CN106534185B - Device and method for monitoring effectiveness of airborne network security software in real time - Google Patents
Device and method for monitoring effectiveness of airborne network security software in real time Download PDFInfo
- Publication number
- CN106534185B CN106534185B CN201611140724.1A CN201611140724A CN106534185B CN 106534185 B CN106534185 B CN 106534185B CN 201611140724 A CN201611140724 A CN 201611140724A CN 106534185 B CN106534185 B CN 106534185B
- Authority
- CN
- China
- Prior art keywords
- function module
- module
- data
- storage area
- working state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to computer software-system application software, and relates to a device and a method for monitoring the effectiveness of airborne network security software in real time. The device comprises: the system comprises an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103), an anti-virus function module (104), a state storage area (105), an effectiveness judgment module (106) and a state monitoring module (107). The invention realizes the real-time monitoring of effectiveness by adopting real-time state collection, effectiveness logic judgment and message communication to the network security software during operation, and provides the capability of realizing the real-time monitoring of the effectiveness of the airborne network security software.
Description
Technical Field
The invention belongs to computer software-system application software, and relates to a device and a method for monitoring the effectiveness of airborne network security software in real time.
Background
With the large number of applications of information technology in civil avionics systems, in order to provide more and more convenient services to aircraft users (such as aircraft operators, pilots, maintenance personnel, etc.), an onboard network service system composed of different platforms and constructed by an ethernet network is introduced, so as to form an open environment with integrated air and ground. The Functional requirements of the onboard network service System for network Security (Security) are defined in ARINC821 (architecture Network Server System (NSS) Functional Definition). Because the airborne network service system not only exchanges data with the traditional avionics system with high security level, but also exchanges data with the cabin system with low security level and the aircraft external support system (such as a maintenance terminal, an information center and the like), a security gateway in the airborne network service system needs to complete the information security protection with high security level, and prevent the attack threat from the outside of the aircraft from influencing the security of the aircraft electronic system.
The security gateway is used as a key network security domain boundary protection component, and the improvement of the effectiveness monitoring capability of network security software used in the operation of the security gateway is one of key problems to be solved in the design of an airborne network service system.
Disclosure of Invention
The purpose of the invention is as follows:
the invention provides a device and a method for monitoring the effectiveness of airborne network security software in real time, which realize the effectiveness real-time monitoring by adopting real-time state collection, effectiveness logic judgment and message communication on the network security software during operation and provide the capability of realizing the real-time monitoring of the effectiveness of the airborne network security software.
The technical scheme of the invention is as follows:
an onboard network security software effectiveness real-time monitoring device, comprising:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, the warning message is immediately sent to the outside.
The check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
The runtime rule base data in the state storage area (105) is stored by using a Table (Table) mode; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format.
A real-time monitoring method for the effectiveness of airborne network security software comprises the following steps:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
The invention has the advantages and effects that:
the design can obtain the following beneficial effects in the use process:
1) and (3) checking the validity: the checking on the function validity of the airborne network security software is realized by using the timestamp and the working state data checking; by using the check value, the integrity check of the timestamp and the working state data is realized; the airborne network security soft is checked for validity from two levels. (ii) a
2) And (3) real-time monitoring: through periodic inspection during operation, the airborne network service system can monitor the functional effectiveness of safety software running on the safety gateway in real time.
3) Easy to expand: the design method is designed mainly from the system architecture and adopts a Table (Table) mode, so that a new network security function module is easy to add or expand.
Drawings
Fig. 1 is an overall structure of the present invention.
FIG. 2 is a data model of the present invention.
Fig. 3 illustrates the operation of the present invention.
Detailed Description
An apparatus for monitoring the validity of an onboard network security software in real time, as shown in fig. 1, includes:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, the warning message is immediately sent to the outside.
As shown in FIG. 2, the runtime rule base data in the state storage area (105) is saved in a Table (Table) manner; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format;
the check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
A real-time monitoring method for validity of security software of an airborne network, as shown in fig. 3, includes:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
Examples
1. Framework assembly
The architecture composition is shown in fig. 1.
The internal components of the architecture include:
(1) network security software access control module (access control function module for short, 101): during operation, the access control function working state data is generated in each period, the corresponding timestamp data and the working state data in the working state data storage area (105) are updated, and the check value is calculated and updated.
(2) Network security software virtual private network function module (virtual private network function module for short, 102):
and during operation, the working state data of the virtual private network function is generated every period, the corresponding timestamp data and the working state data in the working state data storage area (105) are updated, and the check value is calculated and updated.
(3) Network security software intrusion prevention function module (intrusion prevention function module for short, 103): during operation, the working state data of the intrusion prevention function is generated and the working state data storage area is updated every period
(105) The corresponding time stamp data and the working state data in (1) calculate and update the check value.
(4) Network security software antivirus function module (abbreviated as antivirus function module, 104): and during operation, generating anti-virus function working state data every period, updating corresponding timestamp data and working state data in the working state data storage area (105), and calculating and updating a check value. .
(5) Working status data storage area (status storage area for short, 105): and storing the working state data of each functional module in the safety software in a specified data format in a memory.
(6) A network security software validity judgment module (validity judgment module for short, 106): during operation, reading the working state data of each functional module in the working state data storage area every period, and judging whether the corresponding functional module is valid or not by checking the timestamp and the check value; and integrating the working state data of each functional module into a safety software working state message, and sending the safety software working state message to the state monitoring module. And when the invalid module is detected, generating an alarm message and sending the alarm message to the state monitoring module.
(7) Network security software state monitoring module (state monitoring module for short, 107): sending safety software working state information every period when the safety software works; when the warning message is received, the warning message is immediately sent.
2. Data model
The data model is shown in FIG. 2 as an operating state data store.
The runtime rule base data is saved using a Table (Table) approach. Each memory area in the table is composed of a time stamp, operating state data and a check value. The table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like. If a new function module is added, the function module can be realized by adding a new line in the table.
The time stamp data is binary data, is stored by 64-bit integer, records the updating time, and has the time precision of millisecond.
The working state data is binary data, and the working state of the functional module is recorded according to a specified format.
The check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
3. Operating process
The specific operation process of the method is shown in fig. 3 and is described in terms of functional modules in stages.
Reporting the state of each network security function module:
(1) during operation, each network security function module (101, 102, 103, 104) checks whether a state reporting period is reached, if not, continues to execute other tasks, and if the state reporting period is reached, enters a state reporting flow.
(2) Each network security function module (101, 102, 103, 104) writes its own working state data into a corresponding data area in the state storage area (105).
(3) Each network security function module (101, 102, 103, 104) acquires the current time and updates the corresponding time stamp data.
(4) Each network security function module (101, 102, 103, 104) calculates a checksum according to the timestamp data and the working state data, and updates corresponding checksum data.
The state processing flow of the network security function validity judging module comprises the following steps:
(1) during operation, the validity judging module (106) periodically accesses the state storage area (105) and reads the time stamp data written by each functional module.
(2) And (3) the validity judging module (106) checks whether each timestamp data is updated, if so, the step (3) is executed, and if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (5) is executed.
(3) The validity judging module (106) reads the working state data of each network security function module from the state storage area (105).
(4) The validity judgment module (106) checks whether the check value corresponding to each network security function module is correct, and if not, marks the corresponding network security function module as an invalid state.
(5) And the validity judgment module (106) integrates the working state data of each network safety function module into a software state message.
(6) The validity judging module (106) reports the software state information to the state monitoring module (107).
(7) And the validity judgment module (106) checks whether the network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (8) is executed.
(8) The validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107).
The message sending process of the network security software state monitoring module comprises the following steps:
(1) the state monitoring module (107) sends out software state messages according to a specified period.
(2) The status monitoring module (107) immediately issues an alert message if it receives an alert message.
In the network security function of the C919 airborne information system, the method is adopted to realize the real-time monitoring of the effectiveness of the network security software.
Claims (3)
1. An airborne network security software validity real-time monitoring device, comprising:
access control function module (101): during operation, generating access control function working state data per cycle, updating the timestamp data and the working state data of a storage area of the corresponding access control function module (101) in the state storage area (105), and calculating and updating a check value;
virtual private network function module (102): when the virtual private network function module runs, generating working state data of the virtual private network function each period, updating the timestamp data and the working state data of a storage area of the corresponding virtual private network function module (102) in the state storage area (105), and calculating and updating a check value;
intrusion prevention function (103): when the system runs, working state data of the intrusion prevention function are generated every period, timestamp data and working state data of a storage area of a corresponding intrusion prevention function module (103) in a state storage area (105) are updated, and a check value is calculated and updated;
anti-virus functional module (104): during operation, generating anti-virus function working state data every period, updating the timestamp data and the working state data of a storage area of the corresponding anti-virus function module (104) in the state storage area (105), and calculating and updating a check value;
state storage area (105): storing the working state data of each functional module in the safety software in a specified data format in a memory;
validity determination module (106): during operation, the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) in the state storage area (105) are read every period, and whether the corresponding function module is effective is judged by checking the timestamp and the check value; working state data of the comprehensive access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are converted into a safety software working state message and are sent to the state monitoring module (107); if an invalid module exists in the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104), generating an alarm message and sending the alarm message to a state monitoring module (107);
a condition monitoring module (107): when in operation, sending a safety software working state message to the outside every period; when receiving the warning message, immediately sending the warning message to the outside;
the check value is binary data, stored by a 32-bit integer, and the checksum value of the time stamp and the working state data is recorded by using a CRC32 check algorithm.
2. The device for real-time monitoring of the effectiveness of the on-board network security software according to claim 1, wherein the run-time rule base data in the state storage area (105) is stored using a table format; each storage area in the table consists of a timestamp, working state data and a check value; the table sequentially stores data of modules such as an access control function, a virtual private network function, an intrusion prevention function, an anti-virus function and the like; if a new functional module is added, the method can be realized by adding a new line in the table;
the time stamp data is binary data, is stored by a 64-bit integer, records the updating time, and has the time precision of millisecond;
the working state data is binary data, and the working state of the functional module is recorded according to a specified format.
3. A real-time monitoring method for the effectiveness of airborne network security software is characterized by comprising the following steps:
step 1, during operation, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) respectively check whether the module reaches a state reporting period, if not, other tasks are continuously executed, and if the module reaches the reporting period, the step 2 is entered;
step 2, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) write the self working state data into a storage area corresponding to the module in the state storage area (105);
step 3, the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) acquire the current time and update the timestamp data corresponding to the storage area of the module in the state storage area (105);
step 4, an access control function module (101), a virtual private network function module (102), an intrusion prevention function module (103) and an anti-virus function module (104) calculate a check value according to the timestamp data and the working state data, and update the check value corresponding to the storage area of the module in a state storage area (105);
step 5, during running, the validity judgment module (106) periodically accesses the state storage area (105) and reads the timestamp data written by the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104);
step 6, the validity judging module (106) checks whether the data of each timestamp is updated, if so, the step (7) is executed, if not, the network security function module corresponding to the timestamp is marked to be in an invalid state, and the step (9) is executed;
step 7, the validity judging module (106) reads the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) from the state storage area (105);
step 8, the validity judgment module (106) checks whether the check values corresponding to the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) are correct, and if the check values are incorrect, the corresponding network security function module is marked to be in an invalid state;
step 9, the validity judgment module (106) integrates the working state data of the access control function module (101), the virtual private network function module (102), the intrusion prevention function module (103) and the anti-virus function module (104) into a software state message;
step 10, the validity judging module (106) reports the software state information to the state monitoring module (107);
step 11, a validity judging module (106) checks whether a network security function module is in an invalid state, if not, the flow of the module is ended, and if so, the step (12) is executed;
step 12, the validity judgment module (106) generates an alarm message and reports the alarm message to the state monitoring module (107);
step 13, the state monitoring module (107) sends out a software state message to the outside according to a specified period;
and step 14, if the state monitoring module (107) receives the alarm message, immediately sending the alarm message to the outside.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611140724.1A CN106534185B (en) | 2016-12-12 | 2016-12-12 | Device and method for monitoring effectiveness of airborne network security software in real time |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611140724.1A CN106534185B (en) | 2016-12-12 | 2016-12-12 | Device and method for monitoring effectiveness of airborne network security software in real time |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534185A CN106534185A (en) | 2017-03-22 |
CN106534185B true CN106534185B (en) | 2019-12-24 |
Family
ID=58341833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611140724.1A Active CN106534185B (en) | 2016-12-12 | 2016-12-12 | Device and method for monitoring effectiveness of airborne network security software in real time |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534185B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107888561B (en) * | 2017-10-13 | 2020-09-15 | 西安电子科技大学 | Civil aircraft-oriented safety service combination system |
CN112182566A (en) * | 2020-09-10 | 2021-01-05 | 南京柏瑞斯特智能科技有限公司 | Network security software system based on cloud computing |
CN116389398B (en) * | 2023-05-30 | 2023-10-20 | 阿里巴巴(中国)有限公司 | Data access control method, vehicle control method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6883121B1 (en) * | 2000-09-11 | 2005-04-19 | Rockwell Collins | Method and system for monitoring microprocessor integrity |
CN101355455A (en) * | 2008-09-12 | 2009-01-28 | 中兴通讯股份有限公司 | Alarm system and method for service management platform |
CN103597417A (en) * | 2011-05-31 | 2014-02-19 | 空中客车营运有限公司 | Method and device for condition monitoring |
CN104184717A (en) * | 2014-02-20 | 2014-12-03 | 西安未来国际信息股份有限公司 | Virtual host safety protection system design |
-
2016
- 2016-12-12 CN CN201611140724.1A patent/CN106534185B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6883121B1 (en) * | 2000-09-11 | 2005-04-19 | Rockwell Collins | Method and system for monitoring microprocessor integrity |
CN101355455A (en) * | 2008-09-12 | 2009-01-28 | 中兴通讯股份有限公司 | Alarm system and method for service management platform |
CN103597417A (en) * | 2011-05-31 | 2014-02-19 | 空中客车营运有限公司 | Method and device for condition monitoring |
CN104184717A (en) * | 2014-02-20 | 2014-12-03 | 西安未来国际信息股份有限公司 | Virtual host safety protection system design |
Also Published As
Publication number | Publication date |
---|---|
CN106534185A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534185B (en) | Device and method for monitoring effectiveness of airborne network security software in real time | |
CN105553965B (en) | A kind of integrity protection system of airborne information security critical data and method | |
CN105556526A (en) | Hierarchical threat intelligence | |
CN103378991A (en) | Online service abnormity monitoring method and monitoring system thereof | |
CN107483438A (en) | A kind of network security situation awareness early warning system and method based on big data | |
Marcu et al. | IoT system for forest monitoring | |
CN113726780B (en) | Network monitoring method and device based on situation awareness and electronic equipment | |
CN103888282A (en) | Network intrusion alarm method and system based on nuclear power plant | |
CN113660296B (en) | Method and device for detecting anti-attack performance of industrial control system and computer equipment | |
CN108259202A (en) | A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems | |
CN102402517A (en) | Method and system for establishing normal database login model and method and system for detecting abnormal login behavior | |
US20190087571A1 (en) | Method and system for detecting attacks on cyber-physical systems using redundant devices and smart contracts | |
CN105227559A (en) | The information security management framework that a kind of automatic detection HTTP actively attacks | |
CN109450669B (en) | Abnormity alarming method, device and computer storage medium | |
CN115576649A (en) | Container operation safety detection method based on behavior monitoring | |
CN112650180B (en) | Safety warning method, device, terminal equipment and storage medium | |
CN110737565A (en) | data monitoring method, device, electronic equipment and storage medium | |
CN111897556B (en) | Video monitoring service system based on cloud computing | |
US20180316700A1 (en) | Data security inspection mechanism for serial networks | |
CN109587130B (en) | Integrated operation support system based on RTI space-time consistency | |
CN104483943A (en) | Environment monitoring system | |
Johnson | Cybersafety: Cybersecurity and safety-critical software engineering | |
CN115333791A (en) | Cloud-based vehicle safety protection method and related equipment | |
CN116032527A (en) | Cloud computing-based data security vulnerability sensing system and method | |
CN104483942A (en) | Monitoring system used for air environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |