CN108494737A - A kind of video monitoring safety cut-in method based on equipment feature recognition - Google Patents
A kind of video monitoring safety cut-in method based on equipment feature recognition Download PDFInfo
- Publication number
- CN108494737A CN108494737A CN201810157256.1A CN201810157256A CN108494737A CN 108494737 A CN108494737 A CN 108494737A CN 201810157256 A CN201810157256 A CN 201810157256A CN 108494737 A CN108494737 A CN 108494737A
- Authority
- CN
- China
- Prior art keywords
- management host
- end management
- cpu
- access
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of video monitoring safety cut-in methods based on equipment feature recognition, this method is based on the front end management host being connect with access device, the front end management host is equally connect by center switch with server with general switch, the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host, multiple outside ports connected for access device are provided on the front end management host, each outside port is connect with the CPU of front end management host, the server can issue device type identification feature library by center switch to every front end management host.The present invention carries out the functions such as Port Mirroring, message analysis, equipment feature recognition to realize that illegal access, equipment is counterfeit and unauthorized access is detected and controlled by front end management host to access device;And access device is blocked to communicate and/or only send a warning message etc. processing automatically according to user configuration.
Description
【Technical field】
The present invention relates to the technical field of video surveillance network safety, more particularly to a kind of regarding based on equipment feature recognition
Frequency monitoring safety access method.
【Background technology】
Current video monitoring system is deeply applied to each industry field concerning national economy, wherein being also no lack of relationship
The important department of national security.It is the information with highly confidential value that this, which means that these video datas all, once by
It illegally steals, consequence is hardly imaginable.Therefore it for important department as each video surveillance network especially such as public security, needs
Perfect technological means is taken to prevent what security threat from bringing to seriously affect.
Video monitoring equipment deployment place is mostly exposed to the public places such as road, block, is easily maliciously invaded.Video
Monitoring system has come into IPC (web camera) epoch, and front end camera only needs one IP address of setting can be straight
It is connected in succession in video private network.When front end, camera is deployed in the wide free space in outdoor, easily by unauthorized personnel's object
Reason contact, to cause illegal invasion, destruction and unauthorized access.So one kind can be with automatic identification equipment feature, detection device
It is whether counterfeit, and the means of illegal invasion and unauthorized access is blocked to be very important.
【Invention content】
It is an object of the invention to overcome above-mentioned the deficiencies in the prior art, a kind of video based on equipment feature recognition is provided
Monitor safety access method, aim to solve the problem that video monitoring equipment is easily maliciously invaded in the prior art, cause illegal invasion,
Destruction and unauthorized access, the low technical problem of video monitoring system safety.
To achieve the above object, the present invention proposes a kind of video monitoring safety access side based on equipment feature recognition
Method, for this method based on the front end management host being connect with access device, the front end management host is the same with general switch
It is connect, is provided in the front end management host with illegal access and unauthorized access with server by center switch
The CPU of function is detected and controlled, multiple outside ports connected for access device are provided on the front end management host, often
A outside port is connect with the CPU of front end management host, and the server can be by center switch to every front end
Managing main frame issues device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message,
The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port
Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device,
Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special
Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Nothing is returned less than if if matching
The device type of effect is numbered, and the CPU of front end management host executes action according to user configuration, and goes to S5;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type
It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes
Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification
It levies in library, goes to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching
Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent,
And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and
Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When
When thering is access device to access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow
When abnormal, report and alarm.
Preferably, the device type identification feature library includes:Device type number, device type title, equipment
The authorization message of type protocol feature, port numbers, message length and device type number, the device type protocol characteristic packet
Protocol number is included, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset letter
Breath.
Preferably, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent
Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical
Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Preferably, the front end management host and general switch are communicated by a smooth cat with center switch respectively
Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
Preferably, the general switch can be substituted for front end management host, with center switch communication link
It connects.
Beneficial effects of the present invention:Compared with prior art, a kind of regarding based on equipment feature recognition provided by the invention
Frequency monitoring safety access method carries out Port Mirroring, message analysis, equipment feature to access device by front end management host and knows
The functions such as not realize that illegal access, equipment be counterfeit and unauthorized access detects and controls;And it is hindered automatically according to user configuration
Disconnected access device communication and/or the processing such as only send a warning message.More traditional video frequency monitoring method, has the following advantages that:
1), secure accessing directly accomplishes front end management host port, can automatically rapidly identification equipment type, find it is illegal
It accesses and blocks, detect counterfeit equipment and access and block and automatically update device type identification feature library;
2) environment in an effective safety, can be formed, while all being found and being blocked in up going port and down going port;
If 3), all deploy front end management host, it can ensure that access safety, safety carry significantly in total system
It is high.
The feature and advantage of the present invention will be described in detail by embodiment combination attached drawing.
【Description of the drawings】
Fig. 1 is the layout of the video monitoring network system of the embodiment of the present invention;
Fig. 2 is a kind of flow of video monitoring safety cut-in method based on equipment feature recognition of the embodiment of the present invention
Figure.
【Specific implementation mode】
In order to make the objectives, technical solutions and advantages of the present invention clearer, below by accompanying drawings and embodiments, to this
Invention is further elaborated.However, it should be understood that the specific embodiments described herein are merely illustrative of the present invention,
The range being not intended to restrict the invention.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to keep away
Exempt from unnecessarily to obscure idea of the invention.
Refering to fig. 1 and Fig. 2, the embodiment of the present invention provide a kind of video monitoring safety access side based on equipment feature recognition
Method, for this method based on the front end management host being connect with access device, the front end management host is the same with general switch
It is connect, is provided in the front end management host with illegal access and unauthorized access with server by center switch
The CPU of function is detected and controlled, multiple outside ports connected for access device are provided on the front end management host, often
A outside port is connect with the CPU of front end management host, and the server can be by center switch to every front end
Managing main frame issues device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message,
The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port
Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device,
Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code.
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special
Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Nothing is returned less than if if matching
The device type of effect is numbered, and the CPU of front end management host executes action according to user configuration, and goes to S5.
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type
It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes
Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification
It levies in library, goes to S5.
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching
Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent,
And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and
Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6.
In embodiments of the present invention, S2 access devices identify, are to determine that the access is set by the identification of device type feature
Standby is what kind of equipment, for example is the equipment of which production, what kind of equipment;The legal identification of S3 equipment is into one
It walks and authority checking is carried out to the type of the equipment, determine whether the access device is legitimate device by mandate, but more than
Two steps can not detect whether the access device is counterfeit equipment, and the personation identification of S4 equipment can be according to the IP of access device
Address and MAC Address (embedding a unique MAC Address when each network equipment (such as network interface card, hub, router) production)
Matched with device type identification feature library whether consistent and compatibility relation, whether the equipment of automatic detection access is counterfeit
Equipment.For example, when match it is inconsistent when, there are it is following the fact that, i.e., the network interface card in the access device carried out replacement,
Then the MAC Address of the access device is exactly the MAC Address of the network interface card, if the network interface card be by certification can with the access device into
Row is matched, means that the access device and the MAC Address are compatible, it can be assumed that being non-counterfeit devices;Otherwise incompatible, it can
It is exactly counterfeit devices to regard as the access device.
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When
When thering is access device to access front end management host, then S1 is back to.
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow
When abnormal, report and alarm.
Wherein, the device type identification feature library includes:Device type number, device type title, device type
The authorization message of protocol characteristic, port numbers, message length and device type number, the device type protocol characteristic include association
View number, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
Further, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent
Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical
Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Further, the front end management host and general switch are logical by a smooth cat and center switch respectively
Letter connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
In embodiments of the present invention, camera is connect as access device with the outside port on front end management host,
In, the outside port being connect with camera uses RJ45 interfaces, the outside port being connect with light cat to use RJ45-UP interfaces, tool
Body utilization is as follows, refering to fig. 1:
1) access device of unauthorized access, is accessed from the RJ45 mouths of front end management host, at this point, front end management host point
Mirror image this paper of the port is analysed, if it find that the equipment puts to the proof information not in device type identification feature library, then according to user
Configuration directly blocks the access device to communicate and sends " illegal access " warning information or only send " illegal access " warning information.
2), if it find that identifying spy from the device type of front end management host local or server according to device IP and MAC
Obtained device type and to put to the proof the device type obtained from device type identification feature library according to equipment inconsistent in sign library,
It then directly blocks the access device to communicate according to user configuration and sends " equipment is counterfeit " warning information or only send that " equipment is imitative
Emit " warning information;If it is the known device type equipment being newly added, then the access device information is added to front end management master
In machine local or the device type identification feature library of server.
3) access device of unauthorized access, is accessed from the RJ45 mouths of general switch, which can
It, should but if being accessed by front end management host RJ45-UP the data for the other-end for not being front end management host are accessed
The data of front end management host, then mirror image this paper of the front end management host analysis port, believes if it find that the equipment is put to the proof
Breath then executes devices block according to user configuration and alerts or only alert not in device type identification feature library;If this sets
It is inconsistent in standby type number and device type identification feature library, then according to user configuration execution devices block and alarm or only
Alarm.
4) access device of unauthorized access, is accessed from the RJ45 mouths of center switch, which can
It, should but if being accessed by front end management host RJ45-UP the data for the other-end for not being front end management host are accessed
The data of front end management host, mirror image this paper of the front end management host analysis port, if it find that the access device is put to the proof
Information then executes devices block according to user configuration and alerts or only alert not in device type identification feature library;If should
Device type number and device type identification feature library in it is inconsistent, then according to user configuration execute devices block and alert or
Only alert.
In embodiments of the present invention, the general switch can be substituted for front end management host, be exchanged with center
Machine communicates to connect.When all deploying front end management host, then it can ensure access safety in total system, realize video monitoring comprehensively
The safety of network.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modification, equivalent replacement or improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (5)
1. a kind of video monitoring safety cut-in method based on equipment feature recognition, it is characterised in that:This method is based on and access
The front end management host of equipment connection, the front end management host equally pass through center switch and clothes with general switch
Business device connects, and the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host,
It is provided with multiple outside ports connected for access device on the front end management host, each outside port is and front tube
The CPU connections of host are managed, the server can issue device type by center switch to every front end management host
Identification feature library, this method are as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, front end
The CPU of managing main frame starts Port Mirroring poll, according to the sequence of front end management host outside port, successively by message mirror
As managing mouth to CPU, the CPU of front end management host analyzes mirror image message, obtains the information of each access device, including
Access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host is according to the condition code of access device in device type identification feature library
In matched, if matched arrive, returning equipment type number, and go to S3;
Invalid device type number is returned to less than if if matching, and the CPU of front end management host is held according to user configuration
Action is made, and goes to S5;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return in device type identification feature
It is matched in library, verifies the authorization message of the device type, then tentatively confirm that the access device is legal if the verification passes
Authorisation device, and go to S4;If verification does not pass through, the information of the access device is added to device type identification feature library
In, go to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching unit
Type identification feature database and does not have if the device type number returned and identifying inconsistent in device type identification feature library
There is compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and goes to
S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When connecing
When entering equipment access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow be abnormal
When, report and alarm.
2. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that:
The device type identification feature library includes:Device type number, device type title, device type protocol characteristic, port
Number, message length and device type number authorization message, the device type protocol characteristic includes protocol number, each sets
Standby type protocol feature includes one or more features code, condition code mask, condition code offset information.
3. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that:
In the S2 and S4, if user configuration is alarm, the CPU of front end management host sends a warning message;If user
Configuration is to block and alert, then the CPU of front end management host directly blocks the access device to communicate, and sends a warning message,
Wherein, the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
4. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that:
The front end management host and general switch are communicated to connect by a smooth cat and center switch respectively, and different front ends
It can be communicated to connect between managing main frame, between front end management host and general switch.
5. a kind of video monitoring safety cut-in method based on white list and constraint set flow control as described in claim 1 or 4,
It is characterized in that:The general switch can be substituted for front end management host, be communicated to connect with center switch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810157256.1A CN108494737A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810157256.1A CN108494737A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108494737A true CN108494737A (en) | 2018-09-04 |
Family
ID=63340638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810157256.1A Pending CN108494737A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108494737A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113345A (en) * | 2019-05-13 | 2019-08-09 | 四川长虹电器股份有限公司 | A method of the assets based on Internet of Things flow are found automatically |
CN110290124A (en) * | 2019-06-14 | 2019-09-27 | 杭州迪普科技股份有限公司 | A kind of interchanger inbound port blocking-up method and device |
CN110913179A (en) * | 2019-12-02 | 2020-03-24 | 北京志成合创信息技术有限公司 | Intelligent management and control method, device, equipment and storage medium for video monitoring equipment |
CN111277421A (en) * | 2018-11-16 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | System and method for network camera access safety protection |
CN114978721A (en) * | 2022-05-26 | 2022-08-30 | 新华三信息安全技术有限公司 | Access detection method and device of terminal equipment, electronic equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916625A (en) * | 2013-01-04 | 2014-07-09 | 北京兆维电子(集团)有限责任公司 | Video monitoring system and method based on cloud computing |
CN105356595A (en) * | 2011-10-28 | 2016-02-24 | 江苏省电力公司常州供电公司 | Intensive remote management and control system |
CN105450619A (en) * | 2014-09-28 | 2016-03-30 | 腾讯科技(深圳)有限公司 | Method, device and system of protection of hostile attacks |
CN105791047A (en) * | 2016-02-29 | 2016-07-20 | 农忠海 | Method for controlling management system of secure video private network |
CN107302527A (en) * | 2017-06-09 | 2017-10-27 | 北京奇安信科技有限公司 | A kind of unit exception detection method and device |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
-
2018
- 2018-02-24 CN CN201810157256.1A patent/CN108494737A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105356595A (en) * | 2011-10-28 | 2016-02-24 | 江苏省电力公司常州供电公司 | Intensive remote management and control system |
CN103916625A (en) * | 2013-01-04 | 2014-07-09 | 北京兆维电子(集团)有限责任公司 | Video monitoring system and method based on cloud computing |
CN105450619A (en) * | 2014-09-28 | 2016-03-30 | 腾讯科技(深圳)有限公司 | Method, device and system of protection of hostile attacks |
CN105791047A (en) * | 2016-02-29 | 2016-07-20 | 农忠海 | Method for controlling management system of secure video private network |
CN107302527A (en) * | 2017-06-09 | 2017-10-27 | 北京奇安信科技有限公司 | A kind of unit exception detection method and device |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277421A (en) * | 2018-11-16 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | System and method for network camera access safety protection |
CN111277421B (en) * | 2018-11-16 | 2022-09-23 | 慧盾信息安全科技(苏州)股份有限公司 | System and method for network camera access safety protection |
CN110113345A (en) * | 2019-05-13 | 2019-08-09 | 四川长虹电器股份有限公司 | A method of the assets based on Internet of Things flow are found automatically |
CN110113345B (en) * | 2019-05-13 | 2021-04-06 | 四川长虹电器股份有限公司 | Automatic asset discovery method based on flow of Internet of things |
CN110290124A (en) * | 2019-06-14 | 2019-09-27 | 杭州迪普科技股份有限公司 | A kind of interchanger inbound port blocking-up method and device |
CN110913179A (en) * | 2019-12-02 | 2020-03-24 | 北京志成合创信息技术有限公司 | Intelligent management and control method, device, equipment and storage medium for video monitoring equipment |
CN114978721A (en) * | 2022-05-26 | 2022-08-30 | 新华三信息安全技术有限公司 | Access detection method and device of terminal equipment, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108494737A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition | |
CN108521399A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition and white list | |
US8200798B2 (en) | Address security in a routed access network | |
CN108521398A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition, white list and constraint set flow control | |
CN109729180B (en) | Whole system intelligent community platform | |
CN100384150C (en) | Method and system for preventing asynchronous ARP cache poisoning of multiple hosts | |
CN106465416A (en) | Sensor network gateway | |
CN108156043A (en) | A kind of video monitoring safety cut-in method based on white list and constraint set flow control | |
CN107395588A (en) | Video monitoring accesses safe blocking-up method and system | |
JP3618245B2 (en) | Network monitoring system | |
CN101529862A (en) | Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis | |
CN108629201A (en) | A method of database illegal operation is blocked | |
KR20040099864A (en) | Security gateway system and method for intrusion detection | |
CN107276983A (en) | A kind of the traffic security control method and system synchronous with cloud based on DPI | |
CN112491888A (en) | Method and system for preventing equipment from being falsely used | |
CN109981587A (en) | A kind of network security monitoring traceability system based on APT attack | |
CN111970233B (en) | Analysis and identification method for network violation external connection scene | |
KR101308085B1 (en) | Intrusion prevention system using correlation attack pattern and method thereof | |
CN112565202A (en) | Internet of things access gateway for video network system | |
CN103139056A (en) | Secure gateway and network data interactive method | |
CN114900377B (en) | Induction data packet-based illegal external connection monitoring method and system | |
CN107864164B (en) | Linkage alarm device based on IP embezzlement and MAC address tampering | |
CN108206828A (en) | A kind of double monitoring method of controlling security and system | |
CN114124884A (en) | Local area network IP address abuse detection device and method | |
CN109922058B (en) | Intranet protection method for preventing illegal access to intranet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 311800 Jiyang city street, Jiyang, Zhuji, Shaoxing, Zhejiang (Jiyang Industrial Park) Applicant after: Zhejiang Yuanwang Telecom Technology Co., Ltd Address before: 311800 Shaoxing, Zhuji, Zhejiang Jiyang Road 98 North Ring Road No. Applicant before: Zhejiang Yuanwang Telecom Technology Co., Ltd |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180904 |
|
RJ01 | Rejection of invention patent application after publication |