CN111832027A - Network intrusion safety early warning system based on cloud computing - Google Patents
Network intrusion safety early warning system based on cloud computing Download PDFInfo
- Publication number
- CN111832027A CN111832027A CN202010607595.2A CN202010607595A CN111832027A CN 111832027 A CN111832027 A CN 111832027A CN 202010607595 A CN202010607595 A CN 202010607595A CN 111832027 A CN111832027 A CN 111832027A
- Authority
- CN
- China
- Prior art keywords
- module
- early warning
- monitoring
- safety
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 claims abstract description 14
- 238000012544 monitoring process Methods 0.000 claims description 61
- 230000004044 response Effects 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 8
- 230000002155 anti-virotic effect Effects 0.000 claims description 8
- 241000700605 Viruses Species 0.000 claims description 7
- 238000001914 filtration Methods 0.000 claims description 7
- 238000010606 normalization Methods 0.000 claims description 5
- 238000011156 evaluation Methods 0.000 claims description 4
- 238000005206 flow analysis Methods 0.000 claims description 4
- 230000008447 perception Effects 0.000 claims description 4
- 238000012502 risk assessment Methods 0.000 claims description 4
- 238000004140 cleaning Methods 0.000 claims description 3
- 238000002955 isolation Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 210000000056 organ Anatomy 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a network intrusion safety early warning system based on cloud computing, which comprises: the cloud computing center comprises a safety early warning module and a safety guarantee module, the safety early warning module is used for extracting and discovering network intrusion and special time, the safety guarantee module is used for protecting network safety, and the safety early warning module comprises a display module, a core processing module, a data acquisition module and an equipment management module. According to the invention, the safety early warning module and the safety guarantee module are added in the cloud computing center to improve the safety of the cloud computing center, meanwhile, the data computing processing program is decomposed into countless small programs through the cloud computing, then, the small programs are processed and analyzed through a system consisting of a plurality of servers to obtain results and return the results to the user, the operation effect is greatly improved on the basis of the original hardware facilities, and the safety is improved.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a network intrusion security early warning system based on cloud computing.
Background
Cloud computing (cloud computing) is one type of distributed computing, and means that a huge data computing processing program is decomposed into countless small programs through a network "cloud", and then the small programs are processed and analyzed through a system consisting of a plurality of servers to obtain results and are returned to a user. In the early stage of cloud computing, simple distributed computing is adopted, task distribution is solved, and computing results are merged. Thus, cloud computing is also known as grid computing. By the technology, tens of thousands of data can be processed in a short time (several seconds), so that strong network service is achieved.
At present, the cloud service is not just distributed computing, but a result of hybrid evolution and leap of computer technologies such as distributed computing, utility computing, load balancing, parallel computing, network storage, hot backup redundancy, virtualization and the like.
At present, the processing capacity of the existing network intrusion safety early warning system is insufficient, more advanced hardware facilities are needed to improve the performance, but the investment cost is high, and the computing capacity improving effect is poor. For this reason, a new scheme needs to be designed to give improvements.
Disclosure of Invention
The invention aims to provide a network intrusion safety early warning system based on cloud computing, which improves the safety of a cloud computing center by adding a safety early warning module and a safety guarantee module in the cloud computing center, decomposes a data computing processing program into countless small programs by the cloud computing, processes and analyzes the small programs by a system consisting of a plurality of servers to obtain results and returns the results to a user, thereby greatly improving the operation effect of the system on the basis of the original hardware facilities, improving the safety and meeting the actual use requirements.
In order to achieve the purpose, the invention provides the following technical scheme: a network intrusion security early warning system based on cloud computing comprises: the cloud computing center comprises a safety early warning module and a safety guarantee module, wherein the safety early warning module is used for extracting and discovering network intrusion and occurrence of special time, the safety guarantee module is used for protecting network safety, the safety early warning module comprises a display module, a core processing module, a data acquisition module and an equipment management module, the safety guarantee module comprises a network infrastructure and a data protection module, the network infrastructure comprises a safety access gateway, an intrusion protection system and a safety isolation gateway, the data protection module comprises a firewall, a network cipher machine, an antivirus gateway, an intrusion detection system and a comprehensive safety gateway, the intrusion detection system and the intrusion protection system are connected, and the safety access gateway is connected with the antivirus gateway and the comprehensive safety gateway, the display module comprises an external network monitoring and early warning center, an internet monitoring and early warning center, an information system monitoring and early warning center and a website early warning and monitoring center, the core processing module comprises an information storage library, a security policy library, a system interface module and an emergency response system, the information storage library, the security policy library, the system interface module and the emergency response system are all connected with the security monitoring module, a situation perception module, a flow monitoring module, a website evaluation module, a type analysis module, a flow analysis module, a risk analysis module, a virus monitoring module, an event monitoring module, an illegal monitoring module and the early warning and response module, the data acquisition module comprises a data search engine, the data search engine comprises a normalization engine, a merging engine, a filtering engine and an analysis engine, and the normalization engine, the merging engine, the filtering engine and the analysis engine are all connected with a flow cleaning system, The system comprises a virus monitoring system, a vulnerability monitoring system, a honeypot monitoring system, a BGP route monitoring system, a website monitoring system and a botnet monitoring system, wherein the equipment management module comprises a database, network equipment, basic equipment and an application system.
As a preferred embodiment of the present invention, the intrusion detection system includes an event database, the time database is connected to the event analyzer, the event analyzer is connected to the user behavior acquisition module and the intrusion event, the intrusion event is connected to the response unit, and the user behavior acquisition module is connected to the event generator.
As a preferred embodiment of the present invention, the extranet monitoring and early warning center, the internet monitoring and early warning center, the information system monitoring and early warning center, and the website early warning and monitoring center are all connected to the supervision event, the operation and maintenance module, the security event module, and the audit module.
As a preferred embodiment of the present invention, the violation monitoring module and the early warning response module are both connected to an external buzzer and an external warning light.
In a preferred embodiment of the present invention, the database includes network resources and computing resources, the network resources are obtained from the internet, and the computing resources are obtained from the resources collected by the data collection module.
As a preferred embodiment of the present invention, the base device includes a server and a storage device, the server includes a resident server and a standby server, and the storage device includes a hardware storage and a cloud storage.
In a preferred embodiment of the present invention, the application system includes an operating system and a communication system, the operating system may be one of a microsoft operating system, an IOS operating system or a LINUX operating system, and the communication system includes wired communication and wireless communication.
Compared with the prior art, the invention has the following beneficial effects:
(1) according to the invention, the safety early warning module and the safety guarantee module are added in the cloud computing center to improve the safety of the cloud computing center, meanwhile, the data computing processing program is decomposed into countless small programs through the cloud computing, then, the small programs are processed and analyzed through a system consisting of a plurality of servers to obtain results and return the results to the user, the operation effect is greatly improved on the basis of the original hardware facilities, and the safety is improved.
(2) The security guarantee module comprises a data protection module and a network infrastructure, and the data protection module comprises a firewall, a network cipher machine, an anti-virus gateway, an intrusion detection system and a comprehensive security gateway, so that the security of the network is greatly improved.
(3) According to the invention, the display module, the core processing module, the data acquisition module and the equipment management module are arranged in the safety early warning module, so that the network invasion condition and the occurrence condition of special events can be found in time, and early warning alarm is given out, so that the safety protection capability is improved, and the timeliness is high.
Drawings
FIG. 1 is a schematic overall flow diagram of the present invention;
FIG. 2 is a schematic flow diagram of a display module of the present invention;
FIG. 3 is a schematic flow diagram of a security module of the present invention;
FIG. 4 is a schematic flow chart of an intrusion detection system according to the present invention;
FIG. 5 is a flow diagram of a core processing module according to the present invention;
FIG. 6 is a schematic flow diagram of a data acquisition module according to the present invention;
FIG. 7 is a diagram of a device management process according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-6, the present invention provides a technical solution: a network intrusion security early warning system based on cloud computing comprises: the cloud computing center comprises a safety early warning module and a safety guarantee module, wherein the safety early warning module is used for extracting and discovering network intrusion and special time, the safety guarantee module is used for protecting network safety, the safety early warning module comprises a display module, a core processing module, a data acquisition module and an equipment management module, the safety guarantee module comprises a network infrastructure and a data protection module, the network infrastructure comprises a safety access gateway, an intrusion protection system and a safety isolation gateway, the data protection module comprises a firewall, a network cipher machine, an antivirus gateway, an intrusion detection system and a comprehensive safety gateway, the intrusion detection system and the intrusion protection system are connected, and the firewall in the data protection module can be one of a strong five-fire-proof wall, an ultra five-fire-proof wall or a fine five-fire-proof wall, the data protection capability of the firewall is increased, the anti-virus gateway, the integrated security gateway and the security access gateway are adopted at the same time, the security of the gateway is increased, the security access gateway is connected with the anti-virus gateway and the integrated security gateway, the display module comprises an extranet monitoring and early warning center, an internet monitoring and early warning center, an information system monitoring and early warning center and a website early warning and monitoring center, the system security can be monitored in real time through the extranet monitoring and early warning center, the internet monitoring and early warning center, the information system monitoring and early warning center and the website early warning and monitoring center in the display module, an information storage library, a security policy library, a system interface module and an emergency response system are arranged in the core processing module, the information storage library, the security policy library, the system interface module and the emergency response system are all connected with the security monitoring module, The system comprises a situation perception module, a flow monitoring module, a website evaluation module, a type analysis module, a flow analysis module, a risk analysis module, a virus monitoring module, an event monitoring module, an illegal monitoring module and an early warning response module, wherein an information storage library, a security policy library, a system interface module and an emergency response system are connected with the security monitoring module, the situation perception module, the flow monitoring module, the website evaluation module, the type analysis module, the flow analysis module, the risk analysis module, the virus monitoring module, the event monitoring module, the illegal monitoring module and the early warning response module, the arrangement of the information storage library, the security policy library, the system interface module and the emergency response module can be monitored in multiple aspects, the monitoring range is increased, and an alarm can be given out in time, a data search engine is arranged in a data acquisition module and comprises a normalization engine, a merging engine, a filtering engine and, The merging engine, the filtering engine and the analyzing engine are all connected with the flow cleaning system, the virus monitoring system, the vulnerability monitoring system, the honeypot monitoring system, the BGP route monitoring system, the website monitoring system and the botnet monitoring system, the data search engine comprises the normalizing engine, the merging engine, the filtering engine and the analyzing engine which can ensure the uniformity, effectiveness and safety of data acquisition, and the equipment management module comprises a database, network equipment, basic equipment and an application system.
Further improved, as shown in fig. 4: the intrusion detection system comprises an event database, wherein the time database is connected with an event analyzer, the event analyzer is connected with a user behavior acquisition module and an intrusion event, the intrusion event is connected with a response unit, the user behavior acquisition module is connected with an event generator, and the intrusion detection system can find the intrusion event in time and respond in time through the response unit.
Further improved, as shown in fig. 5: violation monitoring module and early warning response module all are connected with outside bee calling organ and warning light, in time remind outside personnel to notice through bee calling organ and warning light.
Further improved, as shown in fig. 6: the database comprises network resources and computing resources, the network resources are acquired by the internet, and the computing resources are acquired by the data acquisition module.
Further improved, as shown in fig. 7: the basic device comprises a server and a storage device, the server comprises a resident server and a standby server, and the storage device comprises hardware storage and cloud storage.
Further improved, as shown in fig. 7: the application system comprises an operating system and a communication system, wherein the operating system can be one of a Microsoft operating system, an IOS operating system or a LINUX operating system, and the communication system comprises wired communication and wireless communication.
The invention installs a first motor 23 in a vertical support rod 7, drives a first screw rod 24 to rotate through the first motor 23 so as to enable a first slide block 25 on the surface of the first screw rod 24 to move up and down, thereby driving a transverse support rod 11 on the side surface of the first slide block 25 to move up and down, the transverse support rod 11 is internally provided with a second motor 26, drives a second screw rod 27 to rotate through the second motor 26 so as to enable a second slide block 28 on the surface of a second screw rod 27 to move horizontally, thereby enabling the second slide block 28 to drive a control box 14 on the lower part of the second slide block to move, increasing the moving range of the control box 14, facilitating adjustment, installing a camera 15 in a mounting rack 16 on the lower part of the control box 14 for shooting and tracking of vehicles against regulations, installing a main control board 37 in the control box 6 and installing a central controller 38 on the surface of the main control board 37 for data processing, recording video monitoring information by a, a connecting disc 8 is arranged on the upper part of the vertical supporting rod 7, a driving motor 9 is arranged on the upper part of the connecting disc 8, the driving motor 9 is started to drive the third screw 31 to rotate, so that the movable block 32 on the surface of the third screw 31 moves up and down, meanwhile, the first rotating shaft 33, the adjusting rod 34 and the second rotating shaft 35 which are arranged on the side surface of the movable block 32 are fixed with the mounting plate 36, the movable shaft 30 which is arranged on the top of the side surface fixing rod 29 is fixed with the mounting plate 36, when the movable block 32 moves up and down, the adjusting rod 34 drives the mounting plate 36 to turn over, so that the inclination angle is adjusted, the solar energy is conveniently absorbed, the data analysis and processing module connected with the central controller 38 comprises a license plate tracking module, a license plate recognition module and a traffic track extraction module, the vehicle information and the information of the pedestrians of the violation vehicles can be obtained, the processing is convenient, and meanwhile, the data is sent to a data center for processing through a data receiving module and a data sending module.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (7)
1. A network intrusion safety early warning system based on cloud computing is characterized in that: the method comprises the following steps: the cloud computing center comprises a safety early warning module and a safety guarantee module, wherein the safety early warning module is used for extracting and discovering network intrusion and occurrence of special time, the safety guarantee module is used for protecting network safety, the safety early warning module comprises a display module, a core processing module, a data acquisition module and an equipment management module, the safety guarantee module comprises a network infrastructure and a data protection module, the network infrastructure comprises a safety access gateway, an intrusion protection system and a safety isolation gateway, the data protection module comprises a firewall, a network cipher machine, an antivirus gateway, an intrusion detection system and a comprehensive safety gateway, the intrusion detection system and the intrusion protection system are connected, and the safety access gateway is connected with the antivirus gateway and the comprehensive safety gateway, the display module comprises an external network monitoring and early warning center, an internet monitoring and early warning center, an information system monitoring and early warning center and a website early warning and monitoring center, the core processing module comprises an information storage library, a security policy library, a system interface module and an emergency response system, the information storage library, the security policy library, the system interface module and the emergency response system are all connected with the security monitoring module, a situation perception module, a flow monitoring module, a website evaluation module, a type analysis module, a flow analysis module, a risk analysis module, a virus monitoring module, an event monitoring module, an illegal monitoring module and the early warning and response module, the data acquisition module comprises a data search engine, the data search engine comprises a normalization engine, a merging engine, a filtering engine and an analysis engine, and the normalization engine, the merging engine, the filtering engine and the analysis engine are all connected with a flow cleaning system, The system comprises a virus monitoring system, a vulnerability monitoring system, a honeypot monitoring system, a BGP route monitoring system, a website monitoring system and a botnet monitoring system, wherein the equipment management module comprises a database, network equipment, basic equipment and an application system.
2. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: the intrusion detection system comprises an event database, the time database is connected with an event analyzer, the event analyzer is connected with a user behavior acquisition module and an intrusion event, the intrusion event is connected with a response unit, and the user behavior acquisition module is connected with an event generator.
3. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: the extranet monitoring and early warning center, the internet monitoring and early warning center, the information system monitoring and early warning center and the website early warning and monitoring center are all connected with the supervision event module, the operation and maintenance module, the safety event module and the auditing module.
4. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: and the violation monitoring module and the early warning response module are connected with an external buzzer and an external warning lamp.
5. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: the database comprises network resources and computing resources, the network resources are acquired by the internet, and the computing resources are acquired by the data acquisition module.
6. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: the basic device comprises a server and a storage device, the server comprises a resident server and a standby server, and the storage device comprises hardware storage and cloud storage.
7. The cloud computing-based network intrusion security early warning system according to claim 1, wherein: the application system comprises an operating system and a communication system, wherein the operating system can be one of a Microsoft operating system, an IOS operating system or a LINUX operating system, and the communication system comprises wired communication and wireless communication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010607595.2A CN111832027A (en) | 2020-06-29 | 2020-06-29 | Network intrusion safety early warning system based on cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010607595.2A CN111832027A (en) | 2020-06-29 | 2020-06-29 | Network intrusion safety early warning system based on cloud computing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111832027A true CN111832027A (en) | 2020-10-27 |
Family
ID=72900650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010607595.2A Pending CN111832027A (en) | 2020-06-29 | 2020-06-29 | Network intrusion safety early warning system based on cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111832027A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333205A (en) * | 2020-12-22 | 2021-02-05 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
CN112433808A (en) * | 2020-11-03 | 2021-03-02 | 深圳市永达电子信息股份有限公司 | Network security event detection system and method based on grid computing |
CN112887270A (en) * | 2021-01-08 | 2021-06-01 | 天目数据(福建)科技有限公司 | Malicious traffic intrusion analysis early warning device based on network security |
CN114265832A (en) * | 2021-12-24 | 2022-04-01 | 深圳市盘古数据有限公司 | Multifunctional database maintenance management system |
CN114397988A (en) * | 2022-01-19 | 2022-04-26 | 京东方科技集团股份有限公司 | Display method, device, system, electronic equipment and medium of safety analysis data |
CN115208641A (en) * | 2022-06-27 | 2022-10-18 | 陕西恒简网络科技有限公司 | Software method based on safe operation of Internet data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7493659B1 (en) * | 2002-03-05 | 2009-02-17 | Mcafee, Inc. | Network intrusion detection and analysis system and method |
US20160050225A1 (en) * | 2014-08-13 | 2016-02-18 | Honeywell International Inc. | Analyzing cyber-security risks in an industrial control environment |
CN105553957A (en) * | 2015-12-09 | 2016-05-04 | 国家电网公司 | Network safety situation awareness early-warning method and system based big data |
CN106656987A (en) * | 2016-11-03 | 2017-05-10 | 郑州理工职业学院 | Computer information security management system |
CN107483438A (en) * | 2017-08-15 | 2017-12-15 | 山东华诺网络科技有限公司 | A kind of network security situation awareness early warning system and method based on big data |
CN108418831A (en) * | 2018-03-26 | 2018-08-17 | 河南大学 | A kind of network safety pre-warning method towards cloud computing |
CN109474607A (en) * | 2018-12-06 | 2019-03-15 | 连云港杰瑞深软科技有限公司 | A kind of industrial control network safeguard protection monitoring system |
CN110113301A (en) * | 2019-03-20 | 2019-08-09 | 合肥名德光电科技股份有限公司 | A kind of intruding detection system based on cloud computing |
-
2020
- 2020-06-29 CN CN202010607595.2A patent/CN111832027A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7493659B1 (en) * | 2002-03-05 | 2009-02-17 | Mcafee, Inc. | Network intrusion detection and analysis system and method |
US20160050225A1 (en) * | 2014-08-13 | 2016-02-18 | Honeywell International Inc. | Analyzing cyber-security risks in an industrial control environment |
CN105553957A (en) * | 2015-12-09 | 2016-05-04 | 国家电网公司 | Network safety situation awareness early-warning method and system based big data |
CN106656987A (en) * | 2016-11-03 | 2017-05-10 | 郑州理工职业学院 | Computer information security management system |
CN107483438A (en) * | 2017-08-15 | 2017-12-15 | 山东华诺网络科技有限公司 | A kind of network security situation awareness early warning system and method based on big data |
CN108418831A (en) * | 2018-03-26 | 2018-08-17 | 河南大学 | A kind of network safety pre-warning method towards cloud computing |
CN109474607A (en) * | 2018-12-06 | 2019-03-15 | 连云港杰瑞深软科技有限公司 | A kind of industrial control network safeguard protection monitoring system |
CN110113301A (en) * | 2019-03-20 | 2019-08-09 | 合肥名德光电科技股份有限公司 | A kind of intruding detection system based on cloud computing |
Non-Patent Citations (2)
Title |
---|
周丽: "全媒体监管平台网络安全预警系统的设计", 《广播与电视技术》 * |
董煜 等: "基于专网的移动警务安全保障系统设计与研究" * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112433808A (en) * | 2020-11-03 | 2021-03-02 | 深圳市永达电子信息股份有限公司 | Network security event detection system and method based on grid computing |
CN112333205A (en) * | 2020-12-22 | 2021-02-05 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
CN112333205B (en) * | 2020-12-22 | 2022-11-25 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
CN112887270A (en) * | 2021-01-08 | 2021-06-01 | 天目数据(福建)科技有限公司 | Malicious traffic intrusion analysis early warning device based on network security |
CN112887270B (en) * | 2021-01-08 | 2023-04-18 | 天目数据(福建)科技有限公司 | Malicious traffic intrusion analysis early warning device based on network security |
CN114265832A (en) * | 2021-12-24 | 2022-04-01 | 深圳市盘古数据有限公司 | Multifunctional database maintenance management system |
CN114397988A (en) * | 2022-01-19 | 2022-04-26 | 京东方科技集团股份有限公司 | Display method, device, system, electronic equipment and medium of safety analysis data |
CN115208641A (en) * | 2022-06-27 | 2022-10-18 | 陕西恒简网络科技有限公司 | Software method based on safe operation of Internet data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111832027A (en) | Network intrusion safety early warning system based on cloud computing | |
CN114584405B (en) | Electric power terminal safety protection method and system | |
CN103685575B (en) | A kind of web portal security monitoring method based on cloud framework | |
CN108512841B (en) | Intelligent defense system and method based on machine learning | |
CN106205143A (en) | Intelligent bayonet networked system | |
CN109583711B (en) | Safety risk assessment overall process management system | |
CN101668012B (en) | Method and device for detecting security event | |
CN112766672A (en) | Network security guarantee method and system based on comprehensive evaluation | |
CN111476685B (en) | Behavior analysis method, device and equipment | |
CN113660267B (en) | Botnet detection system, method and storage medium for IoT environment | |
KR20160087187A (en) | Cyber blackbox system and method thereof | |
US11836247B2 (en) | Detecting malicious behavior in a network using security analytics by analyzing process interaction ratios | |
CN113536304A (en) | Operation and maintenance audit system-based bypassing prevention method and equipment | |
CN108665241A (en) | A kind of mobile video analysis system towards police criminal detection | |
CN114826786B (en) | Highway charge auditing system | |
CN1196296C (en) | Easy-to-expand network invasion detecting and safety auditing system | |
CN114493339A (en) | Power grid information safety early warning system based on data feature extraction | |
CN115567258A (en) | Network security situation awareness method, system, electronic device and storage medium | |
KR100799558B1 (en) | Apparatus and method for tracking harmful file in P2P network | |
CN112688929A (en) | Sharing system based on internet threat information | |
CN113691498A (en) | Electric power internet of things terminal safety state evaluation method and device and storage medium | |
CN112217791A (en) | Network security situation sensing system based on video monitoring data center | |
CN206946235U (en) | A kind of integrated environment monitoring host computer | |
CN110661339A (en) | Method for monitoring running state of monitoring host of transformer substation | |
KR20200054495A (en) | Method for security operation service and apparatus therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201027 |