CN107958322B - 一种城市网络空间综合治理系统 - Google Patents
一种城市网络空间综合治理系统 Download PDFInfo
- Publication number
- CN107958322B CN107958322B CN201710934868.2A CN201710934868A CN107958322B CN 107958322 B CN107958322 B CN 107958322B CN 201710934868 A CN201710934868 A CN 201710934868A CN 107958322 B CN107958322 B CN 107958322B
- Authority
- CN
- China
- Prior art keywords
- network
- monitoring
- subsystem
- data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Z—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS, NOT OTHERWISE PROVIDED FOR
- G16Z99/00—Subject matter not provided for in other main groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2219/00—Indexing scheme relating to application aspects of data processing equipment or methods
- G06F2219/10—Environmental application, e.g. waste reduction, pollution control, compliance with environmental legislation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02A—TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
- Y02A30/00—Adapting or protecting infrastructure or their operation
- Y02A30/60—Planning or developing urban green infrastructure
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Virology (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710934868.2A CN107958322B (zh) | 2017-10-09 | 2017-10-09 | 一种城市网络空间综合治理系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710934868.2A CN107958322B (zh) | 2017-10-09 | 2017-10-09 | 一种城市网络空间综合治理系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107958322A CN107958322A (zh) | 2018-04-24 |
CN107958322B true CN107958322B (zh) | 2021-08-10 |
Family
ID=61953954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710934868.2A Active CN107958322B (zh) | 2017-10-09 | 2017-10-09 | 一种城市网络空间综合治理系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107958322B (zh) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147423A (zh) * | 2018-11-02 | 2020-05-12 | 千寻位置网络有限公司 | 风险的感知方法及装置、监控系统 |
CN109460922A (zh) * | 2018-11-13 | 2019-03-12 | 电子科技大学 | 一种具有电力行业特征的网络舆情分析与辅助决策系统 |
CN109377439A (zh) * | 2018-12-04 | 2019-02-22 | 北京唐冠天朗科技开发有限公司 | 一种城市安全信息管理系统、方法及数据处理中心 |
CN109542011B (zh) * | 2018-12-05 | 2021-10-22 | 国网江西省电力有限公司信息通信分公司 | 一种多源异构监测数据的标准化采集系统 |
CN109688607B (zh) * | 2019-01-02 | 2022-03-01 | 成都华日通讯技术股份有限公司 | 一种可应用于低速无线网络传输的频谱数据压缩方法 |
CN110149307A (zh) * | 2019-04-03 | 2019-08-20 | 广东申立信息工程股份有限公司 | 一种idc安全管理系统 |
CN110535855B (zh) * | 2019-08-28 | 2021-07-30 | 北京安御道合科技有限公司 | 一种网络事件监测分析方法和系统、信息数据处理终端 |
CN112948638B (zh) * | 2019-12-11 | 2023-09-05 | 中国移动通信集团海南有限公司 | 一种图谱构建方法、装置、存储介质和计算机设备 |
CN111026780A (zh) * | 2019-12-18 | 2020-04-17 | 成都迪普曼林信息技术有限公司 | 地区安全态势信息管理系统 |
CN111696310B (zh) * | 2020-06-10 | 2021-07-30 | 北京市燃气集团有限责任公司 | 一种燃气管网空天地立体安全风险防控系统和防控方法 |
CN111832017B (zh) * | 2020-07-17 | 2023-08-11 | 中国移动通信集团广西有限公司 | 一种面向云的数据库安全态势感知系统 |
CN112104656B (zh) * | 2020-09-16 | 2022-07-12 | 杭州安恒信息安全技术有限公司 | 一种网络威胁数据获取方法、装置、设备及介质 |
CN112286986B (zh) * | 2020-10-14 | 2021-08-03 | 北京乾唐伟业科技股份公司 | 一种基于企业族谱的产权分析管理系统 |
CN112416754B (zh) * | 2020-11-02 | 2021-09-03 | 中关村科学城城市大脑股份有限公司 | 一种模型评测方法、终端、系统及存储介质 |
CN112583842A (zh) * | 2020-12-23 | 2021-03-30 | 黑龙江省网络空间研究中心 | 一种基于数据流处理的网络安全态势感知系统平台 |
CN113157333B (zh) * | 2021-03-25 | 2022-09-02 | 中国电子科技集团公司第二十九研究所 | 一种态势标绘插件前端集成系统 |
CN113220826A (zh) * | 2021-04-19 | 2021-08-06 | 贵州云创凤巢科技有限公司 | 一种基于自然语言处理技术和大数据分析的科创服务平台 |
CN114240013B (zh) * | 2021-07-30 | 2022-11-08 | 北京永信至诚科技股份有限公司 | 一种面向关键信息基础设施的防务指挥方法及系统 |
CN114610799B (zh) * | 2022-05-11 | 2022-07-22 | 未名环境分子诊断(常熟)有限公司 | 基于环境监测的数据处理方法、设备及存储介质 |
CN115484176A (zh) * | 2022-09-02 | 2022-12-16 | 浪潮云信息技术股份公司 | 一种针对分布式云体系运行态势感知分层设计方法及系统 |
CN116384729B (zh) * | 2023-02-07 | 2024-03-01 | 中国安全生产科学研究院 | 一种城市安全风险智能化防控方法及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365867A (zh) * | 2012-03-29 | 2013-10-23 | 腾讯科技(深圳)有限公司 | 一种对用户评价进行情感分析的方法和装置 |
CN103455705A (zh) * | 2013-05-24 | 2013-12-18 | 中国科学院自动化研究所 | 网络社会事件的协同关联跟踪及全局态势分析与预测系统 |
CN104657931A (zh) * | 2013-11-22 | 2015-05-27 | 神州数码信息系统有限公司 | 一种城市级安全服务平台的设计 |
CN104660558A (zh) * | 2013-11-22 | 2015-05-27 | 神州数码信息系统有限公司 | 一种面向智慧城市的跨城市安全服务平台态势感知技术的方法 |
CN105553957A (zh) * | 2015-12-09 | 2016-05-04 | 国家电网公司 | 基于大数据的网络安全态势感知预警方法和系统 |
CN106537406A (zh) * | 2014-07-18 | 2017-03-22 | Empow网络安全有限责任公司 | 一种网络安全系统及其方法 |
CN107196910A (zh) * | 2017-04-18 | 2017-09-22 | 国网山东省电力公司电力科学研究院 | 基于大数据分析的威胁预警监测系统、方法及部署架构 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170036509A (ko) * | 2015-09-24 | 2017-04-03 | 삼성전자주식회사 | 통신 시스템에서 패킷을 스케쥴링하는 장치 및 방법 |
-
2017
- 2017-10-09 CN CN201710934868.2A patent/CN107958322B/zh active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365867A (zh) * | 2012-03-29 | 2013-10-23 | 腾讯科技(深圳)有限公司 | 一种对用户评价进行情感分析的方法和装置 |
CN103455705A (zh) * | 2013-05-24 | 2013-12-18 | 中国科学院自动化研究所 | 网络社会事件的协同关联跟踪及全局态势分析与预测系统 |
CN104657931A (zh) * | 2013-11-22 | 2015-05-27 | 神州数码信息系统有限公司 | 一种城市级安全服务平台的设计 |
CN104660558A (zh) * | 2013-11-22 | 2015-05-27 | 神州数码信息系统有限公司 | 一种面向智慧城市的跨城市安全服务平台态势感知技术的方法 |
CN106537406A (zh) * | 2014-07-18 | 2017-03-22 | Empow网络安全有限责任公司 | 一种网络安全系统及其方法 |
CN105553957A (zh) * | 2015-12-09 | 2016-05-04 | 国家电网公司 | 基于大数据的网络安全态势感知预警方法和系统 |
CN107196910A (zh) * | 2017-04-18 | 2017-09-22 | 国网山东省电力公司电力科学研究院 | 基于大数据分析的威胁预警监测系统、方法及部署架构 |
Also Published As
Publication number | Publication date |
---|---|
CN107958322A (zh) | 2018-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107958322B (zh) | 一种城市网络空间综合治理系统 | |
US20200389495A1 (en) | Secure policy-controlled processing and auditing on regulated data sets | |
US11025674B2 (en) | Cybersecurity profiling and rating using active and passive external reconnaissance | |
Ahmad et al. | Cyber security in iot-based cloud computing: A comprehensive survey | |
Lee et al. | An effective security measures for nuclear power plant using big data analysis approach | |
US10333971B2 (en) | Systems and methods for detecting and preventing cyber-threats | |
US20220210200A1 (en) | Ai-driven defensive cybersecurity strategy analysis and recommendation system | |
US9838419B1 (en) | Detection and remediation of watering hole attacks directed against an enterprise | |
US20220014560A1 (en) | Correlating network event anomalies using active and passive external reconnaissance to identify attack information | |
CN107409126B (zh) | 用于保护企业计算环境安全的系统和方法 | |
US10681060B2 (en) | Computer-implemented method for determining computer system security threats, security operations center system and computer program product | |
CN113486351A (zh) | 一种民航空管网络安全检测预警平台 | |
US20210360032A1 (en) | Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance | |
CN104246785A (zh) | 用于移动应用声誉的众包的系统和方法 | |
CN108154029A (zh) | 入侵检测方法、电子设备和计算机存储介质 | |
US10742664B2 (en) | Probabilistically detecting low-intensity, multi-modal threats using synthetic events | |
CN110020687B (zh) | 基于操作人员态势感知画像的异常行为分析方法及装置 | |
KR20140035146A (ko) | 정보보안 장치 및 방법 | |
Azam et al. | Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective | |
CN113918938A (zh) | 一种持续免疫安全系统的用户实体行为分析方法及系统 | |
Mateus-Coelho et al. | Exploring Cyber Criminals and Data Privacy Measures | |
Swart et al. | Adaptation of the JDL model for multi-sensor national cyber security data fusion | |
Yan et al. | Graph mining for cybersecurity: A survey | |
CN113923037B (zh) | 一种基于可信计算的异常检测优化装置、方法及系统 | |
Iorliam | Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Yi Inventor after: Xu Bin Inventor after: Shen Ziran Inventor after: Liu Jiayao Inventor after: Xiao Gang Inventor before: Pan Wei Inventor before: Sun Ting Inventor before: Li Yi Inventor before: Ding Jie Inventor before: Shen Ziran Inventor before: Ye Yun Inventor before: Zhou Cuicui |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |