CN104378228A - Network data security management system and method - Google Patents

Network data security management system and method Download PDF

Info

Publication number
CN104378228A
CN104378228A CN201410522225.3A CN201410522225A CN104378228A CN 104378228 A CN104378228 A CN 104378228A CN 201410522225 A CN201410522225 A CN 201410522225A CN 104378228 A CN104378228 A CN 104378228A
Authority
CN
China
Prior art keywords
packet
user
database
network
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410522225.3A
Other languages
Chinese (zh)
Other versions
CN104378228B (en
Inventor
陈中祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI BINJIE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI BINJIE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI BINJIE INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI BINJIE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410522225.3A priority Critical patent/CN104378228B/en
Publication of CN104378228A publication Critical patent/CN104378228A/en
Application granted granted Critical
Publication of CN104378228B publication Critical patent/CN104378228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a network data security management system and method. The system comprises a management object setting module used for selecting IP addresses and interface numbers of servers as management objects, a data packet collecting module used for collecting data packets in a network in a bypass mode, a data packet analyzing module, a data packet sorting module and a monitoring module, wherein the data packet analyzing module is used for unpacking and processing the data packets and analyzing whether target addresses of the data packets are the selected IP addresses of the servers, if the answer is positive, the data packets are stored in a database, and if the answer is negative, packet loss processing is carried out on the data packets; the data packet sorting module is used for sorting the data packets in the database, obtaining user secret keys according to the target addresses of the data packets and analyzing current operations of a user from the unpacked data packets; the monitoring module is used for judging whether the current operations are beyond the identity permission range of the user, and if the answer is positive, an alarm is sounded and the current operations are interrupted. By means of the system and method, it can be guaranteed that the user can not operate beyond permission, and safety of a network system is guaranteed.

Description

Network data security management system and method
Technical field
The present invention relates to a kind of network data security management system and method.
Background technology
Existing network safety system is that the sensitive data being proposed to need in network system to protect by user implements protection; but often after network system bulky complex; which data user cannot specifically provide are sensitive datas; or user directly may assert that all data are all sensitive datas; now network system just cannot be managed well, and the operation of the developer of system, attendant, temporary technique support amendment system or database just cannot be managed effectively.
Summary of the invention
The technical problem to be solved in the present invention is to overcome the defect that cannot manage well the safety of network data after network system too bulky complex in prior art, provides a kind of network data security management system and method.
The present invention solves above-mentioned technical problem by following technical proposals:
The invention provides a kind of network data security management system, its feature is, comprising:
One management object arranges module, for choosing IP (agreement interconnected between the network) address of at least one server and port numbers as management object from network;
One packet capture module, for packets all in collection network in bypass mode, each packet is all for the user operation behavior in characterizing network;
One data packet analysis module, for unpacking process to each packet gathered, and whether the destination address analyzing described packet is the IP address that described management object arranges the server that module is chosen, if, then described packet is stored in database, if not, then packet loss process is done to described packet;
One packet sorting module, for arranging the packet in described database, obtain user key according to the destination address of described packet, to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user;
One monitoring module, for judging whether the current operation behavior of user exceeds the identity extent of competence of user, and sends alarm when being judged as YES and blocks the current operation behavior of user.
Wherein, different user identity has different operating right scopes, specifically can be undertaken self-defined by system user according to actual conditions.
Preferably, the mode image data bag of described packet capture module for being monitored by Port Mirroring function or employing TAP (splitter) shunting of the network switch.
Preferably, described database be oracle database, Microsoft SQL Server database, DB2 database, sybase database, informix database or MySQL database (above-mentioned concrete kind and the title being existing database).
Goodly, described packet sorting module is used for characterizing according to field in packet source address, destination address, service routine name, operation table name, content of operation, mode of operation parse the current operation behavior of user.
Preferably, described network data security management system also comprises a display module, for the monitored results of described monitoring module being shown visually by internal queries or external interface, and automatically generates the statistical report form characterizing monitored results.
The object of the invention is to additionally provide a kind of network data security management method, its feature is, it utilizes above-mentioned network data security management system to realize, and comprises the following steps:
S 1, from network, choose the IP address of at least one server and port numbers as management object;
S 2, all in collection network in bypass mode packets, each packet is all for the user operation behavior in characterizing network;
S 3, process is unpacked to each packet gathered, and whether the destination address analyzing described packet is step S 1in the IP address of server chosen, if so, then described packet is stored in database, if not, then packet loss process is done to described packet;
S 4, the packet in described database is arranged, obtain user key according to the destination address of described packet, to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user;
S 5, judge whether the current operation behavior of user exceeds the identity extent of competence of user, and send alarm when being judged as YES and block the current operation behavior of user.
Preferably, step S 2in by the Port Mirroring function of the network switch or the mode image data bag that adopts TAP shunting to monitor.
Preferably, described database is oracle database, Microsoft SQL Server database, DB2 database, sybase database, informix database or MySQL database.
Preferably, step S 4the middle source address according to field sign in packet, destination address, service routine name, operation table name, content of operation, mode of operation parse the current operation behavior of user.
Preferably, described network data security management system also comprises a display module, step S 5also comprise a step S afterwards 6, described display module by internal queries or external interface by step S 5in monitored results show visually, and automatically generate the statistical report form characterizing monitored results.
Positive progressive effect of the present invention is: the present invention can carry out safety management to the network system of bulky complex, ensures that user can not get over limiting operation, thus has ensured the safety of whole network system, ensures that all business of network system are all normally run.
Accompanying drawing explanation
Fig. 1 is the module diagram of the network data security management system of a preferred embodiment of the present invention.
Fig. 2 is the flow chart of the network data security management method of a preferred embodiment of the present invention.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
As shown in Figure 1, network data security management system of the present invention comprises a management object and arranges module 1, packet capture module 2, data packet analysis module 3, packet sorting module 4, database 5, monitoring module 6 and a display module 7.
Described management object arranges module 1 and from network, chooses the IP address of at least one server and port numbers as management object, thus formulates safeguard rule as required, determines the server ip, the port number information that need supervision.Described packet capture module 2 is passed through the Port Mirroring function of the network switch or is adopted TAP to shunt the modes such as monitoring, with packets all in the mode Real-time Collection network of bypass, user operation behavior in the equal characterizing network of each packet, thus make native system can learn user's service server and mutual all operations behavior of database server in a network.In the present invention, for server involved during the behavior of user's executable operations, native system all can be converted into concrete actual name according to the IP address of server, and actual name is shown, make system user can check server name involved by user operation intuitively.The server of the source message such as, characterized in certain operation behavior is " Intranet website application server ", the server of target message is " asset database server ", so will show above-mentioned concrete title when system specifically shows, instead of the IP address of display server simply.
Described data packet analysis module 3 unpacks process to each packet gathered, and whether the destination address analyzing packet is the IP address that described management object arranges the server that module 1 is chosen, if, then think that it is eligible, described packet is stored in described database 5, if not, then packet loss process is done to described packet.Described packet sorting module 4 arranges the packet in described database 5, destination address according to described packet obtains user key (usbkey, for storing private key and the digital certificate of user), to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user, described packet sorting module 4 is specifically according to the source address that field in packet characterizes, destination address, service routine name, operation table name, content of operation, modes of operation etc. parse the current operation behavior of user.
Particularly, the present invention can determine the unique identities of user according to user key, and directly shows its concrete name for the user of executable operations behavior, thus demonstrates the User Detail of each operation behavior intuitively.In addition, the information such as address name, operating time, operation place, operation behavior, operating process of each operation behavior all intactly can be parsed from each packet, and can sort based on the flow process of temporal information to complete set, thus specifying information and the sequencing of each operation behavior in flow process can be clearly illustrated, conveniently operation behavior is traced to the source.Such as application event is paid for certain amount, its complete flow process is successively: user A carries out unit budget execution review operation, user B carries out unit amount and pays application operation, system so of the present invention just can show name and the operation behavior thereof of user A in chronological order successively, and after it, show name and the operation behavior thereof of user B.
Described monitoring module 6 real-time monitoring data, judge whether the current operation behavior of user exceeds the identity extent of competence of user, if be judged as YES, then illustrate that setting rule is violated in user operation behavior, then send alarm and block the current operation behavior of user.Wherein, different user identity has different operating right scopes, for limiting the operation behavior of different identity user, specifically can be undertaken self-defined by system user according to actual conditions, if identity A is only to carry out read-only operation to database, identity B then can modify to database and operate.
The real-time monitored results of described monitoring module 6 is showed user by internal queries or external interface by described display module 7 visually, and arranges according to user, automatically generates the statistical report form characterizing monitored results.By the bookkeeping extent of competence by user setup data storehouse and operation system, native system is according to this setting, and monitoring all operations is arranged, and lets pass, is blocked the operation of going beyond one's commission, alarm record to the operation in extent of competence.
Wherein, described database 5 can be oracle database, Microsoft SQL Server database, DB2 database, sybase database, informix database or MySQL database.
In concrete practice, network data security management system of the present invention is utilized to realize following functions:
Financial operation key operation is audited: accurately each operation of identification services person, according to the design of user-defined audit strategy, restore key business operation, as the application of budget fund, review operation, corresponding data field has the amount of money, operator, operating time etc., auditing result shows according to the customary way of business personnel by business form data, and several data inquiry mode is provided, even if also without the business personnel of training can understand well and use, financial operation manager can understand the ruuning situation of operation system by auditing by third party system.
Financial operation whole process is audited: the information such as time, place, operation system, content of operation analyzing operation system user login operation, and by the logical relation of operation system, the operation of user is associated, finally the Life cycle of business form is reduced, manager is allowed to understand each business form handling the data original appearance in staff (comprising the concrete time, place, result etc. of handling), for the confirmation of responsibility of accident plays a key effect.
Financial operation critical data intelligence comparison: the back-end data comparison engine of innovation, can while business operation, automatically, will pay list and bank's actual delivery list (comprising the amount of money, shroff account number, payee's name etc.) is compared, once it is abnormal that comparison occurs, send warning information by remote alarm interface, effectively stop abnormal traffic data and flow out financial system.
Operating audit and control: judge whether user uses usbkey to log in, if use usbkey, can login system, if not, stop login.
Database audit and control: according to the authority of current login user, whether the time of detection user operation, place, account, usbkey, operating right violate security strategy mandate, if with no authorized just blocks, also block if there is unauthorized operation behavior.
Easy empowerment management mode: by unified mandate, certification, audit design, by loaded down with trivial details unordered rights management job simplification, methodization, and finally determine the rights of using such as developer, O&M service provider, attendant by user, really accomplish outsourcing work and wrapped steel joint is not functional.
Be free from risk deployment: with bypass mode, by the Port Mirroring function of the network switch or adopt TAP to shunt the modes such as monitoring, be deployed in grid, do not affect network configuration and performance, even if audit device breaks down also can not affect the normal operation of operation system, online technique is supported, provides remote technology to instruct and maintenance work in real time.
As shown in Figure 2, the network data security management method that the present invention utilizes the network data security management system of the present embodiment to realize comprises the following steps:
Step 101, the IP address choosing at least one server from network and port numbers are as management object.
Packets all in step 102, in bypass mode collection network, each packet is all for the user operation behavior in characterizing network.
Step 103, to gather each packet unpack process, and whether the destination address analyzing described packet is the IP address of the server chosen in step 101, is if so, then stored in database by described packet, if not, then packet loss process is done to described packet.
Step 104, the packet in described database to be arranged, destination address according to described packet obtains user key, to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user.
Step 105, judge whether the current operation behavior of user exceeds the identity extent of competence of user, and send alarm when being judged as YES and block the current operation behavior of user.
Step 106, by internal queries or external interface, the monitored results in step 105 to be shown visually, and automatically generate the statistical report form characterizing monitored results.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these execution modes, but these change and amendment all falls into protection scope of the present invention.

Claims (10)

1. a network data security management system, is characterized in that, comprising:
One management object arranges module, for choosing the IP address of at least one server and port numbers as management object from network;
One packet capture module, for packets all in collection network in bypass mode, each packet is all for the user operation behavior in characterizing network;
One data packet analysis module, for unpacking process to each packet gathered, and whether the destination address analyzing described packet is the IP address that described management object arranges the server that module is chosen, if, then described packet is stored in database, if not, then packet loss process is done to described packet;
One packet sorting module, for arranging the packet in described database, obtain user key according to the destination address of described packet, to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user;
One monitoring module, for judging whether the current operation behavior of user exceeds the identity extent of competence of user, and sends alarm when being judged as YES and blocks the current operation behavior of user.
2. network data security management system as claimed in claim 1, is characterized in that, described packet capture module is used for the mode image data bag monitored by Port Mirroring function or the employing TAP shunting of the network switch.
3. network data security management system as claimed in claim 1, it is characterized in that, described database is oracle database, Microsoft SQL Server database, DB2 database, sybase database, informix database or MySQL database.
4. network data security management system as claimed in claim 1, it is characterized in that, the source address that described packet sorting module is used for characterizing according to field in packet, destination address, service routine name, operation table name, content of operation, mode of operation parse the current operation behavior of user.
5. as the network data security management system in claim 1-4 as described in any one, it is characterized in that, described network data security management system also comprises a display module, for the monitored results of described monitoring module being shown visually by internal queries or external interface, and automatically generate the statistical report form characterizing monitored results.
6. a network data security management method, is characterized in that, it utilizes network data security management system as claimed in claim 1 to realize, and comprises the following steps:
S 1, from network, choose the IP address of at least one server and port numbers as management object;
S 2, all in collection network in bypass mode packets, each packet is all for the user operation behavior in characterizing network;
S 3, process is unpacked to each packet gathered, and whether the destination address analyzing described packet is step S 1in the IP address of server chosen, if so, then described packet is stored in database, if not, then packet loss process is done to described packet;
S 4, the packet in described database is arranged, obtain user key according to the destination address of described packet, to identify the unique identities of the user performing current operation behavior, and from the data after unpacking, parse the current operation behavior of user;
S 5, judge whether the current operation behavior of user exceeds the identity extent of competence of user, and send alarm when being judged as YES and block the current operation behavior of user.
7. network data security management method as claimed in claim 6, is characterized in that, step S 2in by the Port Mirroring function of the network switch or the mode image data bag that adopts TAP shunting to monitor.
8. network data security management method as claimed in claim 6, it is characterized in that, described database is oracle database, Microsoft SQL Server database, DB2 database, sybase database, informix database or MySQL database.
9. network data security management method as claimed in claim 6, is characterized in that, step S 4the middle source address according to field sign in packet, destination address, service routine name, operation table name, content of operation, mode of operation parse the current operation behavior of user.
10. as the network data security management method in claim 6-9 as described in any one, it is characterized in that, described network data security management system also comprises a display module, step S 5also comprise a step S afterwards 6, described display module by internal queries or external interface by step S 5in monitored results show visually, and automatically generate the statistical report form characterizing monitored results.
CN201410522225.3A 2014-09-30 2014-09-30 Network data security manages system and method Active CN104378228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410522225.3A CN104378228B (en) 2014-09-30 2014-09-30 Network data security manages system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410522225.3A CN104378228B (en) 2014-09-30 2014-09-30 Network data security manages system and method

Publications (2)

Publication Number Publication Date
CN104378228A true CN104378228A (en) 2015-02-25
CN104378228B CN104378228B (en) 2018-07-13

Family

ID=52556906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410522225.3A Active CN104378228B (en) 2014-09-30 2014-09-30 Network data security manages system and method

Country Status (1)

Country Link
CN (1) CN104378228B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429779A (en) * 2015-10-28 2016-03-23 上海熙菱信息技术有限公司 Network business data automatic identification system and method
CN105704153A (en) * 2016-03-30 2016-06-22 中国联合网络通信集团有限公司 Method and system for tracking network access information in real time
CN106921631A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 Method for exhibiting data and device
CN107920033A (en) * 2016-10-07 2018-04-17 现代自动车株式会社 It is used for the operating method and communication node of the communication node of mirror image in vehicle network
CN108563404A (en) * 2018-04-17 2018-09-21 四川神琥科技有限公司 A kind of data packet capturing storage method and equipment
CN108628236A (en) * 2018-06-07 2018-10-09 苏州市智水环境科研技术有限公司 Intelligent environment monitoring system
CN110188517A (en) * 2018-12-14 2019-08-30 浙江宇视科技有限公司 A kind of the user account number login method and device of based role mode
CN110426971A (en) * 2019-06-26 2019-11-08 北京全路通信信号研究设计院集团有限公司 A kind of rail traffic control network data acquisition and management method and system
CN116886406A (en) * 2023-08-04 2023-10-13 广州市博立信息科技有限公司 Computer network data safety intelligent protection system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556611A (en) * 2003-12-30 2004-12-22 上海交通大学 Network message safety comprehensive management method based on safety application servicer
CN101296256A (en) * 2008-06-19 2008-10-29 中国电信股份有限公司 Method and system for implementing accurate information propelling by internet
CN101388763A (en) * 2007-09-12 2009-03-18 北京启明星辰信息技术有限公司 SQL injection attack detection system supporting multiple database types
CN101431434A (en) * 2008-12-17 2009-05-13 中国移动通信集团四川有限公司 Content monitoring and plugging system and method based on WAP
CN101442449A (en) * 2008-12-18 2009-05-27 中国移动通信集团浙江有限公司 Method for completely auditing user behaviors under centralization access mode
CN101639879A (en) * 2008-07-28 2010-02-03 成都市华为赛门铁克科技有限公司 Database security monitoring method, device and system
US20100050263A1 (en) * 2008-08-25 2010-02-25 International Business Machines Corporation Browser based method of assessing web application vulnerability
CN101729602A (en) * 2009-12-11 2010-06-09 北京工业大学 Method for acquiring P2P (peer-to-peer) video system program information
CN102053970A (en) * 2009-10-30 2011-05-11 中国移动通信集团广西有限公司 Database auditing method and system
CN102542478A (en) * 2010-12-31 2012-07-04 北京安码科技有限公司 Electronic business user public access track extracting method and device
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556611A (en) * 2003-12-30 2004-12-22 上海交通大学 Network message safety comprehensive management method based on safety application servicer
CN101388763A (en) * 2007-09-12 2009-03-18 北京启明星辰信息技术有限公司 SQL injection attack detection system supporting multiple database types
CN101296256A (en) * 2008-06-19 2008-10-29 中国电信股份有限公司 Method and system for implementing accurate information propelling by internet
CN101639879A (en) * 2008-07-28 2010-02-03 成都市华为赛门铁克科技有限公司 Database security monitoring method, device and system
US20100050263A1 (en) * 2008-08-25 2010-02-25 International Business Machines Corporation Browser based method of assessing web application vulnerability
CN101431434A (en) * 2008-12-17 2009-05-13 中国移动通信集团四川有限公司 Content monitoring and plugging system and method based on WAP
CN101442449A (en) * 2008-12-18 2009-05-27 中国移动通信集团浙江有限公司 Method for completely auditing user behaviors under centralization access mode
CN102053970A (en) * 2009-10-30 2011-05-11 中国移动通信集团广西有限公司 Database auditing method and system
CN101729602A (en) * 2009-12-11 2010-06-09 北京工业大学 Method for acquiring P2P (peer-to-peer) video system program information
CN102542478A (en) * 2010-12-31 2012-07-04 北京安码科技有限公司 Electronic business user public access track extracting method and device
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429779B (en) * 2015-10-28 2019-05-03 上海熙菱信息技术有限公司 A kind of network service data automatic identification system and method
CN105429779A (en) * 2015-10-28 2016-03-23 上海熙菱信息技术有限公司 Network business data automatic identification system and method
CN106921631A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 Method for exhibiting data and device
CN105704153B (en) * 2016-03-30 2020-02-07 中国联合网络通信集团有限公司 Method and system for tracking network access information in real time
CN105704153A (en) * 2016-03-30 2016-06-22 中国联合网络通信集团有限公司 Method and system for tracking network access information in real time
CN107920033A (en) * 2016-10-07 2018-04-17 现代自动车株式会社 It is used for the operating method and communication node of the communication node of mirror image in vehicle network
CN107920033B (en) * 2016-10-07 2021-11-02 现代自动车株式会社 Method for operating a communication node for mirroring in a vehicle network and communication node
CN108563404A (en) * 2018-04-17 2018-09-21 四川神琥科技有限公司 A kind of data packet capturing storage method and equipment
CN108563404B (en) * 2018-04-17 2021-07-27 四川神琥科技有限公司 Data packet capturing and storing method and equipment
CN108628236A (en) * 2018-06-07 2018-10-09 苏州市智水环境科研技术有限公司 Intelligent environment monitoring system
CN110188517A (en) * 2018-12-14 2019-08-30 浙江宇视科技有限公司 A kind of the user account number login method and device of based role mode
CN110426971A (en) * 2019-06-26 2019-11-08 北京全路通信信号研究设计院集团有限公司 A kind of rail traffic control network data acquisition and management method and system
CN110426971B (en) * 2019-06-26 2021-07-20 北京全路通信信号研究设计院集团有限公司 Rail transit control network data acquisition and management method and system
CN116886406A (en) * 2023-08-04 2023-10-13 广州市博立信息科技有限公司 Computer network data safety intelligent protection system
CN116886406B (en) * 2023-08-04 2024-01-30 广州市博立信息科技有限公司 Computer network data safety intelligent protection system

Also Published As

Publication number Publication date
CN104378228B (en) 2018-07-13

Similar Documents

Publication Publication Date Title
CN104378228A (en) Network data security management system and method
US10944772B2 (en) Connected security system
US11960373B2 (en) Function evaluation of a system or portion thereof
EP2866411A1 (en) Method and system for detecting unauthorized access to and use of network resources with targeted analytics
CN101252441B (en) Acquired safety control method and system based on target capable of setting information safety
CN110443048A (en) Data center looks into number system
CN101321084A (en) Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining
CN117769706A (en) Network risk management system and method for automatically detecting and analyzing network security in network
CN111181978B (en) Abnormal network traffic detection method and device, electronic equipment and storage medium
US20170054750A1 (en) Risk assessment
CN109388949B (en) Data security centralized management and control method and system
CN105930740B (en) Source retroactive method, monitoring method, restoring method and system when software file is changed
CN112688971B (en) Function-damaged network security threat identification device and information system
CN106407836B (en) A kind of method and device that the behavior of data illegal modifications detects automatically
CN103597473B (en) For merging the system and method for partially polymerized query result
CN105608342B (en) Data managing method and data administrator
CN110378120A (en) Application programming interfaces attack detection method, device and readable storage medium storing program for executing
CN105939202A (en) Method and device for managing life cycle of device
US20210406385A1 (en) Analysis unit for analyzing a system or portion thereof
CN113672926A (en) Data protection method and system based on computer intelligent algorithm
Mogull Understanding and selecting a database activity monitoring solution
Sayfayn et al. Cybersafety analysis of the maroochy shire sewage spill (preliminary draft)
JP2022537124A (en) A software application for continuous real-time determination, treatment and remediation of cyber risk
CN112800437B (en) Information security risk evaluation system
Jekot et al. IT risk assessment and penetration test: Comparative analysis of IT controls verification techniques

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant