CN111581642A - Internet safety protection system - Google Patents

Internet safety protection system Download PDF

Info

Publication number
CN111581642A
CN111581642A CN202010369492.7A CN202010369492A CN111581642A CN 111581642 A CN111581642 A CN 111581642A CN 202010369492 A CN202010369492 A CN 202010369492A CN 111581642 A CN111581642 A CN 111581642A
Authority
CN
China
Prior art keywords
data
communication
internet
protection
inlet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010369492.7A
Other languages
Chinese (zh)
Inventor
付贵龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010369492.7A priority Critical patent/CN111581642A/en
Publication of CN111581642A publication Critical patent/CN111581642A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an internet safety protection system which comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way mode, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, and the data access protection end comprises a firewall, an intrusion prevention system and a web application protection. The invention realizes the comprehensive security protection of the Internet, prevents the propagation of viruses, trojans or malicious attack software accompanied by file uploading or downloading, ensures the security of the Internet, and is suitable for the security protection of the Internet under big data.

Description

Internet safety protection system
Technical Field
The invention relates to the field of internet security, in particular to an internet security protection system.
Background
With the continuous development of the internet, the internet has come into various fields in people's lives and works, but the network has a great deal of development in terms of security and reliability.
Along with the development of the internet, various computer viruses, trojans, network attacks and other problems exist, the viruses and the trojans are easy to spread through the internet, and particularly when people upload, download or browse websites, along with the development of big data, the protection of network security does not only need to fight with the internet individually, but also is more suitable for jointly maintaining the security of the internet under the big data of the internet, so that the internet security protection system is provided.
Disclosure of Invention
The present invention is directed to an internet security system, which solves the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an internet safety protection system comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way manner, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, the internet is connected with the data processing, the outlet end of the internet is connected with the inlet end of the virus updating device, the data processing data protection end is connected with the inlet end of the information extraction device and the uploading device, and the data processing inlet, the system comprises an information extraction device, a data comparison device, a virus database, a processor, a feedback circuit, a virus updating device, a management port, a data access protection port and a data access protection port, wherein the information extraction device is connected with the information extraction device, the data comparison device is connected with the data access protection port, the data comparison device is connected with the feedback circuit, the virus database, the virus updating device and the data access protection port, the processor is connected with the data access protection port, the data access protection port is connected with the data access protection port, and the data access protection port is connected with.
As a further scheme of the invention: the data access protection end comprises a firewall, an intrusion prevention system and a web application protection system, and the outlet end of the firewall is connected with the inlet end of the intrusion prevention system.
As a still further scheme of the invention: the entrance end of the firewall is connected with the exit end of the network end.
As a still further scheme of the invention: the exit end of the web application protection system is connected with the entrance end of the local area network.
As a still further scheme of the invention: the management port is bidirectionally connected with a power supply.
As a still further scheme of the invention: the processor is connected with the communication module in a bidirectional mode.
As a still further scheme of the invention: the processor is connected with the management port in a bidirectional mode.
As a still further scheme of the invention: the management port is connected with the communication module in a two-way mode, the communication module is in a wireless communication mode, and the communication module further comprises a wireless communication receiver at the management port.
As a still further scheme of the invention: and the outlet end of the firewall is connected with the inlet end of the intrusion prevention system.
As a still further scheme of the invention: and the outlet end of the intrusion prevention system is connected with the inlet end of the web application protection system.
In order to achieve the above purpose, the invention also provides the following technical scheme:
a method for evaluating communication quality includes the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
Figure BDA0002477516630000031
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
Figure BDA0002477516630000041
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
Figure BDA0002477516630000042
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value range of ξ is between 0.3 and 0.4, and (5) the correlation degree is calculated by the following calculation formula:
Figure BDA0002477516630000043
wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result. Compared with the prior art, the invention has the beneficial effects that: the system is suitable for internet security protection under big data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic diagram of an Internet security system;
fig. 2 is a schematic structural diagram of a data protection terminal in an internet security protection system;
FIG. 3 is a schematic flow chart of a method for evaluating data communication quality in an Internet security protection system;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-2, in an embodiment of the present invention, an internet security protection system includes a network end, a data access protection end, and a local area network end, where an outlet of the network end is connected to an inlet of the data access protection end, an outlet of the data access protection end is connected to an inlet of the local area network end, the network end is connected to the local area network end in a bidirectional manner, the local area network end includes an uploading device, a downloading device, a processor, a management port, a power supply, and a communication module, the network end includes a data protection end, an internet, a data processing device, a virus updating device, and a virus database, the data protection end includes an information extraction device, a data comparison device, and a feedback circuit, the internet is connected to the data processing device in a bidirectional manner, and the internet outlet end includes a virus updating device, the data processing device is used for processing data processing, the data protection end is used for carrying out security monitoring on data processed in data processing, the data processing is bidirectionally connected with the data protection end, the data processing outlet end is connected with the inlet end of the information extraction device and the inlet end of the uploading device, the data processing inlet end is connected with the outlet end of the feedback circuit and the outlet end of the downloading device, the information extraction device is used for extracting information uploaded or downloaded in the data processing, the outlet end of the information extraction device is connected with the inlet end of the data comparison device, the inlet end of the data comparison device is connected with the outlet end of the virus database, the outlet end of the data comparison device is connected with the inlet end of the feedback circuit and the inlet end of the virus database, the data comparison device compares the data information uploaded or downloaded in the information extraction device with the virus data in the virus database and transmits the security of the uploaded or downloaded data to the feedback circuit, processing data, if the data has potential safety hazards such as viruses or trojans, the data processing stores the viruses and the trojans of uploaded or downloaded data into a virus database through a data comparison device, the inlet end of the virus database is connected with the outlet end of a virus updating device, the virus updating outlet end of the virus database is connected with the outlet end of the internet, so that the information of the virus database is updated in real time, the safety of the uploaded or downloaded data is improved, the inlet end of a processor is connected with the outlet end of a downloading device, the outlet end of a feedback circuit, the inlet end of a management port and the outlet end of a data access protection end, the processor transmits the data which needs to be uploaded or downloaded by the management port to the uploading device or the downloading device, receives the safety information of the uploaded or downloaded data transmitted by the feedback circuit, the processor transmits the safety information of the data to the management port, and the management port performs secondary operation selection on the uploaded, the utility model discloses a wireless communication system, including treater exit end connection management port entrance point and communication module entrance point, treater both way junction communication module, management port both way junction communication module, communication module is the wireless communication mode, and communication module still includes the wireless communication receiver of management port department, manages the port both way junction power, and whether the management port can select to think immediately to close the power according to the condition, stops data transmission, prevents the invasion of virus or Trojan.
Example 2
Referring to fig. 1, in an embodiment of the present invention, based on embodiment 1, the data access protection end includes a firewall, an intrusion prevention system, and a web application protection system, where an inlet end of the firewall is connected to an outlet end of a network end, an outlet end of the firewall is connected to an inlet end of the intrusion prevention system, an outlet end of the intrusion prevention system is connected to an inlet end of the web application protection system, an outlet end of the web application protection system is connected to an inlet end of a local network end, the firewall is used for scanning a port, and simultaneously prevents a disguised virus or a trojan horse from entering the local network system to perform real-time access protection, the intrusion prevention system is used for blocking a fixed-feature attack, and the web application protection system is used for controlling blocking parameter tampering, cross-site scripting, SQL injection, and Cookie.
Example 3
In order to achieve the above object, on the basis of the embodiments 1-2, the present invention further provides the following technical solutions:
a method for evaluating communication quality includes the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
Figure BDA0002477516630000081
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
Figure BDA0002477516630000082
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
Figure BDA0002477516630000083
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value of ξ is expressed as a resolution coefficient, and the value range is between 0.3 and 0.4;
(5) and calculating the correlation degree, wherein the calculation formula is as follows:
Figure BDA0002477516630000091
wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result. It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. An internet safety protection system comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way manner, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, the internet is connected with the data processing device in a two-way manner, the outlet end of the internet is connected with the inlet end of the virus updating device, the data processing device is connected with the data protection, the data processing inlet end is connected with a feedback circuit outlet end and a downloading device outlet end, the information extraction device outlet end is connected with a data comparison device inlet end, the data comparison device inlet end is connected with a virus database outlet end, the data comparison device outlet end is connected with a feedback circuit inlet end and a virus database inlet end, the virus database inlet end is connected with a virus updating device outlet end, the virus updating inlet end is connected with an internet outlet end, and the processor inlet end is connected with a downloading device outlet end, a feedback circuit outlet end, a management port inlet end and a data access protection end outlet end.
2. The internet security protection system of claim 1, wherein the data access protection end comprises a firewall, an intrusion prevention system and a web application protection system, and an exit end of the firewall is connected with an entrance end of the intrusion prevention system.
3. The internet security system of claim 2, wherein the ingress port of the firewall is connected to the egress port of the network.
4. The internet security system of claim 2, wherein the web application protection system egress port is connected to the local area network ingress port.
5. The internet security system of claim 1, wherein the management port is bi-directionally coupled to the power source.
6. The internet security system of claim 1, wherein the processor is bi-directionally coupled to the communication module.
7. The internet security system of claim 1, wherein the processor is bi-directionally coupled to the management port.
8. The internet security system of claim 1, wherein the management port is bi-directionally coupled to the communication module, the communication module is a wireless communication module, and the communication module further comprises a wireless communication receiver at the management port.
9. The internet security system of claim 2, wherein the firewall outlet is connected to an intrusion prevention system inlet, and the intrusion prevention system outlet is connected to a web application protection system inlet.
10. An assessment method for communication quality implemented by using the internet security protection system of any one of claims 1 to 9, wherein the assessment method for communication quality comprises the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
Figure FDA0002477516620000031
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
Figure FDA0002477516620000032
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
Figure FDA0002477516620000041
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value of ξ is expressed as a resolution coefficient, and the value range is between 0.3 and 0.4;
(5) and calculating the correlation degree, wherein the calculation formula is as follows:
Figure FDA0002477516620000042
wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result.
CN202010369492.7A 2020-05-03 2020-05-03 Internet safety protection system Pending CN111581642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010369492.7A CN111581642A (en) 2020-05-03 2020-05-03 Internet safety protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010369492.7A CN111581642A (en) 2020-05-03 2020-05-03 Internet safety protection system

Publications (1)

Publication Number Publication Date
CN111581642A true CN111581642A (en) 2020-08-25

Family

ID=72111929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010369492.7A Pending CN111581642A (en) 2020-05-03 2020-05-03 Internet safety protection system

Country Status (1)

Country Link
CN (1) CN111581642A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333205A (en) * 2020-12-22 2021-02-05 河北鸿联九五信息产业有限公司 Network security monitoring system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080091135A1 (en) * 2006-10-17 2008-04-17 Ruxandra Draghia-Akli Electroporation devices and methods of using same for electroporation of cells in mammals
CN105847296A (en) * 2016-05-19 2016-08-10 拖洪华 Network security isolation device
CN105847291A (en) * 2016-05-13 2016-08-10 内蒙古工业大学 Computer network defense decision system
CN205809871U (en) * 2016-06-15 2016-12-14 衢州圣荣电子科技有限公司 A kind of internet security guard system
CN106899998A (en) * 2017-03-16 2017-06-27 北京汇通金财信息科技有限公司 A kind of network communication method and device
CN108076030A (en) * 2016-11-14 2018-05-25 北京视联动力国际信息技术有限公司 A kind of visual scheduling system and method for regarding networking
CN108647854A (en) * 2018-04-04 2018-10-12 中国电力科学研究院有限公司 A kind of method and system of determining electric transmission network running quality
CN108701265A (en) * 2016-03-14 2018-10-23 欧姆龙株式会社 Learning Service provides device
CN108809739A (en) * 2018-08-30 2018-11-13 中山市厚源电子科技有限公司 A kind of internet security guard system
CN110912768A (en) * 2019-11-01 2020-03-24 海南大学 Grey correlation and fuzzy evaluation method and system for multi-path transmission network performance

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080091135A1 (en) * 2006-10-17 2008-04-17 Ruxandra Draghia-Akli Electroporation devices and methods of using same for electroporation of cells in mammals
CN108701265A (en) * 2016-03-14 2018-10-23 欧姆龙株式会社 Learning Service provides device
CN105847291A (en) * 2016-05-13 2016-08-10 内蒙古工业大学 Computer network defense decision system
CN105847296A (en) * 2016-05-19 2016-08-10 拖洪华 Network security isolation device
CN205809871U (en) * 2016-06-15 2016-12-14 衢州圣荣电子科技有限公司 A kind of internet security guard system
CN108076030A (en) * 2016-11-14 2018-05-25 北京视联动力国际信息技术有限公司 A kind of visual scheduling system and method for regarding networking
CN106899998A (en) * 2017-03-16 2017-06-27 北京汇通金财信息科技有限公司 A kind of network communication method and device
CN108647854A (en) * 2018-04-04 2018-10-12 中国电力科学研究院有限公司 A kind of method and system of determining electric transmission network running quality
CN108809739A (en) * 2018-08-30 2018-11-13 中山市厚源电子科技有限公司 A kind of internet security guard system
CN110912768A (en) * 2019-11-01 2020-03-24 海南大学 Grey correlation and fuzzy evaluation method and system for multi-path transmission network performance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周洋 等: "采用灰色关联分析法的舰艇超短波通信效能评估研究", 《舰船电子工程》, vol. 38, no. 01, 20 January 2018 (2018-01-20), pages 108 - 111 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333205A (en) * 2020-12-22 2021-02-05 河北鸿联九五信息产业有限公司 Network security monitoring system
CN112333205B (en) * 2020-12-22 2022-11-25 河北鸿联九五信息产业有限公司 Network security monitoring system

Similar Documents

Publication Publication Date Title
US20210273957A1 (en) Cyber security for software-as-a-service factoring risk
US20240064168A1 (en) Incorporating software-as-a-service data into a cyber threat defense system
US20210360027A1 (en) Cyber Security for Instant Messaging Across Platforms
CN107454109B (en) Network privacy stealing behavior detection method based on HTTP traffic analysis
US10277614B2 (en) Information processing apparatus, method for determining activity and computer-readable medium
US20220225101A1 (en) Ai cybersecurity system monitoring wireless data transmissions
Bortolameotti et al. Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
CN101370008B (en) System for real-time intrusion detection of SQL injection WEB attacks
US8468599B2 (en) System and method for privacy-enhanced cyber data fusion using temporal-behavioral aggregation and analysis
US20160366169A1 (en) Systems, methods, and media for detecting network anomalies
US20200389485A1 (en) Systems and methods for automatically selecting an access control entity to mitigate attack traffic
CN106534114A (en) Big-data-analysis-based anti-malicious attack system
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
Sun et al. Network security technology of intelligent information terminal based on mobile internet of things
Yamada et al. Intrusion detection for encrypted web accesses
KR101250899B1 (en) Apparatus for detecting and preventing application layer distribute denial of service attack and method
Lim et al. Network anomaly detection system: The state of art of network behaviour analysis
CN111581642A (en) Internet safety protection system
Saganowski et al. DWT‐based anomaly detection method for cyber security of wireless sensor networks
Jiang et al. Networked Device Identification: A Survey
Balasubramanian et al. Sos-ws host shield: a sketch-based service oriented shield against web application business layer ids attacks
CN112437085B (en) Network attack identification method and device
US20230328081A1 (en) System and methods for automatic detection of distributed attacks in iot devices using decentralized deep learning
CN112311813B (en) Network attack identification method and device
Usuzaki et al. A proposal of highly responsive distributed Denial-of-Service attacks detection using Real-Time burst detection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 344100 group 2, Chengfang village, Dagang Town, Linchuan District, Fuzhou City, Jiangxi Province

Applicant after: Fu Guilong

Address before: 510275 Zhongshan University, 135 West Xingang Road, Guangdong, Guangzhou

Applicant before: Fu Guilong

CB02 Change of applicant information