real-time monitoring of the effectiveness of the network security software.

Claims (3)

1. An airborne network security software validity real-time monitoring device, comprising:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, immediately sending the warning message to the outside;
the check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
2. The device for real-time monitoring of the effectiveness of the on-board network security software according to claim 1, wherein the run-time rule base data in the state storage area (105) is stored using a table format; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format.
3. A real-time monitoring method for the effectiveness of airborne network security software is characterized by comprising the following steps:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
CN201611140724.1A 2016-12-12 2016-12-12 Device and method for monitoring effectiveness of airborne network security software in real time Active CN106534185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611140724.1A CN106534185B (en) 2016-12-12 2016-12-12 Device and method for monitoring effectiveness of airborne network security software in real time

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611140724.1A CN106534185B (en) 2016-12-12 2016-12-12 Device and method for monitoring effectiveness of airborne network security software in real time

Publications (2)

Publication Number Publication Date
CN106534185A CN106534185A (en) 2017-03-22
CN106534185B true CN106534185B (en) 2019-12-24

Family

ID=58341833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611140724.1A Active CN106534185B (en) 2016-12-12 2016-12-12 Device and method for monitoring effectiveness of airborne network security software in real time

Country Status (1)

Country Link
CN (1) CN106534185B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107888561B (en) * 2017-10-13 2020-09-15 西安电子科技大学 Civil aircraft-oriented safety service combination system
CN112182566A (en) * 2020-09-10 2021-01-05 南京柏瑞斯特智能科技有限公司 Network security software system based on cloud computing
CN116389398B (en) * 2023-05-30 2023-10-20 阿里巴巴(中国)有限公司 Data access control method, vehicle control method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6883121B1 (en) * 2000-09-11 2005-04-19 Rockwell Collins Method and system for monitoring microprocessor integrity
CN101355455A (en) * 2008-09-12 2009-01-28 中兴通讯股份有限公司 Alarm system and method for service management platform
CN103597417A (en) * 2011-05-31 2014-02-19 空中客车营运有限公司 Method and device for condition monitoring
CN104184717A (en) * 2014-02-20 2014-12-03 西安未来国际信息股份有限公司 Virtual host safety protection system design

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6883121B1 (en) * 2000-09-11 2005-04-19 Rockwell Collins Method and system for monitoring microprocessor integrity
CN101355455A (en) * 2008-09-12 2009-01-28 中兴通讯股份有限公司 Alarm system and method for service management platform
CN103597417A (en) * 2011-05-31 2014-02-19 空中客车营运有限公司 Method and device for condition monitoring
CN104184717A (en) * 2014-02-20 2014-12-03 西安未来国际信息股份有限公司 Virtual host safety protection system design

Also Published As

Publication number Publication date
CN106534185A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106534185B (en) Device and method for monitoring effectiveness of airborne network security software in real time
CN105553965B (en) A kind of integrity protection system of airborne information security critical data and method
CN105556526A (en) Hierarchical threat intelligence
CN103378991A (en) Online service abnormity monitoring method and monitoring system thereof
CN107483438A (en) A kind of network security situation awareness early warning system and method based on big data
Marcu et al. IoT system for forest monitoring
CN113726780B (en) Network monitoring method and device based on situation awareness and electronic equipment
CN103888282A (en) Network intrusion alarm method and system based on nuclear power plant
CN113660296B (en) Method and device for detecting anti-attack performance of industrial control system and computer equipment
CN108259202A (en) A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN102402517A (en) Method and system for establishing normal database login model and method and system for detecting abnormal login behavior
US20190087571A1 (en) Method and system for detecting attacks on cyber-physical systems using redundant devices and smart contracts
CN105227559A (en) The information security management framework that a kind of automatic detection HTTP actively attacks
CN109450669B (en) Abnormity alarming method, device and computer storage medium
CN115576649A (en) Container operation safety detection method based on behavior monitoring
CN112650180B (en) Safety warning method, device, terminal equipment and storage medium
CN110737565A (en) data monitoring method, device, electronic equipment and storage medium
CN111897556B (en) Video monitoring service system based on cloud computing
US20180316700A1 (en) Data security inspection mechanism for serial networks
CN109587130B (en) Integrated operation support system based on RTI space-time consistency
CN104483943A (en) Environment monitoring system
Johnson Cybersafety: Cybersecurity and safety-critical software engineering
CN115333791A (en) Cloud-based vehicle safety protection method and related equipment
CN116032527A (en) Cloud computing-based data security vulnerability sensing system and method
CN104483942A (en) Monitoring system used for air environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant