CN112528200A - Website background safety management and control method and system - Google Patents

Website background safety management and control method and system Download PDF

Info

Publication number
CN112528200A
CN112528200A CN202011454138.0A CN202011454138A CN112528200A CN 112528200 A CN112528200 A CN 112528200A CN 202011454138 A CN202011454138 A CN 202011454138A CN 112528200 A CN112528200 A CN 112528200A
Authority
CN
China
Prior art keywords
data
real
network node
abnormal
isolation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011454138.0A
Other languages
Chinese (zh)
Inventor
陈威
吴晨
任育锋
李燕妮
李哲敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Information Institute of CAAS
Original Assignee
Agricultural Information Institute of CAAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Information Institute of CAAS filed Critical Agricultural Information Institute of CAAS
Priority to CN202011454138.0A priority Critical patent/CN112528200A/en
Publication of CN112528200A publication Critical patent/CN112528200A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a website background safety management and control method and a website background safety management and control system. The method comprises the steps of obtaining real-time operation data of each network node; backing up the real-time operation data and storing the backed-up real-time operation data; judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; if the abnormal fragments exist, performing data isolation on the network nodes corresponding to the abnormal fragments, repairing or removing the abnormal fragments after the data isolation, continuously judging until the real-time running data after the backup of the network nodes do not have the abnormal fragments causing the network security loopholes, and removing the data isolation from the network nodes; if not, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data, and continuing monitoring. The invention can not affect the normal operation of the network node, and can also improve the analysis efficiency and the accuracy of the analysis result.

Description

Website background safety management and control method and system
Technical Field
The invention relates to the technical field of network security, in particular to a website background security management and control method and a website background security management and control system.
Background
With the development of computer technology and the popularization of internet technology, more and more people join the internet and become netizens. Network security, which generally refers to the security of computer networks, may actually also refer to the security of computer communication networks. Once the website background is abnormally controlled, the operation of the website background cannot be effectively guaranteed, huge loss and inconvenience are caused, the efficiency of data calling and analyzing is low, and the accuracy is poor. And this may cause the abnormal network node to still operate, and its data may contaminate other network nodes, resulting in a larger area of vulnerability abnormalities. Therefore, it is desirable to provide a method or system for website background security management and control to solve the above-mentioned problems in the background art.
Disclosure of Invention
The invention aims to provide a website background safety management and control method and a website background safety management and control system, which can not only not influence the normal operation of network nodes, but also improve the analysis efficiency and the accuracy of analysis results.
In order to achieve the purpose, the invention provides the following scheme:
a website background safety management and control method comprises the following steps:
acquiring real-time operation data of each network node;
backing up the real-time operation data of each network node, and storing the backed-up real-time operation data;
judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; the abnormal fragment is data with sensitive words, data with viruses, a program with BUG or data with difference from normal real-time running data;
if the abnormal fragments exist, performing data isolation on the network nodes corresponding to the abnormal fragments, repairing or removing the abnormal fragments after the data isolation, returning to the step of judging whether the abnormal fragments causing the network security vulnerability exist in the backed-up real-time running data until the abnormal fragments causing the network security vulnerability do not exist in the backed-up real-time running data of the network nodes, and removing the data isolation from the network nodes;
if not, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data, and continuing monitoring.
Optionally, the acquiring real-time operation data of each network node specifically includes:
acquiring a connection application instruction of a network node to be connected;
judging whether the connection application instruction is consistent with verification data of the network node to be connected;
if the network nodes are consistent, acquiring real-time operation data of the network nodes to be connected;
and if not, returning to the step of obtaining the connection application instruction of the network node to be connected.
Optionally, the backing up the real-time operation data of each network node, and storing the backed-up real-time operation data specifically includes:
traversing the backed-up real-time running data, and storing the current path of the backed-up real-time running data;
covering the current path with the path stored last time;
and storing the directory, the file information and the data blocks of the backed-up real-time running data according to the current path.
Optionally, the determining whether an abnormal segment causing a network security vulnerability exists in the backed-up real-time operating data of each network node further includes:
determining an abnormal point according to the network node corresponding to the abnormal segment;
and determining a safety point according to the network node corresponding to the abnormal segment.
Optionally, if the abnormal segment exists, performing data isolation on the network node corresponding to the abnormal segment, repairing or removing the abnormal segment after data isolation, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data until the abnormal segment causing the network security vulnerability does not exist in the backed-up real-time running data of the network node, and removing the data isolation from the network node, specifically including:
setting an isolation rule and an isolation time for the network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
A website background security management and control system comprises:
the real-time operation data acquisition module is used for acquiring real-time operation data of each network node;
the real-time operation data backup storage module is used for backing up the real-time operation data of each network node and storing the backed-up real-time operation data;
the judging module is used for judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; the abnormal fragment is data with sensitive words, data with viruses, a program with BUG or data with difference from normal real-time running data;
the data isolation and data isolation release module is used for carrying out data isolation on the network node corresponding to the abnormal segment if the abnormal segment exists, repairing or removing the abnormal segment after the data isolation, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data until the abnormal segment causing the network security vulnerability does not exist in the backed-up real-time running data of the network node, and releasing the data isolation on the network node;
and the continuous monitoring module is used for returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data if the abnormal segment does not exist, and continuously monitoring.
Optionally, the real-time operation data acquiring module specifically includes:
a connection application instruction acquisition unit, configured to acquire a connection application instruction of a network node to be connected;
the judging unit is used for judging whether the connection application instruction is consistent with the verification data of the network node to be connected;
the real-time operation data acquisition unit is used for acquiring the real-time operation data of the network node to be connected if the real-time operation data is consistent with the real-time operation data of the network node to be connected;
and the connection application instruction reacquiring unit is used for returning to the step of acquiring the connection application instruction of the network node to be connected if the connection application instruction reacquires the network node to be connected.
Optionally, the real-time running data backup storage module specifically includes:
the current path storage unit is used for traversing the backed-up real-time running data and storing the current path of the backed-up real-time running data;
the path covering unit is used for covering the current path with the path saved last time;
and the real-time operation data backup storage unit is used for storing the directory, the file information and the data blocks of the backed-up real-time operation data according to the current path.
Optionally, the method further includes:
the abnormal point determining module is used for determining the abnormal point according to the network node corresponding to the abnormal segment;
and the safety point determining module is used for determining the safety point according to the network node corresponding to the abnormal segment.
Optionally, the data isolation and data isolation release module specifically includes:
an isolation rule and isolation time setting unit, configured to set an isolation rule and isolation time for a network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the website background safety control method and system provided by the invention, the data of the network node is backed up, and the backup data is called for analysis, so that the normal operation of the network node is not influenced, the backup data and new data can be prevented from being mixed, and the analysis efficiency and the accuracy of an analysis result are improved; after the abnormal segment is found, the data isolation is carried out on the network node to which the abnormal segment belongs, so that the operation of the network node can be limited, and the data of the network node is prevented from polluting other network nodes to cause bug abnormity in a larger area.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a schematic flow chart of a website background security management method according to the present invention;
fig. 2 is a schematic structural view of a website background security management and control system provided in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a website background safety management and control method and a website background safety management and control system, which can not only not influence the normal operation of network nodes, but also improve the analysis efficiency and the accuracy of analysis results.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic flow chart of a website background security management and control method provided by the present invention, and as shown in fig. 1, the website background security management and control method provided by the present invention includes:
s101, acquiring real-time operation data of each network node. Real-time operational data includes data received, communicated, or generated by a network node during operation.
S101 specifically comprises the following steps:
and acquiring a connection application instruction of the network node to be connected.
Judging whether the connection application instruction is consistent with verification data of the network node to be connected;
and if the network nodes are consistent, acquiring the real-time operation data of the network nodes to be connected.
And if not, returning to the step of obtaining the connection application instruction of the network node to be connected.
And S102, backing up the real-time operation data of each network node, and storing the backed-up real-time operation data.
S102 specifically comprises the following steps:
and traversing the backed-up real-time running data, and storing the current path of the backed-up real-time running data.
And covering the current path with the path saved last time.
And storing the directory, the file information and the data blocks of the backed-up real-time running data according to the current path.
S103, judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; the abnormal segments are data with sensitive words, data with viruses, programs with BUG or data with differences from normal real-time running data.
After S103, further comprising:
and determining an abnormal point according to the network node corresponding to the abnormal segment.
And determining a safety point according to the network node corresponding to the abnormal segment.
And S104, if the abnormal fragments exist, performing data isolation on the network nodes corresponding to the abnormal fragments, repairing or removing the abnormal fragments after the data isolation, returning to the step of judging whether the abnormal fragments causing the network security vulnerability exist in the backed-up real-time running data until the abnormal fragments causing the network security vulnerability do not exist in the backed-up real-time running data of the network nodes, and removing the data isolation from the network nodes.
In order to limit the operation of the network node, and prevent the data from polluting other network nodes and causing a larger area of vulnerability anomaly, S104 specifically includes:
setting an isolation rule and an isolation time for the network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
And S105, if the abnormal segment does not exist, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data, and continuing monitoring.
As a specific embodiment, the website background includes a data acquisition module, a storage module, an analysis module, a central processing module, a repair module, a key module, a verification module, and a scanning module, and based on the above modules, the specific process of performing the website background security management and control method provided by the present invention is as follows:
s1: and sending a connection application to the network node, backing up the data of the network node, and storing the backed-up data in a storage module in real time.
S2: and then, calling the data backed up in the storage module, and analyzing the data through an analysis module, wherein an evaluation program is arranged in the analysis module and is used for evaluating the network security situation.
S3: and after the evaluation program finds out abnormal segments which possibly cause the network security loopholes in the data, performing data isolation on the network nodes to which the abnormal segments belong through a tracking processing program built in the central processing module.
S4: and then repairing or eliminating the abnormal segments through a repairing module, and then repeating the step S2 until the data has no abnormal segments causing the network security loophole, and then removing the data isolation of the corresponding network nodes.
Specifically, in step S1, the data collection module sends a connection request to the network node, and when the connection request is consistent with the data stored in the key module of the network node, the verification module of the network node passes the verification, and the data collection module is allowed to connect to the network node.
Specifically, in step S1, after the data of the network node is collected by the data collection module, the scanning module traverses the file to be completely backed up, saves the path of the file object to be completely backed up, and covers the path of the file object saved before, sets the file position of the file object to the archived state, the scanning module backs up the directory, the file information, and the data block of the traversed file object, and the storage module retains the backed-up complete file object.
Specifically, the evaluation program in step S2 is configured to analyze the data, find out a segment that may cause a network security vulnerability in the abnormal data, mark a network node to which the abnormal data belongs as an abnormal point, and mark a network node to which the abnormal data belongs as a security point if the segment that causes the network security vulnerability does not exist in the abnormal data.
Specifically, the data isolation in step S3 specifically includes: and adding an isolation rule through the tracking processing program and setting isolation time, wherein the isolation rule is used for isolating login use of the network node to which the abnormal segment belongs within the isolation time.
Fig. 2 is a schematic structural view of a website background security management and control system provided by the present invention, and as shown in fig. 2, the website background security management and control system provided by the present invention includes: the system comprises a real-time operation data acquisition module 201, a real-time operation data backup storage module 202, a judgment module 203, a data isolation and data isolation release module 204 and a continuous monitoring module 205.
The real-time operation data obtaining module 201 is configured to obtain real-time operation data of each network node.
The real-time operation data backup storage module 202 is configured to backup real-time operation data of each network node, and store the backed-up real-time operation data.
The judging module 203 is configured to judge whether an abnormal segment causing a network security vulnerability exists in the backed-up real-time operating data of each network node; the abnormal segments are data with sensitive words, data with viruses, programs with BUG or data with differences from normal real-time running data.
The data isolation and data isolation release module 204 is configured to, if the abnormal segment exists, perform data isolation on the network node corresponding to the abnormal segment, repair or remove the abnormal segment after the data isolation, return to the step of determining whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time operating data until the abnormal segment causing the network security vulnerability does not exist in the backed-up real-time operating data of the network node, and release the data isolation on the network node.
And the continuous monitoring module 205 is configured to, if the current real-time running data does not exist, return to the step of determining whether an abnormal segment causing the network security vulnerability exists in the backed-up real-time running data, and continue monitoring.
The real-time operation data obtaining module 201 specifically includes: the device comprises a connection application instruction acquisition unit, a judgment unit, a real-time operation data acquisition unit and a connection application instruction reacquisition unit.
The connection application instruction acquisition unit is used for acquiring a connection application instruction of a network node to be connected.
The judging unit is used for judging whether the connection application instruction is consistent with the verification data of the network node to be connected.
And the real-time operation data acquisition unit is used for acquiring the real-time operation data of the network node to be connected if the real-time operation data is consistent with the real-time operation data.
And the connection application instruction reacquisition unit is used for returning to the step of acquiring the connection application instruction of the network node to be connected if the connection application instruction reacquires the network node to be connected.
The real-time operation data backup storage module 202 specifically includes: the device comprises a current path saving unit, a path covering unit and a real-time operation data backup storage unit.
And the current path storage unit is used for traversing the backed-up real-time running data and storing the current path of the backed-up real-time running data.
The path covering unit is used for covering the current path with the path saved last time.
And the real-time operation data backup storage unit is used for storing the directory, the file information and the data blocks of the backed-up real-time operation data according to the current path.
The invention provides a website background safety management and control system, which further comprises: an abnormal point determining module and a safety point determining module.
The abnormal point determining module is used for determining the abnormal point according to the network node corresponding to the abnormal segment.
And the safety point determining module is used for determining the safety point according to the network node corresponding to the abnormal segment.
The data isolation and data isolation release module 204 specifically includes: an isolation rule and an isolation time setting unit.
An isolation rule and isolation time setting unit, configured to set an isolation rule and isolation time for a network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (10)

1. A website background safety management and control method is characterized by comprising the following steps:
acquiring real-time operation data of each network node;
backing up the real-time operation data of each network node, and storing the backed-up real-time operation data;
judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; the abnormal fragment is data with sensitive words, data with viruses, a program with BUG or data with difference from normal real-time running data;
if the abnormal fragments exist, performing data isolation on the network nodes corresponding to the abnormal fragments, repairing or removing the abnormal fragments after the data isolation, returning to the step of judging whether the abnormal fragments causing the network security vulnerability exist in the backed-up real-time running data until the abnormal fragments causing the network security vulnerability do not exist in the backed-up real-time running data of the network nodes, and removing the data isolation from the network nodes;
if not, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data, and continuing monitoring.
2. The website background security management and control method according to claim 1, wherein the acquiring real-time operation data of each network node specifically comprises:
acquiring a connection application instruction of a network node to be connected;
judging whether the connection application instruction is consistent with verification data of the network node to be connected;
if the network nodes are consistent, acquiring real-time operation data of the network nodes to be connected;
and if not, returning to the step of obtaining the connection application instruction of the network node to be connected.
3. The website background safety management and control method according to claim 1, wherein the backing up the real-time operation data of each network node and storing the backed-up real-time operation data specifically comprises:
traversing the backed-up real-time running data, and storing the current path of the backed-up real-time running data;
covering the current path with the path stored last time;
and storing the directory, the file information and the data blocks of the backed-up real-time running data according to the current path.
4. The method as claimed in claim 1, wherein the step of determining whether the backed up real-time running data of each network node has an abnormal segment causing a network security vulnerability further comprises:
determining an abnormal point according to the network node corresponding to the abnormal segment;
and determining a safety point according to the network node corresponding to the abnormal segment.
5. The website background security management and control method according to claim 1, wherein if the abnormal segment exists, performing data isolation on the network node corresponding to the abnormal segment, repairing or removing the abnormal segment after the data isolation, returning to the step of determining whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data until the abnormal segment causing the network security vulnerability does not exist in the backed-up real-time running data of the network node, and removing the data isolation from the network node, specifically comprises:
setting an isolation rule and an isolation time for the network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
6. The utility model provides a website backstage safety control system which characterized in that includes:
the real-time operation data acquisition module is used for acquiring real-time operation data of each network node;
the real-time operation data backup storage module is used for backing up the real-time operation data of each network node and storing the backed-up real-time operation data;
the judging module is used for judging whether abnormal segments causing network security vulnerabilities exist in the backed-up real-time running data of each network node; the abnormal fragment is data with sensitive words, data with viruses, a program with BUG or data with difference from normal real-time running data;
the data isolation and data isolation release module is used for carrying out data isolation on the network node corresponding to the abnormal segment if the abnormal segment exists, repairing or removing the abnormal segment after the data isolation, returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data until the abnormal segment causing the network security vulnerability does not exist in the backed-up real-time running data of the network node, and releasing the data isolation on the network node;
and the continuous monitoring module is used for returning to the step of judging whether the abnormal segment causing the network security vulnerability exists in the backed-up real-time running data if the abnormal segment does not exist, and continuously monitoring.
7. The website background security management and control system of claim 6, wherein the real-time operation data acquisition module specifically comprises:
a connection application instruction acquisition unit, configured to acquire a connection application instruction of a network node to be connected;
the judging unit is used for judging whether the connection application instruction is consistent with the verification data of the network node to be connected;
the real-time operation data acquisition unit is used for acquiring the real-time operation data of the network node to be connected if the real-time operation data is consistent with the real-time operation data of the network node to be connected;
and the connection application instruction reacquiring unit is used for returning to the step of acquiring the connection application instruction of the network node to be connected if the connection application instruction reacquires the network node to be connected.
8. The website background security management and control system according to claim 6, wherein the real-time running data backup storage module specifically comprises:
the current path storage unit is used for traversing the backed-up real-time running data and storing the current path of the backed-up real-time running data;
the path covering unit is used for covering the current path with the path saved last time;
and the real-time operation data backup storage unit is used for storing the directory, the file information and the data blocks of the backed-up real-time operation data according to the current path.
9. The website background security management and control system of claim 6, further comprising:
the abnormal point determining module is used for determining the abnormal point according to the network node corresponding to the abnormal segment;
and the safety point determining module is used for determining the safety point according to the network node corresponding to the abnormal segment.
10. The website background security management and control system of claim 6, wherein the data isolation and data isolation release module specifically comprises:
an isolation rule and isolation time setting unit, configured to set an isolation rule and isolation time for a network node corresponding to the abnormal segment; the isolation rule is used for isolating login use of the network node corresponding to the abnormal segment in the isolation time.
CN202011454138.0A 2020-12-10 2020-12-10 Website background safety management and control method and system Pending CN112528200A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011454138.0A CN112528200A (en) 2020-12-10 2020-12-10 Website background safety management and control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011454138.0A CN112528200A (en) 2020-12-10 2020-12-10 Website background safety management and control method and system

Publications (1)

Publication Number Publication Date
CN112528200A true CN112528200A (en) 2021-03-19

Family

ID=74998855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011454138.0A Pending CN112528200A (en) 2020-12-10 2020-12-10 Website background safety management and control method and system

Country Status (1)

Country Link
CN (1) CN112528200A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939334A (en) * 2015-03-04 2016-09-14 费希尔-罗斯蒙特系统公司 Anomaly detection in industrial communications networks
CN110365673A (en) * 2019-07-11 2019-10-22 武汉思普崚技术有限公司 Method, server and the system in a kind of isolation network attack face
CN110851241A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Safety protection method, device and system for Docker container environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939334A (en) * 2015-03-04 2016-09-14 费希尔-罗斯蒙特系统公司 Anomaly detection in industrial communications networks
CN110365673A (en) * 2019-07-11 2019-10-22 武汉思普崚技术有限公司 Method, server and the system in a kind of isolation network attack face
CN110851241A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Safety protection method, device and system for Docker container environment

Similar Documents

Publication Publication Date Title
CN110212645B (en) Power consumption information acquisition terminal power failure event reporting method and device
CN107704359B (en) Monitoring system of big data platform
CN109733238B (en) Fault detection method, device, storage medium and processor
CN101556679A (en) Method for processing failures in integrated front-end system and computer equipment
CN116739568B (en) Intelligent network operation and maintenance service detection method, system and medium based on big data
CN111641601A (en) Firewall management method, device, equipment and storage medium
CN114285732A (en) Network fault positioning method, system, storage medium and electronic equipment
CN115348080A (en) Network equipment vulnerability comprehensive analysis system and method based on big data
CN109165506B (en) Online virus searching and killing and virus protecting method for industrial control fault-tolerant server
CN101145983A (en) A self-diagnosis and self-discovery subsystem and method of network management system
CN112528200A (en) Website background safety management and control method and system
CN117234179A (en) Anomaly capturing and processing system and method based on trusted computing
CN111124818B (en) Monitoring method, device and equipment for Expander
CN102769607B (en) Malicious code detecting method and system based on network packet
CN111062503B (en) Power grid monitoring alarm processing method, system, terminal and storage medium
CN110704313B (en) JAVA virtual machine memory leakage detection method and device
CN106899977B (en) Abnormal flow detection method and device
CN110990223A (en) Monitoring alarm method and device based on system log
CN114168951B (en) Abnormality detection method and apparatus
CN116230067A (en) Automatic testing method, system, equipment and medium for solid state disk
CN115065589A (en) Data traffic acquisition disaster recovery backup processing method, device, equipment, system and medium
CN112787883B (en) Method, device and equipment for detecting NAT (network Address translation) fault of equipment
CN116980285B (en) Data processing-based intelligent detection response method, system and medium for resident operation and maintenance
CN110488772B (en) DCS centralized monitoring method and device and centralized monitoring terminal
CN113259396A (en) S7comm protocol anomaly detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination