CN102347849A - Networking behavior information processing system - Google Patents
Networking behavior information processing system Download PDFInfo
- Publication number
- CN102347849A CN102347849A CN2010102405112A CN201010240511A CN102347849A CN 102347849 A CN102347849 A CN 102347849A CN 2010102405112 A CN2010102405112 A CN 2010102405112A CN 201010240511 A CN201010240511 A CN 201010240511A CN 102347849 A CN102347849 A CN 102347849A
- Authority
- CN
- China
- Prior art keywords
- internet
- behavior information
- processing system
- information processing
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to a networking behavior information processing system, which comprises a mail sever, a file server, an office computer, Internet and a fire wall. The system comprises a networking behavior information processor, the mail server, the filer server and the office computer are respectively connected with the networking behavior information processor, and the networking behavior information processor is connected with the Internet through the fire wall. Compared with the prior art, the networking behavior information processing system has the advantages that the network bandwidth can be managed, the bandwidth flow rate can be controlled, the web page contents can be filtered, the chat software and the networking time can be managed, and the like.
Description
Technical field
The present invention relates to a kind of information processing system, especially relate to a kind of internet behavior information processing system.
Background technology
Development and progress along with information technology; Especially the rise of network and universal; Organizations and individuals' networking condition improves; And the organization internal employee has been not limited to dismiss the work hours through chatting with the colleague; Shopping online; Pass through the immediate communication tool online chatting with the good friend; Online music appreciating and film, download, receive and dispatch individual mail, in forum, indulge in rhetorical flourishes or the like through P2P instruments such as BT; As long as the employee is interesting, their enjoyment that the Internet brings that just can indulge in luxuriousness to one's heart's desire the time of being on duty.
The employee indulges among the temptation of the Internet, organizes limited network bandwidth resources but constantly to be nibbled and destroy.Comprise BT, electric donkey, sudden peal of thunder equiband resource " phagotroph "; Make originally limited bandwidth resources nervous more; Most of employee complains that network speed is too slow; Bandwidth congested except that direct interference video meeting, VOIP etc. to the comparatively responsive system's normal operation of bandwidth; Also greatly reduce the efficient of various service operations based on the Internet, brought bigger business risk and opportunity cost to tissue.In this simultaneously; Not limited internet access makes that the employee maybe be unconscious or even the numerous contents that maybe the crisis organization networks of malice visit; For example the virus of bringing through Web, IM and file-sharing, worm and wooden horse possibly clicked easy to do intrusion Intranet along with mouse is simple.The risk that not controlled internet access possibly bring more than above-mentioned those, cause because lacking limited management means divulge a secret, illegal incidents become increasingly conspicuous, and become the sword of the Damokers on the manager crown just gradually.
Allow the people helpless be that employee's network behavior lack of standardization is organized as it often and checks, and except be not in the mood for direct losses that work brings because of the work hours, organize also to be faced with and bears legal responsibility and divulge a secret risk.Part employee utilize the work hours accessed content improperly website (like pornographic, reaction etc.), deliver carefree network speech even tissue or participate in illegal network activity; For example deception on the net; Network attack, these behaviors will make organize fame impaired, suffer and involve.The information assets of tissue, the unauthorized of confidential information are propagated and are made the manager painful equally; Because the Internet behavior is complicated and be difficult to expect; No matter be intentionally or accident, an employee who has an ulterior motive and a honest and trustworthy capable person possibly reveal the capsule information of Intranet to third party's tissue even rival.
Summary of the invention
The object of the invention is exactly a kind of ability supervising the network bandwidth to be provided, control bandwidth flow, filtering web page content, management chat software and the internet behavior information processing system of surf time for the defective that overcomes above-mentioned prior art existence.
The object of the invention can be realized through following technical scheme: a kind of internet behavior information processing system; Comprise mail server, file server, office computer, internet, fire compartment wall; This system comprises the internet behavior message handler; Described mail server, file server, office computer are connected with the internet behavior message handler respectively, and described internet behavior message handler is connected with internet through fire compartment wall.
What described internet behavior message handler adopted is net health internet behavior management equipment.
Compared with prior art, the present invention has the following advantages:
1, supervising the network bandwidth
For interior network server enough bandwidth is provided, ensure the Email of market department transmitting-receiving bandwidth demand, be market department's every employee's mean allocation bandwidth resources; Demonstrated fully the difference of different departments, employee and application, both prevented the bandwidth abuse to have promoted again with mad service efficiency.
2, webpage and information filtering strategy
The employee and the department that realize appointment can only visit specific website in the operating time, trade information website for example, and portal website of company etc., and other web page browsings without permission all will be rejected.
3, application program management
Through concrete application program is discerned in the analysis of using agreement and packet characteristic; No matter how application program changes the server ip and the port of connection; Can accurately discern, secondly can also control the management of P2P software, IM (even communication) chat software.
4, surf time management
The different rights that can give different time to different departments or different personnel's identity promptly can be controlled at access authority in the special time period, also can limit total surf time in the employee one day, realizes human-based management.
Description of drawings
Fig. 1 is a structural representation of the present invention.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment the present invention is elaborated.
Embodiment
As shown in Figure 1; A kind of internet behavior information processing system; Comprise mail server 4, file server 5, office computer 6, internet 1, fire compartment wall 2; This system comprises internet behavior message handler 3; Mail server 4, file server 5, office computer 6 are connected with internet behavior message handler 3 respectively, and internet behavior message handler 3 is connected with internet 1 through fire compartment wall 2.What internet behavior message handler 3 adopted is net health internet behavior management equipment.Planning user grouping structure:
For the internet access authority of authorizing differentiation for different clients, different department, comprise the behavior audit strategy of differentiation, at first to plan and set up the user grouping structure of tissue.Usually can set up the user grouping structure of tissue according to administrative framework or IP segmentation/vlan information; As setting up " leader's group ", " market department ", " research and development department " etc.; After the establishment of accomplishing user's group; Can create the user; And the user is assigned in the user group of appointment, to realize authorizing and inheriting of network access authority.Support with the designated user to be template when creating user grouping, duplicate same authority, streamlining management person's operation; And the process of creating the user is simple and convenient equally; When supporting usemame/password authentication mode; Ability binding IP/MAC function; And multiple identification authentication mode is provided; Can limit the time of commencement of number of the account; And support to set up the shared number of the account of many people etc., abundant user identity identification mode makes that the keeper is free to rationally be arranged in its corresponding authentication means according to the actual user in in-house identity and authority.
Set up the authentication system:
Do not have strict authentication just can't effectively distinguish the user, just can't dispose differentiation mandate and audit strategy yet, can't defend effectively naturally that identity is pretended to be, authority spreads and abuse etc.The multiple identification authentication mode that the present invention supported will be brought huge facility for you.User/encrypted message can be stored in equipment itself; Support and organize existing LDAP, the AD of Microsoft domain controller, the interlock of Radius server again even can utilize the existing number of the account of organizing on the POP3 server to make up basic account data storehouse, and Unsupervised member adds user account one by one.The phase-split network flow:
In the Network Management process, the keeper often needs further to understand the operating position of the Internet bandwidth of tissue, understand bandwidth by which employee take, which application tied up most the Internet bandwidth.Use keeper of the present invention can check the WAN traffic curve chart intuitively, and can further check, add up the flow situation of yesterday or fixed time section, thereby help the keeper to optimize and the distribution bandwidth resources.
Web page access control:
The URL storehouse of all can be built-in in the equipment of the present invention closely necessarily presorting allows the keeper to import new URL address and classification simultaneously, and this built-in URL storehouse is through special messenger's manual examination and verification classification, has included all kinds of websites such as pornographic, reaction, violence that relate on the Internet.Because the capacity of the Internet just increases with volatile; Adopt the means in static URL storehouse to be not sufficient to ensure that the keeper can effectively classify internet content and manage; Therefore the equipment among used the present invention is also supported content-based filtration means, comprises that filter user is through the nominal key of search engine searches, the webpage that filtration comprises nominal key, the URL address that filtration contains nominal key etc.The issue of SSL encrypted form is adopted in present increasing website; " encryptionization " become the trend of network development; Embodiment of the present invention can be encrypted the website to SSL and selected and filter; Except discerning and block the corresponding URL; Can also shield the visit of Intranet user through the mode of inspection SSL certificate chain, thereby comprehensive webpage controlling schemes is provided for tissue the website that do not have legal certificate.
Managing I M immediate communication tool:
The present invention can be based on forbidding and supervising two aspects to the management of IM immediate communication tool
Forbid: according to the transmission protocol data bag feature field of IM software, the various IM of shutoff use comprehensively, comprise QQ, MSN, the UC of Sina, POPO, Yahoo Messenger, Skype, ICQ, Google Talk, move Fetion etc.; Even IM software is dressed up the agreement of back through port transmission such as 80,443 with data envelope, the present invention also can effectively distinguish IM flow and normal HTTP and HTTPS, thus the effectively use of managing I M.
Supervision: allow to use the employee of IM instrument, its chat content is not necessarily relevant with work, especially the tissue secret possibly revealed.The present invention can write down all IM chat content, comprises the IM instrument that employing cipher modes such as QQ, Skype transmit.
P2P behaviors such as control BT:
Shutoff to P2P comprises the end-blocking mouth traditionally, envelope seed server IP, envelope seed resource website; But softwares such as BT can pass through 80 port transmission data; The IP of seed server and the quantity of resource website are surprising, and are changing at any time, and the keeper is difficult to obtain satisfied effect.The method that the present invention adopts comprises application protocol analysis and P2P behavior Intelligent Measurement technology, through analyzing the contents such as COS, agreement, port and data characteristics field of packet, from four layers to seven layers complete detection, realizes its management and control and shutoff.
In addition, the present invention can also discern and management and control common application in online speculation in stocks, online game, the Online Video etc. more than 150 for example.
Daily record audit and form center:
The present invention can be directed against different user (group) and carry out behavior record and audit, the information of message body that comprise the URl address, web page title of visit, the speech through the issue of BBS/ blog, sends through Webmail and annex, all Email through the client transmitting-receiving and annex thereof, the information through the HTTP/FTP upload file and content, file in download; Can also write down simultaneously which user, when, what behavior taken place.For in-house CEO contour level leader; " exempting from the key that audits " provided by the present invention function has thoroughly been exempted the behavior record to the specific people; Insert the computer USB interface and import corresponding PIN code as long as will " exempt from the key that audits ", any network behavior of this user all will be by record.
Claims (2)
1. internet behavior information processing system; Comprise mail server, file server, office computer, internet, fire compartment wall; It is characterized in that; Also comprise the internet behavior message handler; Described mail server, file server, office computer are connected with the internet behavior message handler respectively, and described internet behavior message handler is connected with internet through fire compartment wall.
2. a kind of internet behavior information processing system according to claim 1 is characterized in that, described internet behavior message handler adopts net health internet behavior management equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102405112A CN102347849A (en) | 2010-07-29 | 2010-07-29 | Networking behavior information processing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102405112A CN102347849A (en) | 2010-07-29 | 2010-07-29 | Networking behavior information processing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102347849A true CN102347849A (en) | 2012-02-08 |
Family
ID=45546160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102405112A Pending CN102347849A (en) | 2010-07-29 | 2010-07-29 | Networking behavior information processing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102347849A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821161A (en) * | 2012-08-24 | 2012-12-12 | 北京神州绿盟信息安全科技股份有限公司 | Method, device and system for network security auditing |
CN103825887A (en) * | 2014-02-14 | 2014-05-28 | 深信服网络科技(深圳)有限公司 | Hypertext transfer protocol over secure socket layer (HTTPS) encryption-based web filtering method and system |
CN116016765A (en) * | 2022-12-08 | 2023-04-25 | 北京视通科技有限公司 | Anti-interference method and system for online video conference |
CN116471237A (en) * | 2023-06-16 | 2023-07-21 | 四川轻化工大学 | Network addiction control method based on QoS technology |
-
2010
- 2010-07-29 CN CN2010102405112A patent/CN102347849A/en active Pending
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821161A (en) * | 2012-08-24 | 2012-12-12 | 北京神州绿盟信息安全科技股份有限公司 | Method, device and system for network security auditing |
CN102821161B (en) * | 2012-08-24 | 2016-02-24 | 北京神州绿盟信息安全科技股份有限公司 | A kind of network security auditing method, Apparatus and system |
CN103825887A (en) * | 2014-02-14 | 2014-05-28 | 深信服网络科技(深圳)有限公司 | Hypertext transfer protocol over secure socket layer (HTTPS) encryption-based web filtering method and system |
CN103825887B (en) * | 2014-02-14 | 2017-06-16 | 深信服网络科技(深圳)有限公司 | Website programming method and system based on HTTPS encryptions |
CN116016765A (en) * | 2022-12-08 | 2023-04-25 | 北京视通科技有限公司 | Anti-interference method and system for online video conference |
CN116471237A (en) * | 2023-06-16 | 2023-07-21 | 四川轻化工大学 | Network addiction control method based on QoS technology |
CN116471237B (en) * | 2023-06-16 | 2023-10-13 | 四川轻化工大学 | Network addiction control method based on QoS technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11588828B2 (en) | Systems and methods for automated retrieval, processing, and distribution of cyber-threat information | |
CN107395570B (en) | Cloud platform auditing system based on big data management analysis | |
US8976008B2 (en) | Cross-domain collaborative systems and methods | |
US9608961B2 (en) | Firewall policy management | |
DE60316809T2 (en) | METHOD AND DEVICE FOR PROCESSING MESSAGES IN A COMMUNICATION NETWORK | |
US11451576B2 (en) | Investigation of threats using queryable records of behavior | |
JP4960222B2 (en) | System and method for filtering electronic messages using business heuristics | |
US8751808B2 (en) | Method and system for sharing trusted contact information | |
CN105049232B (en) | Network information Log Audit System | |
CN103181125A (en) | Access control device, access control program, and access control method | |
JP2005520230A (en) | System and method for enhancing electronic security | |
JP2002537727A (en) | Electronic mail proxy and filter device and method | |
WO2021178243A1 (en) | Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats | |
CN103136255A (en) | Method and device for information management | |
CN102006286A (en) | Access management method, device and system as well as access device for information system | |
CN102347849A (en) | Networking behavior information processing system | |
CN201821367U (en) | Information processing system for online behaviors | |
CN102404341B (en) | Method and device for monitoring E-mail user behaviors | |
WO2010099560A1 (en) | Device and method for monitoring of data packets | |
Hsu et al. | Identify fixed-path phishing attack by STC | |
CN100499599C (en) | Rubbish mail filtration system and method based on email server | |
CN101553807A (en) | Offsite centralized data center providing client functionality | |
CN206341241U (en) | A kind of internet behavior information management system | |
CN107787500A (en) | Message provides and evaluation system | |
Zhao et al. | Examining social dynamics for countering botnet attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120208 |