CN109818831A - A kind of system data dynamic monitoring device and method across private network based on DMZ - Google Patents

A kind of system data dynamic monitoring device and method across private network based on DMZ Download PDF

Info

Publication number
CN109818831A
CN109818831A CN201910164453.0A CN201910164453A CN109818831A CN 109818831 A CN109818831 A CN 109818831A CN 201910164453 A CN201910164453 A CN 201910164453A CN 109818831 A CN109818831 A CN 109818831A
Authority
CN
China
Prior art keywords
dimensional code
dmz
module
data
concerning security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910164453.0A
Other languages
Chinese (zh)
Inventor
王玉新
郑春香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN201910164453.0A priority Critical patent/CN109818831A/en
Publication of CN109818831A publication Critical patent/CN109818831A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of system data dynamic monitoring device and method across private network based on DMZ, belongs to computer application technology.The system data dynamic monitoring device across private network based on DMZ of the invention includes automatic data collection module, two-dimensional code generation module, DMZ transmission module and BI research and application module, the automatic data collection module, two-dimensional code generation module are arranged in non-concerning security matters network system, BI research and application module is arranged in concerning security matters network system, and non-concerning security matters network system is connected with concerning security matters network system by DMZ transmission module.The system data dynamic monitoring device information transmitting across private network based on DMZ of the invention is more convenient, safer, and frame performance is high, redundancy ability is strong, portable strong, has good application value.

Description

A kind of system data dynamic monitoring device and method across private network based on DMZ
Technical field
The present invention relates to computer application technologies, and it is dynamic specifically to provide a kind of system data across private network based on DMZ State monitoring device and method.
Background technique
With the continuous development of society, social economy is constantly progressive, and there has also been significant progresses for each enterprise.In view of certain Enterprise has highly confidential requirement, and the system or data for being related to enterprise's concerning security matters must be in classified network, the systems or number of non-concerning security matters According to absolute physical isolation can be belonged between intranet and extranet in outer net, " hand can only be passed through between outer net system and Intranet system Work is imprinted CDs " mode carry out data transmitting, have significant limitation.
Summary of the invention
Technical assignment of the invention is in view of the above problems, to provide a kind of information transmitting more convenient, safer, frame Frame performance is high, redundancy ability is strong, portable strong, the system across private network based on DMZ especially suitable for monitoring the field of early warning Data dynamic monitoring device.
The further technical assignment of the present invention is to provide one kind data information between two systems in the case where being physically isolated network System data dynamic monitoring and controlling method across private network of the single problem of the problem and Early-warning Model of transmitting based on DMZ.
To achieve the above object, the present invention provides the following technical scheme that
A kind of system data dynamic monitoring device across private network based on DMZ, the device include automatic data collection module, Two-dimensional code generation module, DMZ transmission module and BI research and application module, the automatic data collection module, two dimensional code generate mould Block be arranged in non-concerning security matters network system, BI research and application module be arranged in concerning security matters network system, non-concerning security matters network system with Concerning security matters network system is connected by DMZ transmission module;Automatic data collection module is used for the non-concerning security matters network system of automatic collection In data file, two-dimensional code generation module is used for the Generating Data File two dimensional code that will acquire, and passes through DMZ transmission module general The two dimensional code of generation is transmitted to BI research and application module, and BI research and application module is used to identify data file to two dimensional code, and It is analyzed.
The batch data that non-concerning security matters network system chooses needs to transmit generates two dimensional code, and shows on an interface Come, concerning security matters network system is waited to be scanned.Concerning security matters network system will do it automatically scanning identification two dimensional code and be converted to document, It by file information storage into concerning security matters network system, is analyzed by BI research and application module, while utilizing mobile communication skill Art linkage surveillance.In addition, it is whether normal by BI research and application module monitors data, it is automatic to issue early warning to monitoring some of the staff Prompting message, and decision scheme is provided according to big data analysis, assist dispatch control.
A safety area is constructed between non-concerning security matters network system and concerning security matters network system by DMZ transmission module, Form the subnet of a filtering.Network topology independently can be established in the region DMZ according to service to be offered and security strategy, It realizes that concerning security matters network and private network directly play secure communication, calculating is made to data in time by artificial intelligence, ensures early warning timeliness And accuracy.The dynamic on-line monitoring to internet system data may be implemented in the device, and is analyzed according to data training and AI, Early-warning Model is generated, early warning is done to ambient conditions, improves ability to supervise.And data transmitting is more convenient, safer.
Preferably, the device further includes scan module, scan module is arranged in concerning security matters network system, non-for scanning The two dimensional code generated in concerning security matters network system, and two dimensional code is transferred to BI research and application module.
Scan module uses scanner in the present invention, scans the two dimensional code in concerning security matters network system, will store in two dimensional code Information identify and pass to non-concerning security matters network system.
Detailed process are as follows:
1) it clicks and starts to scan, start the scanning oracle listener of service.
2) scanner scans a code, increases by one automatically in table and is about to information and shows.
3) after document is scanned, the record in table is selected, clicks and generates document, by Auto-matching and improves document letter Breath, is saved in database.
Preferably, the device further includes encrypting module, for adding to the two dimensional code that two-dimensional code generation module generates It is close.
Preferably, the encrypting module is SM2 encryption.
A kind of system data dynamic monitoring and controlling method across private network based on DMZ, this method specifically includes the following steps:
S1, data acquisition, data file to be passed in non-concerning security matters network system is acquired by automatic data collection module;
S2, two dimensional code generate, and generate two dimensional code according to the data of automatic data collection module acquisition;
The two dimensional code that non-concerning security matters network system generates is transferred to concerning security matters network system by S3, DMZ transmission;
S4, data analysis, analyze the two dimensional code transmitted from non-concerning security matters network system by BI research and application module.
Preferably, by collected data, automatically generating two using nonlinear algorithm when two dimensional code generates in step S2 Code is tieed up, and includes signature identity information in two dimensional code.
Preferably, encrypting to the two dimensional code of generation, being encrypted using SM2 after step S2 two dimensional code generates.
Preferably, by DMZ secure network, identification is first carried out, by reliable identity when DMZ is transmitted in step S3 The compressed data that certification is sent is transmitted.
Preferably, being handled by BI when data are analyzed in step S4 and carrying out authentication, two dimensional code identification, pass through BI Analysis carries out AI intellectual analysis and big data analysis using convolutional neural networks and genetic algorithm.
Using the advanced intelligence AI algorithm of industry, have parameter learning and adjustment function, it is quasi- to step up monitoring judgement True rate.Based on current existing model training data, the training of convolutional neural networks is carried out, wherein the model of convolutional neural networks is set Meter uses for reference aster-RCNN, YOLO, SSD, mask rcnn domestic and international forward position deep learning algorithm structure at present, for enterprise's number According to scene and business demand, distinctive algorithm model structure is designed.In order to promote pre-alert notification speed and precision, convolutional Neural net The entire algorithm framework of network sufficiently uses domestic and international leading model compression, Model Parameter Optimization strategy at present, it is ensured that accuracy On the basis of, pre-warning time is reduced, reaction speed is improved.Convolutional neural networks bottom frame uses caffe, caffe2, The frames such as tensorflow, mxnet, but cost is reduced in order to promote the speed of service, convolutional neural networks engine is devised, is based on The network structure of design carries out frame optimization, is further reduced detection time.
Preferably, step S4 before analyzing data, is scanned the two dimensional code generated in non-concerning security matters network system, The two dimensional code scanned is transferred to BI research and application module and carries out data analysis.
Compared with prior art, the system data dynamic monitoring device and method tool across private network of the invention based on DMZ Have it is following prominent the utility model has the advantages that
Detailed description of the invention
Fig. 1 is the topological diagram of the system data dynamic monitoring device across private network of the present invention based on DMZ.
Specific embodiment
Below in conjunction with drawings and examples, the system data dynamic monitoring across private network of the invention based on DMZ is filled It sets and method is described in further detail.
Embodiment
As shown in Figure 1, the system data dynamic monitoring device across private network of the invention based on DMZ, including data are automatic Acquisition module, two-dimensional code generation module, DMZ transmission module, BI research and application module, scan module and encrypting module.
Automatic data collection module, two-dimensional code generation module are arranged in non-concerning security matters network system, BI research and application module It is arranged in concerning security matters network system, non-concerning security matters network system is connected with concerning security matters network system by DMZ transmission module.Data are certainly Dynamic acquisition module is used for the number that will be acquired for the data file in the non-concerning security matters network system of automatic collection, two-dimensional code generation module The two dimensional code of generation is transmitted to BI research and application module, BI analysis prison according to file generated two dimensional code, and by DMZ transmission module Module is surveyed for identifying data file to two dimensional code, and is analyzed.Scan module is arranged in concerning security matters network system, is used for The two dimensional code generated in non-concerning security matters network system is scanned, and two dimensional code is transferred to BI research and application module.It is scanned in the present invention Module uses scanner, scans the two dimensional code in concerning security matters network system, the information stored in two dimensional code is identified and is passed to Non- concerning security matters network system.The two dimensional code that encrypting module is used to generate two-dimensional code generation module encrypts, and encrypting module uses SM2 is encrypted.
The batch data that non-concerning security matters network system chooses needs to transmit generates two dimensional code, and shows on an interface Come, concerning security matters network system is waited to be scanned.Concerning security matters network system will do it automatically scanning identification two dimensional code and be converted to document, It by file information storage into concerning security matters network system, is analyzed by BI research and application module, while utilizing mobile communication skill Art linkage surveillance.In addition, it is whether normal by BI research and application module monitors data, it is automatic to issue early warning to monitoring some of the staff Prompting message, and decision scheme is provided according to big data analysis, assist dispatch control.
A safety area is constructed between non-concerning security matters network system and concerning security matters network system by DMZ transmission module, Form the subnet of a filtering.Network topology independently can be established in the region DMZ according to service to be offered and security strategy, It realizes that concerning security matters network and private network directly play secure communication, calculating is made to data in time by artificial intelligence, ensures early warning timeliness And accuracy.The dynamic on-line monitoring to internet system data may be implemented in the device, and is analyzed according to data training and AI, Early-warning Model is generated, early warning is done to ambient conditions, improves ability to supervise.And data transmitting is more convenient, safer.
A kind of system data dynamic monitoring and controlling method across private network based on DMZ of the invention, this method specifically includes following Step:
S1, data acquisition, data file to be passed in non-concerning security matters network system is acquired by automatic data collection module.
S2, two dimensional code generate, and generate two dimensional code according to the data of automatic data collection module acquisition.
When two dimensional code generates, by collected data, two dimensional code, and packet in two dimensional code are automatically generated using nonlinear algorithm Include signature identity information.After two dimensional code generates, the two dimensional code of generation is encrypted, is encrypted using SM2.
Detailed process are as follows:
1) it clicks and starts to scan, start the scanning oracle listener of service.
2) scanner scans a code, increases by one automatically in table and is about to information and shows.
3) after document is scanned, the record in table is selected, clicks and generates document, by Auto-matching and improves document letter Breath, is saved in database.
The two dimensional code that non-concerning security matters network system generates is transferred to concerning security matters network system by S3, DMZ transmission.
When DMZ is transmitted, by DMZ secure network, identification is first carried out, the compressed data that reliable authentication is sent It is transmitted.
S4, data analysis, analyze the two dimensional code transmitted from non-concerning security matters network system by BI research and application module.
When data are analyzed, is handled by BI and carry out authentication, two dimensional code identification, analyzed by BI, utilize convolutional Neural Network and genetic algorithm carry out AI intellectual analysis and big data analysis.Before data analysis, to being generated in non-concerning security matters network system Two dimensional code be scanned, by the two dimensional code scanned be transferred to BI research and application module carry out data analysis.
Specific process code are as follows:
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.

Claims (10)

1. a kind of system data dynamic monitoring device across private network based on DMZ, it is characterised in that: the device includes that data are automatic Acquisition module, two-dimensional code generation module, DMZ transmission module and BI research and application module, the automatic data collection module, two dimension Code generation module is arranged in non-concerning security matters network system, and BI research and application module is arranged in concerning security matters network system, non-classified network Network system is connected with concerning security matters network system by DMZ transmission module;Automatic data collection module is used for the non-concerning security matters of automatic collection Data file in network system, two-dimensional code generation module is used for the Generating Data File two dimensional code that will be acquired, and is passed by DMZ The two dimensional code of generation is transmitted to BI research and application module by defeated module, and BI research and application module is for identifying data to two dimensional code File, and analyzed.
2. the system data dynamic monitoring device across private network according to claim 1 based on DMZ, it is characterised in that: should Device further includes scan module, and scan module is arranged in concerning security matters network system, generates for scanning in non-concerning security matters network system Two dimensional code, and two dimensional code is transferred to BI research and application module.
3. the system data dynamic monitoring device across private network according to claim 1 or 2 based on DMZ, it is characterised in that: The device further includes encrypting module, for encrypting to the two dimensional code that two-dimensional code generation module generates.
4. the system data dynamic monitoring device across private network according to claim 3 based on DMZ, it is characterised in that: institute Encrypting module is stated as SM2 encryption.
5. a kind of system data dynamic monitoring and controlling method across private network based on DMZ, it is characterised in that: this method specifically includes following Step:
S1, data acquisition, data file to be passed in non-concerning security matters network system is acquired by automatic data collection module;
S2, two dimensional code generate, and generate two dimensional code according to the data of automatic data collection module acquisition;
The two dimensional code that non-concerning security matters network system generates is transferred to concerning security matters network system by S3, DMZ transmission;
S4, data analysis, analyze the two dimensional code transmitted from non-concerning security matters network system by BI research and application module.
6. the system data dynamic monitoring and controlling method across private network according to claim 5 based on DMZ, it is characterised in that: step When two dimensional code generates in rapid S2, by collected data, two dimensional code is automatically generated using nonlinear algorithm, and include in two dimensional code Signature identity information.
7. the system data dynamic monitoring and controlling method across private network according to claim 5 or 6 based on DMZ, it is characterised in that: After step S2 two dimensional code generates, the two dimensional code of generation is encrypted, is encrypted using SM2.
8. the system data dynamic monitoring and controlling method across private network according to claim 7 based on DMZ, it is characterised in that: step In rapid S3 when DMZ transmission, by DMZ secure network, first carry out identification, the compressed data that reliable authentication is sent into Row transmission.
9. the system data dynamic monitoring and controlling method across private network according to claim 8 based on DMZ, it is characterised in that: step In rapid S4 when data analysis, is handled by BI and carry out authentication, two dimensional code identification, analyzed by BI, utilize convolutional Neural net Network and genetic algorithm carry out AI intellectual analysis and big data analysis.
10. the system data dynamic monitoring and controlling method across private network according to claim 9 based on DMZ, it is characterised in that: step Rapid S4 is scanned the two dimensional code generated in non-concerning security matters network system before analyzing data, and the two dimensional code scanned is passed It is defeated by BI research and application module and carries out data analysis.
CN201910164453.0A 2019-03-05 2019-03-05 A kind of system data dynamic monitoring device and method across private network based on DMZ Pending CN109818831A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910164453.0A CN109818831A (en) 2019-03-05 2019-03-05 A kind of system data dynamic monitoring device and method across private network based on DMZ

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910164453.0A CN109818831A (en) 2019-03-05 2019-03-05 A kind of system data dynamic monitoring device and method across private network based on DMZ

Publications (1)

Publication Number Publication Date
CN109818831A true CN109818831A (en) 2019-05-28

Family

ID=66608110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910164453.0A Pending CN109818831A (en) 2019-03-05 2019-03-05 A kind of system data dynamic monitoring device and method across private network based on DMZ

Country Status (1)

Country Link
CN (1) CN109818831A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111769996A (en) * 2020-09-02 2020-10-13 江苏达科云数据科技有限公司 Equipment monitoring method applied to complex network environment
CN112422510A (en) * 2020-10-22 2021-02-26 山东浪潮通软信息科技有限公司 Data transmission method and system based on DMZ zone
CN112926069A (en) * 2021-03-01 2021-06-08 安徽商信政通信息技术股份有限公司 Non-physical contact lossless interaction method and system for confidential data of government affair system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697180A (en) * 2009-11-06 2010-04-21 深圳市优特普科技有限公司 Computer data communication isolation management system and data monitoring method
CN103268644A (en) * 2013-05-09 2013-08-28 国家电网公司 Communication equipment inspection system
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
CN104484695A (en) * 2014-11-24 2015-04-01 贺州市公安局 Two-dimensional code data cross-network transmitting platform
EP3206368A1 (en) * 2016-02-10 2017-08-16 Accenture Global Solutions Limited Telemetry analysis system for physical process anomaly detection
CN107517142A (en) * 2017-10-10 2017-12-26 朱汉源 A kind of system and method that remote maintenance is realized by Quick Response Code
CN108520193A (en) * 2018-03-27 2018-09-11 康体佳智能科技(深圳)有限公司 Quick Response Code identifying system based on neural network and recognition methods
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697180A (en) * 2009-11-06 2010-04-21 深圳市优特普科技有限公司 Computer data communication isolation management system and data monitoring method
CN103268644A (en) * 2013-05-09 2013-08-28 国家电网公司 Communication equipment inspection system
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
CN104484695A (en) * 2014-11-24 2015-04-01 贺州市公安局 Two-dimensional code data cross-network transmitting platform
EP3206368A1 (en) * 2016-02-10 2017-08-16 Accenture Global Solutions Limited Telemetry analysis system for physical process anomaly detection
CN107517142A (en) * 2017-10-10 2017-12-26 朱汉源 A kind of system and method that remote maintenance is realized by Quick Response Code
CN108520193A (en) * 2018-03-27 2018-09-11 康体佳智能科技(深圳)有限公司 Quick Response Code identifying system based on neural network and recognition methods
CN109254955A (en) * 2018-09-27 2019-01-22 贵州华云创谷科技有限公司 Unidirectional file is ferried method and system between a kind of separation net based on two dimensional code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
廖楷炜等: "公安信息网与互联网数据双向安全交换研究", 《广东公安科技》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111769996A (en) * 2020-09-02 2020-10-13 江苏达科云数据科技有限公司 Equipment monitoring method applied to complex network environment
CN112422510A (en) * 2020-10-22 2021-02-26 山东浪潮通软信息科技有限公司 Data transmission method and system based on DMZ zone
CN112926069A (en) * 2021-03-01 2021-06-08 安徽商信政通信息技术股份有限公司 Non-physical contact lossless interaction method and system for confidential data of government affair system

Similar Documents

Publication Publication Date Title
CN108428141B (en) Food traceability information management system based on ERP system and block chain
CN109818831A (en) A kind of system data dynamic monitoring device and method across private network based on DMZ
CN113536376B (en) Enterprise financial data security management system and method thereof
CN111404914A (en) Ubiquitous power Internet of things terminal safety protection method under specific attack scene
CN107911370A (en) A kind of data ciphering method and device, data decryption method and device
CN114140082B (en) Enterprise content management system
CN112804348B (en) Method for judging repeatability of reported data of edge computing node by cloud monitoring center
CN108881203A (en) Data managing method, electronic equipment, storage medium and system based on block chain
CN111046415A (en) Intelligent grading early warning system and method for confidential files
CN113160604A (en) Bus management method and system based on artificial intelligence
CN112613006A (en) Power data sharing method and device, electronic equipment and storage medium
CN112688822A (en) Edge computing fault or security threat monitoring system and method based on multi-point cooperation
CN111092960A (en) Distributed data acquisition system and operation method thereof
CN109495514A (en) Mutual role help system and method based on edge termination
CN116383786A (en) Big data information supervision system and method based on Internet of things
CN113660080B (en) Safe multi-party calculation and federal analysis technology
CN116208340A (en) Trusted data flow platform system method based on privacy calculation and blockchain
CN115189966A (en) Block chain private data encryption and decryption service system
CN107491503A (en) A kind of multifunctional client information management system
CN114579961A (en) Sensitive data identification method based on multi-industry detection rules and related device
CN110933025A (en) Multi-source heterogeneous data cross-domain synchronous shared storage method, device, equipment and medium
CN113378222A (en) File encryption method and system based on data content identification
CN112347491A (en) Method for endogenous data secure interaction of double-middlebox double-chain architecture
Shi et al. Privacy protection and intrusion detection system of wireless sensor network based on artificial neural network
CN111127261A (en) Intellectual property service platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190528