CN107294991A - Network function system of defense and safety protecting method based on output judgement - Google Patents
Network function system of defense and safety protecting method based on output judgement Download PDFInfo
- Publication number
- CN107294991A CN107294991A CN201710537460.1A CN201710537460A CN107294991A CN 107294991 A CN107294991 A CN 107294991A CN 201710537460 A CN201710537460 A CN 201710537460A CN 107294991 A CN107294991 A CN 107294991A
- Authority
- CN
- China
- Prior art keywords
- function
- message
- network
- output
- external network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention belongs to technical field of network security, more particularly to a kind of network function system of defense and safety protecting method based on output judgement, system includes:N number of function of realizing identical network function performs body, TSM Security Agent and external network;Method includes:The input message of external network is comparably sent to N number of function and performs body;Performing body to function needs the message exported to do synchronization process;The output message after synchronization will be analyzed, extract its effective output content and be compared;Receive at leastAfter individual content identical output message, the output message is forwarded to external network.The present invention performs the output message progress safety verification that body is sent to external network to function, is receiving at leastAfter individual content identical output message, the output message is just forwarded to external network, when reducing single or a small amount of function and performing body and invaded or existed leak back door, attacker's secret steals sensitive data or external network sends the success rate of attack message.
Description
Technical field
The present invention relates to technical field of network security, more particularly to a kind of network function system of defense based on output judgement
And safety protecting method.
Background technology
Network function in cyberspace field performs the instantiation that body can be network functional entity or subnet, to reality
A certain function or the combination of some functions in existing network network.
In existing network space field, network function performs body can be with main-standby mode, the load sharing side of pond group form
Formula is present, but a certain specific tasks can only be undertaken by simple function execution body.It is hidden to there is many safety in individual feature execution body
Suffer from, attacker can implement invasion make its can not normal work, or mistake or malicious messages are sent, or even with the function after invasion
It is that springboard attacks coupled other network equipments to perform body.Simultaneously as the software and hardware that function performs body can not have been accomplished
It is complete controllable, credible, there is a possibility that attacker steals function using leak or back door secret and performs internal sensitive data.These
All it is the problem of must solving in cyberspace safety guarantee.
The content of the invention
The present invention is for the existing network functional entity or subnet for realizing a certain network function or the combination of some network functions
There is leak back door, private data can be stolen for secret by attacker or attack external network, menace network spatial information peace
Full the problem of, there is provided a kind of network function system of defense based on output judgement and safety protecting method.
The technical scheme is that:A kind of network function system of defense based on output judgement, including:It is N number of to realize phase
Function with network function performs body, TSM Security Agent and external network, and function performs body and entered by TSM Security Agent with external network
Row communication;
Described function performs the instantiation that body is network functional entity or subnet, is used for and external network communication;
Described TSM Security Agent is used for the input message for forwarding external network to send, and performs what body needs were exported to function
Message synchronizes processing and safety verification;
Described external network is used to perform body communication with function, realizes corresponding network function;
The described network function system of defense based on output judgement, described function perform body be network functional entity or
The other parts of the instantiation of subnet control section, network functional entity or subnet perform body by each function and shared.
The described network function system of defense based on output judgement, the TSM Security Agent includes:
Body is performed for encapsulating N number of function, a network functional entity or subnet is externally presented as, acts on behalf of and maintain function
Perform the annexation of body and external network;
Send for receiving external network and perform the input message of body to function and it is comparably distributed to N number of function held
Row body;
The message of body is performed for receiving N number of function, synchronization process is done to the message for needing to export and to extract it effectively defeated
Go out content.
The described network function system of defense based on output judgement, described N number of function performs body and TSM Security Agent envelope
Loaded in same physical entity or being distributed in different physical entities.
The described network function safety protecting method based on output judgement, comprises the following steps:
The input message of external network is comparably sent to N number of function and performs body;
Performing body to function needs the message exported to do synchronization process;
The output message after synchronization will be analyzed, extract its effective output content and be compared;
Receive at leastAfter individual content identical output message, the output message is forwarded to external network.
The described network function safety protecting method based on output judgement, in TSM Security Agent to the output message that receives
Before being compared, in addition to:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and the defeated of body is performed with this synchronous N number of function
Outbound message;
TSM Security Agent timing since being received after a certain output message first time, is rejected beyond the identical of stand-by period window
Output message;
TSM Security Agent performs multiple identical output messages that body is sent to receiving same function, only retains the received
One output message.
The described network function safety protecting method based on output judgement, the content that the TSM Security Agent is received is identical
The number of output message be less thanWhen individual, then described TSM Security Agent gives a warning message, and to all output messages
Carry out blocking processing.
The beneficial effects of the invention are as follows:1st, the network function system of defense based on output judgement that the present invention is implemented, to work(
The output message progress safety verification that body is sent to external network can be performed, is being received at leastIndividual content identical output disappears
After breath, the output message is just forwarded to external network, single or a small amount of function is reduced and performs body and invaded or existed and leak
During the back door of hole, attacker's secret steals sensitive data or external network sends the success rate of attack message, even if N number of function is held
The all leaky back door of row body, the possibility for sending identical invalid message in synchronization is very low, effectively increases system
Security.
2nd, the present invention performs body using N number of function and can be integrated in same physical entity, can also be distributed in different
Physical entity;TSM Security Agent and function, which perform body, simultaneously to be same physical entity, can also be individually present, and be used as raising net
One external entity of independence of network security, the complexity of reduction transformation network, the flexibility with application;TSM Security Agent is only carried
Effective output content of output message is taken and compares, function is simple and relatively independent, and with higher security, TSM Security Agent connects
The number of the content identical output message received is less than predetermined value, then described TSM Security Agent gives a warning message, and to institute
There is output message to carry out blocking processing.
Brief description of the drawings
, below will be in embodiment or description of the prior art for the technical scheme of clearer explanation the embodiment of the present application
The required accompanying drawing used is briefly described, it is clear that, drawings in the following description are only some implementations of the application
Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is safety method schematic flow sheet of the invention;
Fig. 2 is the schematic network structure of function execution body in existing communication network;
Fig. 3 is one example of the present invention based on the network function system of defense schematic diagram for exporting judgement;
Fig. 4 is the schematic flow sheet of the safety protecting method of an example of the invention.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation
Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common
The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection
Scope.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in present example is carried out clear, complete
Ground is described.Obviously, described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this hair
Embodiment in bright, all other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Present example is when external network is performed when body sends input message to function, it is necessary to will be inputted by TSM Security Agent
Message is comparably forwarded to N number of function and performs body.When function is performed when body external network sends output message, it is necessary to via peace
Full Proxy carries out safety verification, and external network can be just forwarded to by being verified as safe output message, and otherwise TSM Security Agent is sent
Alarm and blocking output message.Safety verification sets corresponding stand-by period window first, and only the output message in time window is done
Synchronization process, and a piece of news for the repetition message that same function execution body is sent only is chosen as judgement foundation.Then, carry
Take effective output content that message is received in time window.Finally, security verified using majority decision mechanism, most straightforward procedure is
Contrast whether at least N number of function performs the output message of body transmissionIt is individual identical.The method provided by the invention, work(
Body can be performed by after attack invasion, attacker is difficult to steal the sensitive number that function performs body by preset leak back door secret
According to, it is also difficult to malice output message is sent to the external network communicated with, so as to improve the security of whole network.
Embodiment 1, with reference to Fig. 3, the network function system of defense based on output judgement of one embodiment of the present of invention
Structural representation.As shown in figure 3, the network function system of defense based on output judgement of present example includes:
N number of function performs body 31, TSM Security Agent 32 and external network 33;
Function, which performs body 31, to be used for and external network communication, realizes corresponding network function;
TSM Security Agent 32 is used for the input message for forwarding external network to send, and the message that body needs to export is performed to function
Processing and safety verification are synchronized, is being received at leastAfter individual content identical output message, the output is disappeared
Breath is forwarded to purpose external network 33;
External network 33 is used to perform body communication with function, realizes corresponding network function;
Wherein, N is the integer more than or equal to 3,ForInteger part.
It will be appreciated that no matter how tight the safeguard procedures of the network equipment are, it can not all ensure being perfectly safe for equipment, and
Because equipment can not accomplish complete controllable, credible in itself, it is impossible to exclude the possibility that its software and hardware system has leak or back door
Property.Function in current network performs dignity and faces a variety of security threats, and a class is leak backdoor attack, and attacker is held using function
The leak of row body itself, back door secret steal its sensitive data;Another kind of is Network Intrusion, and attacker's intrusion function performs body
Afterwards, malice output message is sent as springboard external network, endangers network security.
The network function system of defense based on output judgement that the present invention is implemented, performs body to function and is sent to external network
Output message carries out safety verification, is receiving at leastAfter individual content identical output message, just by the output message
External network is forwarded to, when reducing single or a small amount of function and performing body and invaded or existed leak back door, attacker's secret is stolen
Sensitive data or external network is taken to send the success rate of attack message, even if N number of function performs all leaky back door of body, same
The possibility that one moment sent identical invalid message is very low, effectively increases the security of system.
In actual applications, N number of function performs body and can be integrated in same physical entity, can also be distributed in different
Physical entity;It is same physical entity that TSM Security Agent and function, which perform body, simultaneously, can also be individually present, and is pacified as network is improved
One external entity of independence of full property, the complexity of reduction transformation network, the flexibility with application.Meanwhile, implementing
In, function performs the instantiation that body can be network function control section, the other parts such as forwarding, the storage of network function by
Each function performs body and shared.
It should be noted that in order to take into account the cost of implementation and security that function performs body, practical situation is N etc.
In 3.Function performs the more of body setting, and the network equipment is safer, but the larger cost of implementation of needs and overhead, to same
The performance of step processing and TSM Security Agent is also a challenge.Following examples are illustrated so that N is equal to 3 as an example, when function is performed
When the quantity of body is more than 3, scheme is similar.
Embodiment 2, with reference to Fig. 4, Fig. 4 is the network function security protection based on output judgement of one embodiment of the invention
The schematic flow sheet of method.As shown in figure 4, the safety protecting method of the embodiment of the present invention based on it is above-mentioned based on output judgement
Network function system of defense, including:
S41:When TSM Security Agent receives first output message that function execution body external network is sent, set and wait
Time window simultaneously starts timing;
S42:The TSM Security Agent receives N number of function and performs body output message transmitted in time window, and extracts it
Effectively output content is compared;
S43:The TSM Security Agent is received at leastAfter individual content identical output message, the identical is exported
Message is sent to external network;
Illustrated exemplified by there are 3 functions to perform body in network, input is sent when the network equipment performs body to function
During message, input message is sent to N number of function and performs the external general agency of body --- and in TSM Security Agent, TSM Security Agent will be inputted
Message is comparably forwarded to this 3 functions and performs body;When function, which performs body, is sent out output message, TSM Security Agent is being received
After the message that output is needed to first, corresponding stand-by period window is set, if only received in the time window first
Individual output message, then directly abandon and send alarm;If receiving 2 or 3 effectively output content identical output messages,
The output message is sent to external network.If the output message received is different from, the transmission of output message is blocked simultaneously
Send alarm.
If being less than it is understood that TSM Security Agent receives identical output message numberIndividual, functions are held
Row body receives Network Intrusion or software and hardware system has leak back door, should block the output message that this all participation are compared simultaneously
Send security alarm.
Further, in order to strengthen the security of means of defence, the output message received is carried out in the TSM Security Agent
Before comparing, methods described also includes:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and body is performed with this synchronous N number of function
Output message;
TSM Security Agent timing since being received after a certain output message first time, the phase beyond stand-by period window is not received
Same output message;
If TSM Security Agent receives same function and performs multiple identical output messages that body is sent, only retain the received
One output message.
Due to message package encapsulate otherness, and different soft and hard part function perform body realize consolidated network function to
The output message gone out also likely to be present difference, and contrast of the embodiment of the present invention is not whole output message, but parsing output disappears
Cease the effective output content obtained, i.e., significant content really related to network function in output message.
The embodiment of the present invention carries out effective protection to the network function in network so that network functional entity or subnet without
By by Network Intrusion, virus attack, illegal control, man-in-the-middle attack or in the case of there is preset leak back door, all
It is difficult to cause harm to network or steal sensitive data.The a certain function of attacker's successful attack performs body or a few functions perform body
Can not all serious influence be caused to the network functional entity or subnet protected.
The foregoing description of the disclosed embodiments, is that professional and technical personnel in the field can realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art.It is as defined herein
General Principle can be realized in the case where not departing from the spirit or scope of the embodiment of the present invention in other examples.Therefore, originally
Inventive embodiments are not intended to be limited to the embodiments shown herein, and are to fit to and principles disclosed herein and new
The consistent most wide scope of clever feature.
Claims (7)
1. a kind of network function system of defense based on output judgement, it is characterised in that including:It is N number of to realize identical network function
Function perform body, TSM Security Agent and external network, function performs body and communicated by TSM Security Agent with external network;
Described function performs the instantiation that body is network functional entity or subnet, is used for and external network communication;Described peace
Full Proxy is used for the input message for forwarding external network to send, and performing body to function needs the message exported to synchronize processing
And safety verification;
Described external network is used to perform body communication with function, realizes corresponding network function.
2. the network function system of defense according to claim 1 based on output judgement, it is characterised in that:Described function
The instantiation that body is network functional entity or subnet control section is performed, the other parts of network functional entity or subnet are by each work(
Body can be performed to share.
3. the network function system of defense according to claim 1 based on output judgement, it is characterised in that the safe generation
Reason includes:
Body is performed for encapsulating N number of function, a network functional entity or subnet is externally presented as, acts on behalf of and maintain function to perform
The annexation of body and external network;
Send to perform the input message of body to function and it is comparably distributed to N number of function for receiving external network and perform
Body;
The message of body is performed for receiving N number of function, synchronization process is done to the message for needing to export and extracted in its effective output
Hold.
4. the network function system of defense according to claim 1 based on output judgement, it is characterised in that:Described is N number of
Function performs body and TSM Security Agent is packaged in same physical entity or is distributed in different physical entities.
5. a kind of network function safety protecting method based on output judgement based on described in claim 1-4, it is characterised in that
Comprise the following steps:
The input message of external network is comparably sent to N number of function and performs body;
Performing body to function needs the message exported to do synchronization process;
The output message after synchronization will be analyzed, extract its effective output content and be compared;
Receive at leastAfter individual content identical output message, the output message is forwarded to external network.
6. the network function safety protecting method according to claim 5 based on output judgement, it is characterised in that in safety
Before the output message that proxy interfaces are received is compared, in addition to:
TSM Security Agent pre-sets stand-by period window to the message for needing to export, and is disappeared with the output that this synchronous N number of function performs body
Breath;
TSM Security Agent timing since being received after a certain output message first time, rejection is defeated beyond the identical of stand-by period window
Outbound message;
TSM Security Agent performs multiple identical output messages that body is sent to receiving same function, only retains first received
Output message.
7. the network function safety protecting method according to claim 5 based on output judgement, it is characterised in that:The peace
The number for the content identical output message that Full Proxy is received is less thanWhen individual, then described TSM Security Agent gives a warning
Message, and blocking processing is carried out to all output messages.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710537460.1A CN107294991B (en) | 2017-07-04 | 2017-07-04 | Network function defense system based on output judgment and safety protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710537460.1A CN107294991B (en) | 2017-07-04 | 2017-07-04 | Network function defense system based on output judgment and safety protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107294991A true CN107294991A (en) | 2017-10-24 |
CN107294991B CN107294991B (en) | 2020-03-31 |
Family
ID=60098661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710537460.1A Active CN107294991B (en) | 2017-07-04 | 2017-07-04 | Network function defense system based on output judgment and safety protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107294991B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445803A (en) * | 2019-08-21 | 2019-11-12 | 之江实验室 | A kind of traffic smoothing moving method of isomery cloud platform |
CN110545268A (en) * | 2019-08-21 | 2019-12-06 | 之江实验室 | multidimensional mimicry voting method based on process elements |
CN111585952A (en) * | 2020-03-23 | 2020-08-25 | 浙江大学 | Solution method for coping with virtual host layer attack by Web application on cloud |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130215264A1 (en) * | 2010-07-08 | 2013-08-22 | The Regents Of The University Of California | End-to-end visual recognition system and methods |
CN104766025A (en) * | 2015-03-23 | 2015-07-08 | 中国人民解放军信息工程大学 | Mimicry tamper-proof method of distributed file system |
CN104994104A (en) * | 2015-07-06 | 2015-10-21 | 浙江大学 | Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway |
CN105610813A (en) * | 2015-12-28 | 2016-05-25 | 中国人民解放军信息工程大学 | Mobile communication inter-network honeypot system and method |
CN105791279A (en) * | 2016-02-29 | 2016-07-20 | 中国人民解放军信息工程大学 | Mimic SDN controller construction method |
CN106411937A (en) * | 2016-11-15 | 2017-02-15 | 中国人民解放军信息工程大学 | Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof |
-
2017
- 2017-07-04 CN CN201710537460.1A patent/CN107294991B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130215264A1 (en) * | 2010-07-08 | 2013-08-22 | The Regents Of The University Of California | End-to-end visual recognition system and methods |
CN104766025A (en) * | 2015-03-23 | 2015-07-08 | 中国人民解放军信息工程大学 | Mimicry tamper-proof method of distributed file system |
CN104994104A (en) * | 2015-07-06 | 2015-10-21 | 浙江大学 | Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway |
CN105610813A (en) * | 2015-12-28 | 2016-05-25 | 中国人民解放军信息工程大学 | Mobile communication inter-network honeypot system and method |
CN105791279A (en) * | 2016-02-29 | 2016-07-20 | 中国人民解放军信息工程大学 | Mimic SDN controller construction method |
CN106411937A (en) * | 2016-11-15 | 2017-02-15 | 中国人民解放军信息工程大学 | Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof |
Non-Patent Citations (3)
Title |
---|
邬江兴: "《网络空间拟态防御研究》", 《信息安全学报》 * |
郭威等: "《基于自动机理论的网络攻防模型与安全性能分析》", 《信息安全学报》 * |
陈静: "《基于拟态安全防御的LDoS攻击防御研究》", 《福建电脑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110445803A (en) * | 2019-08-21 | 2019-11-12 | 之江实验室 | A kind of traffic smoothing moving method of isomery cloud platform |
CN110545268A (en) * | 2019-08-21 | 2019-12-06 | 之江实验室 | multidimensional mimicry voting method based on process elements |
CN111585952A (en) * | 2020-03-23 | 2020-08-25 | 浙江大学 | Solution method for coping with virtual host layer attack by Web application on cloud |
Also Published As
Publication number | Publication date |
---|---|
CN107294991B (en) | 2020-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Security issues and challenges for cyber physical system | |
Pournaghshband et al. | Securing legacy mobile medical devices | |
CN100464548C (en) | System and method for blocking worm attack | |
CN107294991A (en) | Network function system of defense and safety protecting method based on output judgement | |
CN104994094B (en) | Virtual platform safety protecting method based on virtual switch, device and system | |
Saeed et al. | Ransomware: A framework for security challenges in internet of things | |
CN105610837A (en) | Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system | |
CN102882859B (en) | A kind of safety protecting method based on public network data transmission information system | |
Kamal et al. | Cybersecurity issues and challenges during COVID-19 pandemic | |
Murthy et al. | Firewalls for security in wireless networks | |
CN102098313A (en) | Waterproof wall system and authentication method thereof | |
Benoit et al. | Mobile terminal security | |
Abdolmaleky et al. | A strengthened version of a hash-based rfid server-less security scheme | |
CN112087294B (en) | Portable safety computer system based on secret hash label protection | |
CN112448916B (en) | Privacy protection method for preventing GAN model attack and protecting CDL training information | |
CN106790028A (en) | A kind of prison and the data transmission method and system of bank's intranet and extranet security isolation | |
CN113630381A (en) | Distributed and artificial intelligence-based duplex energized network attack and defense method and system | |
Singh et al. | A hybrid model for cyberspace security | |
CN106162053A (en) | Video monitoring equipment and networking client thereof | |
Veríssimo et al. | Fundamental security concepts | |
Yang et al. | Computer network attack and defense technology | |
Purohit et al. | Cyber Threats in Internet of Thing systems and Impact reduction | |
CN107819787A (en) | One kind prevents LAN computer illegal external connection system and method | |
CN109922045B (en) | Control method of information processing device | |
Humayed | Securing CAN-based cyber-physical systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |