CN113872972A - Intelligent network safety monitoring system - Google Patents
Intelligent network safety monitoring system Download PDFInfo
- Publication number
- CN113872972A CN113872972A CN202111147313.6A CN202111147313A CN113872972A CN 113872972 A CN113872972 A CN 113872972A CN 202111147313 A CN202111147313 A CN 202111147313A CN 113872972 A CN113872972 A CN 113872972A
- Authority
- CN
- China
- Prior art keywords
- information
- unit
- module
- checking
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
The invention discloses an intelligent network security monitoring system which is characterized by comprising a user unit, an information acquisition unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a first inspection unit, a second inspection unit, a third inspection unit, an N inspection unit, an information recombination unit, an information database, a secondary antivirus unit and an information inspection unit; the invention can stop information acquisition and isolate information data in the information database after virus information breaks through a firewall, prevent the damage of the information data or the leakage of important information data, and respectively carry out correspondingly classified information processing, simplify complex information, accelerate the monitoring and auditing of the information, improve the working efficiency, simultaneously avoid that after violation information and compliance information are bound, the violation information is issued along with the compliance information, simultaneously extract useful information for utilization, and fully utilize available information resources.
Description
Technical Field
The invention belongs to the field of network security monitoring, relates to a face recognition and code scanning authentication technology, and particularly relates to an intelligent network security monitoring system.
Background
The network safety monitoring system is a monitoring system which is based on people and systems, realizes the monitoring and the verification of network information, optimizes the network information safety and makes the information in the network healthier.
However, the current network security monitoring system has poor system security and lacks protection on information data, and the rate of monitoring and auditing information is slow due to complex acquired information, and for the binding situation of violation information and compliance information, binding information is often issued due to small occupation ratio of the violation information, and the binding information is directly deleted due to large occupation ratio of the violation information, so that loss of available information is caused, and a solution is provided for solving the problem.
Disclosure of Invention
The invention aims to provide an intelligent network safety monitoring system.
The technical problem to be solved by the invention is as follows:
(1) how to improve the system security, after the virus information breaks through the firewall, the information data is protected, and the leakage of important information data is prevented;
(2) how to simplify the complex information to accelerate the monitoring and auditing speed and improve the working efficiency;
(3) how to avoid the violation information being issued together with the compliance information after the violation information and the compliance information are bound, and meanwhile, useful information is extracted for utilization, and available information resources are fully utilized.
The purpose of the invention can be realized by the following technical scheme;
an intelligent network security monitoring system comprises a user unit, an information acquisition unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a first inspection unit, a second inspection unit, a third inspection unit, an N inspection unit, an information recombination unit, an information database, a secondary antivirus unit and an information inspection unit;
the classification unit classifies various information according to the proportion of each piece of information, including four types of picture information, character information, sound information and image information;
the first inspection unit comprises a separation module, an information numbering module, a picture inspection module, a character inspection module, a sound inspection module and an image inspection module, modules in the second inspection unit, the third inspection unit and the N inspection unit are the same as the first inspection unit, and the specific processing steps of the first inspection unit are as follows:
s1: the first checking unit receives the information classified by the classifying unit, performs information separation in the separating module, further divides the information classified by the classifying unit, and independently extracts the picture, character, sound and image information contained in each piece of information;
s2: the separation module extracts information and synchronously numbers the extracted information by the information numbering module, the picture information number extracted by the separation module in the first inspection unit is ATi, the character information number is AWi, the sound information number is ASi, and the image information number is AYi, wherein the initial value of i is 1, i is i +1, if the information extracted by the separation module does not contain one or more of pictures, characters, sound and images, the information is numbered in the same way, and a number k is added after the original i number;
s3: after the separation module finishes information separation and the information numbering module finishes information numbering, the picture checking module, the character checking module, the sound checking module and the image auditing module respectively perform corresponding classified information processing on the extracted information according to the existing processing standard in the processing database.
Furthermore, the specific auditing steps of the second checking unit, the third checking unit and the N checking unit are the same as those of the first checking unit, and the first checking unit, the second checking unit, the third checking unit and the N checking unit simultaneously perform information processing.
Furthermore, the user unit comprises a user login module, an identity identification module, an authority opening module, a processing and editing module, an information review module, an information segmentation module and an information encryption module.
Further, the information reorganization unit is used for reorganizing the information of the units which are checked by the first checking unit, the second checking unit, the third checking unit and the N checking unit, and the information reorganization step is as follows:
t1: the identification information numbering module gives the number of the information, preferentially identifies the first letter of the number, and extracts the information with the same first letter of the number as one type;
t2: identifying a second letter in the extracted number information, wherein the information with the same first letter and the second letter is of one type;
t3: and finally, identifying the value i, wherein the information with the same value i is of one type, and the first letter, the second letter and the value i of the information in the same type are the same, and recombining the information to form one piece of information.
Furthermore, the information database is divided into a complete database, a missing database and a review database, wherein the complete database stores the complete information after being recombined in the information recombining unit, the missing database stores the incomplete information of part of the information lost after being filtered by the firewall unit, and the review database is used for storing the information which can not be processed by the system.
The invention has the beneficial effects that:
(1) according to the invention, the emergency unit and the early warning unit are arranged, the acquired information enters the firewall unit to be primarily filtered, if high-risk virus information appears and the firewall unit cannot block the information, and the system is attacked, the firewall unit activates the early warning unit and the emergency unit, and the emergency unit simultaneously accesses the information acquisition unit and the information database, so that the information acquisition unit stops information acquisition, information data in the information database is isolated, and the damage of the information data or the leakage of important information data is prevented.
(2) The information classified by the classification unit is received by the first inspection unit, the second inspection unit, the third inspection unit and the N inspection unit, information separation is carried out in the separation module, the information classified by the classification unit is further divided, picture, character, sound and image information contained in each piece of information is independently extracted, after the separation module finishes information separation and the information numbering is finished in the information numbering module, the picture inspection module, the character inspection module, the sound inspection module and the image auditing module respectively carry out corresponding classified information processing on the extracted information according to existing processing standards in a processing database, complex information is unified, monitoring and auditing of the information are accelerated, and working efficiency is improved.
(3) The user unit is matched with the information database, three sub-databases, namely a complete database, a missing database and a review database, are arranged in the information database to store different information, and then the user accesses the information database through the information review module and the information segmentation module to review, segment and repair information data in the information database, so that violation information is prevented from being issued, compliance information can be extracted and perfected, and available information resources are fully utilized.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a system block diagram of a checking unit I according to the present invention;
fig. 3 is a system block diagram of a subscriber unit of the present invention.
Detailed Description
As shown in fig. 1-3, an intelligent network security monitoring system includes a user unit, an information acquisition unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a first inspection unit, a second inspection unit, a third inspection unit, a N inspection unit, an information recombination unit, an information database, a secondary antivirus unit, and an information inspection unit;
the classification unit classifies various information according to the proportion of each piece of information, including four types of picture information, character information, sound information and image information;
the first checking unit comprises a separation module, an information numbering module, a picture checking module, a character checking module, a sound checking module and an image checking module, modules in the second checking unit, the third checking unit and the N checking unit are the same as the first checking unit, the second checking unit, the third checking unit and the N checking unit have the same priority, the first checking unit is taken as an example, and the specific processing steps of the first checking unit are as follows:
s1: the first checking unit receives the information classified by the classifying unit, performs information separation in the separating module, further divides the information classified by the classifying unit, and independently extracts the picture, character, sound and image information contained in each piece of information;
s2: the separation module extracts information and synchronously numbers the extracted information by the information numbering module, the picture information number extracted by the separation module in the first inspection unit is ATi, the character information number is AWi, the sound information number is ASi, and the image information number is AYi, wherein the initial value of i is 1, i is i +1, if the information extracted by the separation module does not contain one or more of pictures, characters, sound and images, the information is numbered in the same way, and a number k is added after the original i number;
s3: after the separation module finishes information separation and the information numbering module finishes information numbering, the picture checking module, the character checking module, the sound checking module and the image auditing module respectively perform corresponding classified information processing on the extracted information according to the existing processing standard in the processing database.
The specific auditing steps of the second checking unit, the third checking unit and the N checking unit are the same as those of the first checking unit, the second checking unit, the third checking unit and the N checking unit simultaneously perform information processing, the numbers of the second checking unit, the third checking unit and the N checking unit are B, C and N respectively, the maximum number of the checking units is 26, and the numbers are sequentially arranged according to 26 capitalized English letters.
The user unit comprises a user login module, an identity recognition module, an authority opening module, a processing and editing module, an information review module, an information segmentation module and an information encryption module.
The information reorganization unit is used for reorganizing the information of the units which are checked by the first checking unit, the second checking unit, the third checking unit and the N checking unit, and the information reorganization steps are as follows:
t1: the identification information numbering module gives the number of the information, preferentially identifies the first letter of the number, and extracts the information with the same first letter of the number as one type;
t2: identifying a second letter in the extracted number information, wherein the information with the same first letter and the second letter is of one type;
t3: and finally, identifying the value i, wherein the information with the same value i is of one type, and the first letter, the second letter and the value i of the information in the same type are the same, and recombining the information to form one piece of information.
The information database is divided into a complete database, a missing database and a review database, wherein the complete database stores complete information after being recombined in the information recombining unit, the missing database stores incomplete information of losing part of information after being filtered by the firewall unit, and the review database is used for storing information which can not be processed by the system.
The invention discloses an intelligent network security monitoring system, which comprises a user unit, an information acquisition unit, a firewall unit, an emergency unit, a classification unit, a first inspection unit, a second inspection unit, a third inspection unit and an N inspection unit, wherein the user unit logs in the system, the information acquisition unit is activated to acquire information on the network after logging in the system, the acquired information enters the firewall unit to be primarily filtered, if high-risk virus information appears and cannot be blocked by the firewall unit and the system is attacked, the firewall unit activates an early warning unit and the emergency unit, the emergency unit simultaneously accesses the information acquisition unit and an information database, the information acquisition unit stops information acquisition and isolates information data in the information database, the early warning unit activates early warning to remind the user to manually delete the high-risk virus information, the information primarily filtered by the firewall unit enters the classification unit to be primarily classified, and the first inspection unit, the second inspection unit, the third inspection unit and the N inspection unit perform primary classification on the classified data of the classification unit according to the processing standard stored in the processing database Checking, when the first checking unit, the second checking unit, the third checking unit and the N checking unit check the data, the illegal information is detected and directly enters the secondary antivirus unit for secondary antivirus, the rest compliance information enters the information recombination unit, the information recombination unit recombines the information from the first checking unit, the second checking unit, the third checking unit and the N checking unit, the information recombination unit recombines the information and then enters the information database for storage, the integrated information after recombination enters the information checking unit for public release, and the user can set the authority of the information opened by the information checking unit in the authority opening module, edit the processing standard in the processing database in the processing editing module, recheck the information not disclosed in the information database and repair the incomplete information in the information rechecking module, the binding data in the information database is segmented at the information segmentation module, violation information bound with the compliance information is separated and deleted, and important information in the information database is encrypted at the information encryption module.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (5)
1. An intelligent network security monitoring system is characterized by comprising a user unit, an information acquisition unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a first inspection unit, a second inspection unit, a third inspection unit, an N inspection unit, an information recombination unit, an information database, a secondary antivirus unit and an information inspection unit;
the classification unit classifies various information according to the proportion of each piece of information, including four types of picture information, character information, sound information and image information;
the first checking unit comprises a separation module, an information numbering module, a picture checking module, a character checking module, a sound checking module and an image checking module, modules in the second checking unit, the third checking unit and the N checking unit are the same as the first checking unit, the second checking unit, the third checking unit and the N checking unit have the same priority, the first checking unit is taken as an example, and the specific processing steps of the first checking unit are as follows:
s1: the first checking unit receives the information classified by the classifying unit, performs information separation in the separating module, further divides the information classified by the classifying unit, and independently extracts the picture, character, sound and image information contained in each piece of information;
s2: the separation module extracts information and synchronously numbers the extracted information by the information numbering module, the picture information number extracted by the separation module in the first inspection unit is ATi, the character information number is AWi, the sound information number is ASi, and the image information number is AYi, wherein the initial value of i is 1, i is i +1, if the information extracted by the separation module does not contain one or more of pictures, characters, sound and images, the information is numbered in the same way, and a number k is added after the original i number;
s3: after the separation module finishes information separation and the information numbering module finishes information numbering, the picture checking module, the character checking module, the sound checking module and the image auditing module respectively perform corresponding classified information processing on the extracted information according to the existing processing standard in the processing database.
2. The intelligent network security monitoring system according to claim 1, wherein the specific auditing steps of the second inspection unit, the third inspection unit and the N inspection unit are the same as those of the first inspection unit, and the first inspection unit, the second inspection unit, the third inspection unit and the N inspection unit perform information processing simultaneously.
3. The intelligent network security monitoring system of claim 1, wherein the subscriber unit comprises a subscriber login module, an identity module, a permission opening module, a processing and editing module, an information review module, an information segmentation module and an information encryption module.
4. The intelligent network security monitoring system according to claim 1, wherein the information reorganization unit is configured to reorganize the information from the units that have been checked by the first checking unit, the second checking unit, the third checking unit, and the N checking unit, and the information reorganization includes the following steps:
t1: the identification information numbering module gives the number of the information, preferentially identifies the first letter of the number, and extracts the information with the same first letter of the number as one type;
t2: identifying a second letter in the extracted number information, wherein the information with the same first letter and the second letter is of one type;
t3: and finally, identifying the value i, wherein the information with the same value i is of one type, and the first letter, the second letter and the value i of the information in the same type are the same, and recombining the information to form one piece of information.
5. The intelligent network security monitoring system of claim 1, wherein the information database is divided into a complete database, a missing database and a review database, wherein the complete database stores the complete information reassembled in the information reassembling unit, the missing database stores the incomplete information of the lost information after filtering by the firewall unit, and the review database is used for storing the information which can not be processed by the system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111147313.6A CN113872972B (en) | 2021-09-28 | 2021-09-28 | Intelligent network safety monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111147313.6A CN113872972B (en) | 2021-09-28 | 2021-09-28 | Intelligent network safety monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113872972A true CN113872972A (en) | 2021-12-31 |
CN113872972B CN113872972B (en) | 2022-08-30 |
Family
ID=78992419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111147313.6A Active CN113872972B (en) | 2021-09-28 | 2021-09-28 | Intelligent network safety monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113872972B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115941264A (en) * | 2022-10-31 | 2023-04-07 | 深圳市众云网有限公司 | Firewall management system based on network security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090327849A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Link Classification and Filtering |
CN109948052A (en) * | 2019-03-08 | 2019-06-28 | 上海七牛信息技术有限公司 | A kind of internet information filtering auditing system, method and device |
CN112073524A (en) * | 2020-09-11 | 2020-12-11 | 深圳市自由美标识有限公司 | Intelligent information release system based on Internet of things and provided with digital media interaction system |
CN112583804A (en) * | 2020-12-05 | 2021-03-30 | 星极实业(深圳)有限公司 | Monitoring management system capable of tracking and evidence obtaining of network illegal behaviors in real time |
-
2021
- 2021-09-28 CN CN202111147313.6A patent/CN113872972B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090327849A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Link Classification and Filtering |
CN109948052A (en) * | 2019-03-08 | 2019-06-28 | 上海七牛信息技术有限公司 | A kind of internet information filtering auditing system, method and device |
CN112073524A (en) * | 2020-09-11 | 2020-12-11 | 深圳市自由美标识有限公司 | Intelligent information release system based on Internet of things and provided with digital media interaction system |
CN112583804A (en) * | 2020-12-05 | 2021-03-30 | 星极实业(深圳)有限公司 | Monitoring management system capable of tracking and evidence obtaining of network illegal behaviors in real time |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115941264A (en) * | 2022-10-31 | 2023-04-07 | 深圳市众云网有限公司 | Firewall management system based on network security |
Also Published As
Publication number | Publication date |
---|---|
CN113872972B (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105426137B (en) | A kind of secure print auditing system based on face recognition | |
CN113872972B (en) | Intelligent network safety monitoring system | |
CN110401624A (en) | The detection method and system of source net G system mutual message exception | |
CN110874878B (en) | Pedestrian analysis method, device, terminal and storage medium | |
CN106657689A (en) | Method for preventing and controlling international fraud call and apparatus thereof | |
CN107169777B (en) | Overlay code anti-counterfeiting method and system applying same | |
CN105160455A (en) | Visitor management system | |
CN109726701A (en) | Vehicle identification method and system | |
CN105654065A (en) | Digitization system for identity authentication and method thereof | |
CN205827374U (en) | Internet authentication trusted system and terminal | |
CN108390857B (en) | Method and device for exporting file from high-sensitivity network to low-sensitivity network | |
CN107590888A (en) | A kind of building are registered one's residence gate control system | |
CN109150912A (en) | Big data exchanges management method between net based on secure memory techniques | |
CN102509057B (en) | Mark-based method for safely filtering unstructured data | |
CN104917757A (en) | Event-triggered MTD protection system and method | |
CN112288938A (en) | Face recognition security protection intelligent access control system | |
CN114826786A (en) | Highway toll collection auditing system | |
CN115563656A (en) | Electronic accounting archive security management system | |
CN107342986B (en) | A kind of fraudulent call early warning system and method for early warning | |
CN102592101A (en) | Method and system for protecting LED display management software safety | |
CN109583205A (en) | A kind of data information security management method | |
CN111611459B (en) | File data protection method based on block chain | |
CN106162083A (en) | A kind of HD video overlap-add procedure system and the method carrying out safety certification thereof | |
CN114021171A (en) | Data security protection method based on big data | |
CN105959329B (en) | High-definition video superposition processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |