CN106205188A - A kind of based on parking stall, visual parking lot release management system - Google Patents

A kind of based on parking stall, visual parking lot release management system Download PDF

Info

Publication number
CN106205188A
CN106205188A CN201610562304.6A CN201610562304A CN106205188A CN 106205188 A CN106205188 A CN 106205188A CN 201610562304 A CN201610562304 A CN 201610562304A CN 106205188 A CN106205188 A CN 106205188A
Authority
CN
China
Prior art keywords
information
cloud server
parking stall
security
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610562304.6A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610562304.6A priority Critical patent/CN106205188A/en
Publication of CN106205188A publication Critical patent/CN106205188A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/14Traffic control systems for road vehicles indicating individual free spaces in parking areas
    • G08G1/141Traffic control systems for road vehicles indicating individual free spaces in parking areas with means giving the indication of available parking spaces
    • G08G1/143Traffic control systems for road vehicles indicating individual free spaces in parking areas with means giving the indication of available parking spaces inside the vehicles

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

A kind of based on parking stall, visual parking lot release management system, including card reader, native processor, display, Cloud Server, encryption system and security postures map system;Described card reader is arranged on each parking stall in parking lot, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader, card reader obtains relevant information and by wireless network, information is uploaded to Cloud Server, described relevant information includes public information and security information two parts, public information is directly uploaded to Cloud Server, and security information is uploaded to Cloud Server after encryption system;Described security information is entered into Cloud Server by management personnel individual PC by encryption system;Described Cloud Server includes multiple node and link, and described security postures map system is for generating visual security postures map for Cloud Server, to facilitate the safety information to Cloud Server to be monitored.

Description

A kind of based on parking stall, visual parking lot release management system
Technical field
The present invention relates to parking stall management domain, be specifically related to a kind of based on parking stall, visual parking lot release management system System.
Background technology
The parking stall management in parking lot is a common problem of management during people live, and existing parking space management system is the most not The situation of parking stall can be updated in real time.Therefore, a kind of management that can reflect parking stall, parking lot situation by cloud computing in real time is researched and developed System is necessary, and this system is it is necessary to have certain safety and monitoring property, should preserve specifically Necessary car owner's personal information, can not make again these information be easy to leakage, and wherein the safety of Cloud Server itself is one Critically important aspect.
Summary of the invention
For the problems referred to above, the present invention provides a kind of based on parking stall, visual parking lot release management system.
The purpose of this parking lot parking space management system realizes by the following technical solutions:
A kind of based on parking stall, visual parking lot release management system, including card reader, native processor, display, Cloud Server, encryption system and security postures map system;Described card reader is arranged on each parking stall in parking lot, and vehicle is each During into or out parking stall, car owner obtains relevant information with card Card Reader on card reader, card reader and information is passed through nothing Gauze network is uploaded to Cloud Server, and described relevant information includes public information and security information two parts, described public information bag Including the time of into or out parking stall, parking stall numbering, described security information includes that car owner registers name, telephone number, car plate Number, public information is directly uploaded to Cloud Server, and security information is uploaded to Cloud Server after encryption system;Cloud Server connects After receiving above-mentioned information, updated the situation that takies of parking stall by described public information, and send the processing locality extremely asking to check In device, described native processor is integrated with the GPS alignment system on car, and car owner is come by the display being connected with native processor Check current parking stall situation;Described security information is entered into Cloud Server by management personnel individual PC by encryption system;Described Cloud Server includes multiple node and link, and described security postures map system is for generating visual safety for Cloud Server Military posture map, to facilitate the safety information to Cloud Server to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Accompanying drawing explanation
The invention will be further described to utilize accompanying drawing, but the embodiment in accompanying drawing does not constitute any limit to the present invention System, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain according to the following drawings Other accompanying drawing.
Fig. 1 is a kind of structured flowchart based on parking stall, visual parking lot release management system;
Fig. 2 is the structured flowchart of safety military posture map system;
Fig. 3 is the security postures map example after generating.
Reference: card reader-1;Native processor-2;Display-3;Cloud Server-4;Encryption system-5;Safe state Gesture map system-6;Management personnel individual PC-7;Geographical background figure generation module-100;Safety information acquisition module-200;Number According to storehouse generation module-300;Roller warning generation module-400;Security postures value estimation block-500;Main map generates mould Block-600.
Detailed description of the invention
The invention will be further described with the following Examples.
Application scenarios 1:
One as shown in Figure 1, based on parking stall, visual parking lot release management system, including card reader 1, is originally located in Reason device 2, display 3, Cloud Server 4, encryption system 5 and security postures map system 6;Described card reader 1 is arranged on parking lot On each parking stall, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader 1, and card reader 1 obtains phase Information is also uploaded to Cloud Server 4 by wireless network by pass information, and described relevant information includes public information and security information Two parts, described public information includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner notes Volume name, telephone number, license plate number, public information is directly uploaded to Cloud Server 4, and security information is uploaded after encryption system To Cloud Server 4;After Cloud Server 4 receives above-mentioned information, by described public information update parking stall take situation, concurrently Delivering in the native processor 2 asking to check, described native processor 2 is integrated with the GPS alignment system on car, car owner by with The display 3 that native processor 2 is connected checks current parking stall situation;Described security information is passed through by management personnel individual PC7 Encryption system 5 is entered into Cloud Server 4;Described Cloud Server 4 includes multiple node and link, described security postures map system 6 for generating visual security postures map for Cloud Server 4, to facilitate the safety information to Cloud Server 4 to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Preferably, also include that the photographic head being arranged on each parking stall, the image that photographic head shooting obtains pass through wireless network Network is sent in the image library of Cloud Server 4, and separately stores by the numbering of parking stall, when user needs to call image, defeated Angle of incidence section, then Cloud Server 4 is automatically transferred corresponding image information from image library and is sent in native processor 2.
Preferably, described card reader 1 and card use Card Reader technology based on FRID.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 2 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 5 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network safety information data are acquired by multiple data acquisition unit, it is ensured that network security is believed Cease the comprehensive of data acquisition;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls corresponding Function carries out the filtration of warning information, polymerization, is simultaneous for the background event that is likely to occur or does not substantially hinder safe thing Part, uses similarity curvature and the new evaluation criteria of persistent period, eliminates outside Normal Alarm by this kind of event, reduces supervision The interference of personnel, on the other hand in order to avoid security breaches, puts in temporary store by this kind of security incident, when occurring 2 times Regarding as new security incident time above, the misdetection rate of now security incident is less than 5 ‰, and this makes the safety behavior of military posture map Verity is higher, and this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, Consider the security postures of node and link, it is contemplated that the impact of many factors simultaneously;By strong for the maximum of P ' (t) and B ' (t) System is defined to 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is necessarily Degree inhibits the misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 2:
One as shown in Figure 1, based on parking stall, visual parking lot release management system, including card reader 1, is originally located in Reason device 2, display 3, Cloud Server 4, encryption system 5 and security postures map system 6;Described card reader 1 is arranged on parking lot On each parking stall, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader 1, and card reader 1 obtains phase Information is also uploaded to Cloud Server 4 by wireless network by pass information, and described relevant information includes public information and security information Two parts, described public information includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner notes Volume name, telephone number, license plate number, public information is directly uploaded to Cloud Server 4, and security information is uploaded after encryption system To Cloud Server 4;After Cloud Server 4 receives above-mentioned information, by described public information update parking stall take situation, concurrently Delivering in the native processor 2 asking to check, described native processor 2 is integrated with the GPS alignment system on car, car owner by with The display 3 that native processor 2 is connected checks current parking stall situation;Described security information is passed through by management personnel individual PC7 Encryption system 5 is entered into Cloud Server 4;Described Cloud Server 4 includes multiple node and link, described security postures map system 6 for generating visual security postures map for Cloud Server 4, to facilitate the safety information to Cloud Server 4 to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Preferably, also include that the photographic head being arranged on each parking stall, the image that photographic head shooting obtains pass through wireless network Network is sent in the image library of Cloud Server 4, and separately stores by the numbering of parking stall, when user needs to call image, defeated Angle of incidence section, then Cloud Server 4 is automatically transferred corresponding image information from image library and is sent in native processor 2.
Preferably, described card reader 1 and card use Card Reader technology based on FRID.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 3 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 6 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network safety information data are acquired by multiple data acquisition unit, it is ensured that network security is believed Cease the comprehensive of data acquisition;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls corresponding Function carries out the filtration of warning information, polymerization, is simultaneous for the background event that is likely to occur or does not substantially hinder safe thing Part, uses similarity curvature and the new evaluation criteria of persistent period, eliminates outside Normal Alarm by this kind of event, reduces supervision The interference of personnel, on the other hand in order to avoid security breaches, puts in temporary store by this kind of security incident, when occurring 3 times Regarding as new security incident time above, the misdetection rate of now security incident is less than 6 ‰, and this makes the safety behavior of military posture map Verity is higher, and this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, Consider the security postures of node and link, it is contemplated that the impact of many factors simultaneously;By strong for the maximum of P ' (t) and B ' (t) System is defined to 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is necessarily Degree inhibits the misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 3:
One as shown in Figure 1, based on parking stall, visual parking lot release management system, including card reader 1, is originally located in Reason device 2, display 3, Cloud Server 4, encryption system 5 and security postures map system 6;Described card reader 1 is arranged on parking lot On each parking stall, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader 1, and card reader 1 obtains phase Information is also uploaded to Cloud Server 4 by wireless network by pass information, and described relevant information includes public information and security information Two parts, described public information includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner notes Volume name, telephone number, license plate number, public information is directly uploaded to Cloud Server 4, and security information is uploaded after encryption system To Cloud Server 4;After Cloud Server 4 receives above-mentioned information, by described public information update parking stall take situation, concurrently Delivering in the native processor 2 asking to check, described native processor 2 is integrated with the GPS alignment system on car, car owner by with The display 3 that native processor 2 is connected checks current parking stall situation;Described security information is passed through by management personnel individual PC7 Encryption system 5 is entered into Cloud Server 4;Described Cloud Server 4 includes multiple node and link, described security postures map system 6 for generating visual security postures map for Cloud Server 4, to facilitate the safety information to Cloud Server 4 to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Preferably, also include that the photographic head being arranged on each parking stall, the image that photographic head shooting obtains pass through wireless network Network is sent in the image library of Cloud Server 4, and separately stores by the numbering of parking stall, when user needs to call image, defeated Angle of incidence section, then Cloud Server 4 is automatically transferred corresponding image information from image library and is sent in native processor 2.
Preferably, described card reader 1 and card use Card Reader technology based on FRID.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 4 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 7 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network safety information data are acquired by multiple data acquisition unit, it is ensured that network security is believed Cease the comprehensive of data acquisition;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls corresponding Function carries out the filtration of warning information, polymerization, is simultaneous for the background event that is likely to occur or does not substantially hinder safe thing Part, uses similarity curvature and the new evaluation criteria of persistent period, eliminates outside Normal Alarm by this kind of event, reduces supervision The interference of personnel, on the other hand in order to avoid security breaches, puts in temporary store by this kind of security incident, when occurring 4 times Regarding as new security incident time above, the misdetection rate of now security incident is less than 7 ‰, and this makes the safety behavior of military posture map Verity is higher, and this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, Consider the security postures of node and link, it is contemplated that the impact of many factors simultaneously;By strong for the maximum of P ' (t) and B ' (t) System is defined to 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is necessarily Degree inhibits the misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 4:
One as shown in Figure 1, based on parking stall, visual parking lot release management system, including card reader 1, is originally located in Reason device 2, display 3, Cloud Server 4, encryption system 5 and security postures map system 6;Described card reader 1 is arranged on parking lot On each parking stall, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader 1, and card reader 1 obtains phase Information is also uploaded to Cloud Server 4 by wireless network by pass information, and described relevant information includes public information and security information Two parts, described public information includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner notes Volume name, telephone number, license plate number, public information is directly uploaded to Cloud Server 4, and security information is uploaded after encryption system To Cloud Server 4;After Cloud Server 4 receives above-mentioned information, by described public information update parking stall take situation, concurrently Delivering in the native processor 2 asking to check, described native processor 2 is integrated with the GPS alignment system on car, car owner by with The display 3 that native processor 2 is connected checks current parking stall situation;Described security information is passed through by management personnel individual PC7 Encryption system 5 is entered into Cloud Server 4;Described Cloud Server 4 includes multiple node and link, described security postures map system 6 for generating visual security postures map for Cloud Server 4, to facilitate the safety information to Cloud Server 4 to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Preferably, also include that the photographic head being arranged on each parking stall, the image that photographic head shooting obtains pass through wireless network Network is sent in the image library of Cloud Server 4, and separately stores by the numbering of parking stall, when user needs to call image, defeated Angle of incidence section, then Cloud Server 4 is automatically transferred corresponding image information from image library and is sent in native processor 2.
Preferably, described card reader 1 and card use Card Reader technology based on FRID.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 5 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 8 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.US(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;Us(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network safety information data are acquired by multiple data acquisition unit, it is ensured that network security is believed Cease the comprehensive of data acquisition;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls corresponding Function carries out the filtration of warning information, polymerization, is simultaneous for the background event that is likely to occur or does not substantially hinder safe thing Part, uses similarity curvature and the new evaluation criteria of persistent period, eliminates outside Normal Alarm by this kind of event, reduces supervision The interference of personnel, on the other hand in order to avoid security breaches, puts in temporary store by this kind of security incident, when occurring 5 times Regarding as new security incident time above, the misdetection rate of now security incident is less than 8 ‰, and this makes the safety behavior of military posture map Verity is higher, and this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, Consider the security postures of node and link, it is contemplated that the impact of many factors simultaneously;By strong for the maximum of P ' (t) and B ' (t) System is defined to 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is necessarily Degree inhibits the misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Application scenarios 5:
One as shown in Figure 1, based on parking stall, visual parking lot release management system, including card reader 1, is originally located in Reason device 2, display 3, Cloud Server 4, encryption system 5 and security postures map system 6;Described card reader 1 is arranged on parking lot On each parking stall, during each into or out parking stall of vehicle, car owner is with card Card Reader on card reader 1, and card reader 1 obtains phase Information is also uploaded to Cloud Server 4 by wireless network by pass information, and described relevant information includes public information and security information Two parts, described public information includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner notes Volume name, telephone number, license plate number, public information is directly uploaded to Cloud Server 4, and security information is uploaded after encryption system To Cloud Server 4;After Cloud Server 4 receives above-mentioned information, by described public information update parking stall take situation, concurrently Delivering in the native processor 2 asking to check, described native processor 2 is integrated with the GPS alignment system on car, car owner by with The display 3 that native processor 2 is connected checks current parking stall situation;Described security information is passed through by management personnel individual PC7 Encryption system 5 is entered into Cloud Server 4;Described Cloud Server 4 includes multiple node and link, described security postures map system 6 for generating visual security postures map for Cloud Server 4, to facilitate the safety information to Cloud Server 4 to be monitored.
Having the beneficial effect that of this parking lot parking space management system devises a kind of parking stall, parking lot release management system, and this is System can reflect the situation of parking stall on the native processor of car owner in real time, utilizes Cloud Server calculate and store data simultaneously, The investment making native processor greatly reduces, and public information and security information is separately processed, and reduces security information The possibility revealed.
Preferably, also include that the photographic head being arranged on each parking stall, the image that photographic head shooting obtains pass through wireless network Network is sent in the image library of Cloud Server 4, and separately stores by the numbering of parking stall, when user needs to call image, defeated Angle of incidence section, then Cloud Server 4 is automatically transferred corresponding image information from image library and is sent in native processor 2.
Preferably, described card reader 1 and card use Card Reader technology based on FRID.
Preferably, as in figure 2 it is shown, described security postures map system includes geographical background figure generation module 100, safety letter Breath acquisition module 200, data base's generation module 300, roller warning generation module 400, security postures value estimation block 500 and Main map generation module 600:
(1) geographical background figure generation module 100: utilize MAPX software, using the geographical map at network place as Background Layer, splits the network into multiple node and the link connected between two nodes simultaneously, by node and link maps to Background On layer;
(2) safety information acquisition module 200: network information data is acquired by multiple data acquisition unit, described Data acquisition unit is based on Syslog acquisition mode, using Snmp as supplementary acquisition mode, by differently configured network security Equipment completes the collection to network information data;Described network information data includes daily record data, data on flows and vulnerability information, The acquisition of wherein said vulnerability information by scanning tools and network ids intrusion detection instrument, by Snmp or Http agreement by Log collection plug-in unit or data-interface complete;Described daily record data is passed through Syslog agreement and Flow agreement by data acquisition unit It is acquired;
(3) data base's generation module 300: the described network information data after gathering is carried out by proxy management server Merger and filtration, form unified data form and be sent to server terminal basis of formation data base;
(4) roller warning generation module 400: network information data is carried out polymerization classification and accordingly generates roller report Alert, described roller is reported to the police and is arranged on the right side of security postures map, the following operation of concrete execution:
(4-1) from basic database, recall network information data, multiple classification thresholds T1 is set simultaneously, T2, T3 ..., Tn, similarity update threshold values T, curvature threshold K, similarity duration threshold A and initial similarity C, and circulation takes Go out the network information data in preset time, call Similarity Measure function and calculate real-time similarity, and generate at each node The curvilinear function AI of real-time similarity and time;
(4-2) result of calculation is compared, if similarity is more than initial similarity C in real time, then update the most similar Degree is current similarity, and otherwise retaining initial similarity C is current similarity, and enumerator adds 1;
(4-3) by current similarity and multiple classification thresholds T1, T2, T3 ..., Tn compares, according to the most similar The threshold interval at degree place determines the alarm level of this security incident, wherein T < T1 < T2 < T3 ... < Tn;If it is current Similarity does not falls within arbitrary interval, then current similarity compared with similarity threshold values T, if current similarity is less than similar Bottom valve value T, the then following operation of execution:
Calculating current point in time, relative to the real-time similarity variable quantity of previous time point, i.e. calculates described curvilinear function AI Current point in time is relative to curvature K' of previous time point, if K'> is K, and current similarity is less than similarity threshold T's When persistent period is less than similarity duration threshold A, by qualitative for this network information data for harmless security incident, do not perform to add Add the operation of new warning classification, the relevant information of described harmless security incident is stored into the temporary store of artificial setting simultaneously In, when same node is had reached 6 harmless security incidents by enumerator numeration, then perform to add the behaviour of new warning classification Make;When arbitrary current similarity is less than the persistent period of similarity threshold T more than or equal to big similarity duration threshold A Time, also perform to add the operation of new warning classification;The misdetection rate of now security incident is less than 9 ‰;
(4-4) by all-network information data, after above-mentioned polymerization sorting technique classification, to roll the form reported to the police Display is on the right side of map, and the warning color of different classification is set to different;
(5) security postures value estimation block 500: obtain the network safety situation value of each node and link according to following formula:
FN{WH, WL, FH, FL, t}=WH.FH+WL.FL
Herein,
FH(H, V1, Fs, t)=V1.Fs(t)+10P’(t)
FL(L, V2, US, t)=V2.Us(t)+10B‘(t)
Wherein, WHRepresent the weighted value that destination node is shared in all nodes, WLRepresent that Target Link is in all links Shared weighted value, WH、WLThe information on services provided by node and link component respectively obtains;
FHRepresenting the security postures situation of t destination node, H represents destination node, V1Represent that a certain service is transported at node Weight shared in all services of row;P represents joint behavior situation, and P value the biggest expression joint behavior is the poorest, and P ' (t) represents t Moment link performance changing condition, is tried to achieve by the curvature calculating function P point, and forces P ' (t)≤3, works as P ' (t) value and is more than When 3, injunction P ' (t)=3;Fs(t)=N1 (t) .10D1(t), represent the service safe situation situation of t destination node, N1 T () represents that t node is hacked the number of times of generation, D1 (t) represents the order of severity that t node is hacked, itself and target The attack kind that the currently provided service of node is subject to is relevant with the number of times of attack being subject to, and is manually set this letter as the case may be Number;
FLRepresenting the security postures situation of t Target Link, L represents Target Link, V2Represent that a certain Component service is at chain Shared weight in all component service that road is run;B represents link performance situation, and the performance of numerical value the biggest expression link is the poorest, B ' (t) represents t link performance changing condition, is tried to achieve by the curvature calculating function B point, and forces B ' (t)≤3, when When B ' (t) value is more than 3, injunction B ' (t)=3;US(t)=N2 (t) .10D2(t), represent the service safe of t Target Link Situation situation, N2 (t) represents that t link is hacked the number of times of generation, and D2 (t) represents the serious journey that t link is hacked Degree, attack kind and suffered number of times of attack that its service provided with Target Link is subject to are relevant, as the case may be It is manually set this function;
(6) main map generation module 600: according to each node calculated and the network safety situation value of link, root According to threshold value set in advance, the network safety situation of different numerical value is carried out classification, represent different situation grade with different colours Node and the safe condition of link, generate security postures map.
In the present embodiment, network safety information data are acquired by multiple data acquisition unit, it is ensured that network security is believed Cease the comprehensive of data acquisition;Algorithm based on attribute phase recency, by arranging threshold values, compares each warning information, calls corresponding Function carries out the filtration of warning information, polymerization, is simultaneous for the background event that is likely to occur or does not substantially hinder safe thing Part, uses similarity curvature and the new evaluation criteria of persistent period, eliminates outside Normal Alarm by this kind of event, reduces supervision The interference of personnel, on the other hand in order to avoid security breaches, puts in temporary store by this kind of security incident, when occurring 6 times Regarding as new security incident time above, the misdetection rate of now security incident is less than 9 ‰, and this makes the safety behavior of military posture map Verity is higher, and this improves the credibility of military posture map from another point of view;Devise new network safety situation computing formula, Consider the security postures of node and link, it is contemplated that the impact of many factors simultaneously;By strong for the maximum of P ' (t) and B ' (t) System is defined to 3, then the item 10 that reaction node and link performance dynamically changeP‘(t)With 10B‘(t)Not over 1000, this is necessarily Degree inhibits the misjudgment phenomenon in short-term being likely to occur in dynamic representation, it is ensured that the stability of image.
Preferably, the acquisition process of described joint behavior situation P is: respectively to processor utilization, memory usage, net Network connects number, data packetloss rate arranges corresponding threshold value, and the change threshold at Fixed Time Interval, above-mentioned each value is surpassed The absolute value sum of the difference crossing respective doors limit value is expressed as J1, by each value in Fixed Time Interval amplitude of variation more than change threshold The absolute value sum of the concrete difference of value is expressed as J2, following formula obtain joint behavior situation P:P=2J1+J2
The acquisition process of described link performance situation B is: respectively to link component number of network connections, bandwidth availability ratio, number According to packet loss, link component processor utilization, corresponding threshold value, and the change threshold at Fixed Time Interval are set;Will The absolute value sum of the concrete difference that above-mentioned each value exceedes respective doors limit value is designated as J3, and at Fixed Time Interval, each value is changed width Degree is designated as J4 more than the absolute value sum of the concrete difference of change threshold, following formula obtain link performance situation B:B=2J3+J4
The determination process of the weighted value of described each node is:
(1) each node is set up relative to other nodes importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by node is converted to the fuzzy consistent matrix of node;
(3) according to each element of the fuzzy consistent matrix of node, the weighted value of each node is calculated.
The determination process of the weighted value of described each link is:
(1) each link is set up relative to other links importance degree comparator matrix on network safety situation;
(2) the importance degree comparator matrix by link is converted to the fuzzy consistent matrix of link;
(3) according to each element of the fuzzy consistent matrix of link, the weighted value of each link is calculated.
Fig. 3 gives the example of the security postures map after generation.
The present embodiment considers the impact of the dynamically change of node and link, relative to present discrete type node and chain For the performance state method for expressing of road, the dynamically change of node and link (can be passed through P=2 continuouslyJ1+J2And B=2J3+J4 Arrange replace discrete type of the prior art and dynamically change) be reacted in final security postures value.
Last it should be noted that, above example is only in order to illustrate technical scheme, rather than the present invention is protected Protecting the restriction of scope, although having made to explain to the present invention with reference to preferred embodiment, those of ordinary skill in the art should Work as understanding, technical scheme can be modified or equivalent, without deviating from the reality of technical solution of the present invention Matter and scope.

Claims (3)

1., based on parking stall, a visual parking lot release management system, it is characterized in that, including card reader, native processor, Display, Cloud Server, encryption system and security postures map system;Described card reader is arranged on each parking stall in parking lot, During each into or out parking stall of vehicle, car owner obtains relevant information with card Card Reader on card reader, card reader and will believe Breath is uploaded to Cloud Server by wireless network, and described relevant information includes public information and security information two parts, described public affairs The information of opening includes the time of into or out parking stall, parking stall numbering, and described security information includes that car owner registers name, contact electricity Words, license plate number, public information is directly uploaded to Cloud Server, and security information is uploaded to Cloud Server after encryption system;Cloud After server receives above-mentioned information, updated the situation that takies of parking stall by described public information, and send what extremely request was checked In native processor, described native processor is integrated with the GPS alignment system on car, and car owner is by being connected with native processor Display checks current parking stall situation;Described security information is entered into cloud service by management personnel individual PC by encryption system Device;Described Cloud Server includes multiple node and link, and described security postures map system is visual for generating for Cloud Server The security postures map changed, to facilitate the safety information to Cloud Server to be monitored.
One the most according to claim 1, based on parking stall, visual parking lot release management system, is characterized in that, also wraps Including the photographic head being arranged on each parking stall, the image that photographic head shooting obtains is sent to the figure of Cloud Server by wireless network As in storehouse, and separately store by the numbering of parking stall, when user needs to call image, input time section, then Cloud Server from Dynamic from image library, transfer corresponding image information be sent in native processor.
One the most according to claim 2, based on parking stall, visual parking lot release management system, is characterized in that, described Card reader and card use Card Reader technology based on FRID.
CN201610562304.6A 2016-07-14 2016-07-14 A kind of based on parking stall, visual parking lot release management system Withdrawn CN106205188A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610562304.6A CN106205188A (en) 2016-07-14 2016-07-14 A kind of based on parking stall, visual parking lot release management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610562304.6A CN106205188A (en) 2016-07-14 2016-07-14 A kind of based on parking stall, visual parking lot release management system

Publications (1)

Publication Number Publication Date
CN106205188A true CN106205188A (en) 2016-12-07

Family

ID=57475601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610562304.6A Withdrawn CN106205188A (en) 2016-07-14 2016-07-14 A kind of based on parking stall, visual parking lot release management system

Country Status (1)

Country Link
CN (1) CN106205188A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255967A (en) * 2018-09-12 2019-01-22 三星电子(中国)研发中心 Method and apparatus for release information
CN109615924A (en) * 2018-12-28 2019-04-12 西安艾润物联网技术服务有限责任公司 The management method and relevant device of virtual parking area
CN109741605A (en) * 2018-12-25 2019-05-10 深圳市天彦通信股份有限公司 Vehicle monitoring method and relevant apparatus

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255967A (en) * 2018-09-12 2019-01-22 三星电子(中国)研发中心 Method and apparatus for release information
CN109255967B (en) * 2018-09-12 2022-04-22 三星电子(中国)研发中心 Method and device for publishing information
CN109741605A (en) * 2018-12-25 2019-05-10 深圳市天彦通信股份有限公司 Vehicle monitoring method and relevant apparatus
CN109615924A (en) * 2018-12-28 2019-04-12 西安艾润物联网技术服务有限责任公司 The management method and relevant device of virtual parking area

Similar Documents

Publication Publication Date Title
CN105009137B (en) Orient safety warning
CN106209856B (en) Method for generating big data security posture map based on trusted computing
CN107623697A (en) A kind of network security situation evaluating method based on attacking and defending Stochastic Game Model
CN104303153A (en) Path scanning for the detection of anomalous subgraphs, anomaly/change detection and network situational awareness
CN108600275B (en) Threat context aware information security Active Defending System Against based on artificial intelligence
CN110839031B (en) Malicious user behavior intelligent detection system based on reinforcement learning
CN102447707B (en) DDoS (Distributed Denial of Service) detection and response method based on mapping request
CN110866642A (en) Security monitoring method and device, electronic equipment and computer readable storage medium
CN106205188A (en) A kind of based on parking stall, visual parking lot release management system
CN111079577B (en) Calculation method and system for dynamic area aggregation early warning real-time recommendation
CN108540329A (en) Network security inference method based on two-layer Bayesian network model
Maskey et al. Alicia: Applied intelligence in blockchain based vanet: Accident validation as a case study
CN113111359A (en) Big data resource sharing method and resource sharing system based on information security
CN110059984A (en) Security risk recognition methods, device, equipment and storage medium
CN106850675A (en) A kind of determination method and device of attack
CN101499928A (en) Network intrusion scene chart generation method based on cluster analysis
CN113626648A (en) Water conservancy data processing system, method and storage medium
CN106302533A (en) Big data safety management system and method
CN106203164A (en) The big Data Resources Management System of information security based on trust computing and cloud computing
CN108833383B (en) Linkage defense system based on deep learning and agent
CN111400774B (en) Block chain system of secondary water supply anti-terrorism anti-poison safety system
CN105959184A (en) Smart indoor air purification system
CN106226719A (en) A kind of fault electric arc detecting system based on secure cloud network
CN106196450A (en) A kind of high security central air conditioning system
CN110430158A (en) Collection agent dispositions method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C04 Withdrawal of patent application after publication (patent law 2001)
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207