CN108494737A - A kind of video monitoring safety cut-in method based on equipment feature recognition - Google Patents

A kind of video monitoring safety cut-in method based on equipment feature recognition Download PDF

Info

Publication number
CN108494737A
CN108494737A CN201810157256.1A CN201810157256A CN108494737A CN 108494737 A CN108494737 A CN 108494737A CN 201810157256 A CN201810157256 A CN 201810157256A CN 108494737 A CN108494737 A CN 108494737A
Authority
CN
China
Prior art keywords
management host
end management
cpu
access
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810157256.1A
Other languages
Chinese (zh)
Inventor
傅如毅
龚昌北
杨玲
金张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Original Assignee
ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd filed Critical ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Priority to CN201810157256.1A priority Critical patent/CN108494737A/en
Publication of CN108494737A publication Critical patent/CN108494737A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of video monitoring safety cut-in methods based on equipment feature recognition, this method is based on the front end management host being connect with access device, the front end management host is equally connect by center switch with server with general switch, the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host, multiple outside ports connected for access device are provided on the front end management host, each outside port is connect with the CPU of front end management host, the server can issue device type identification feature library by center switch to every front end management host.The present invention carries out the functions such as Port Mirroring, message analysis, equipment feature recognition to realize that illegal access, equipment is counterfeit and unauthorized access is detected and controlled by front end management host to access device;And access device is blocked to communicate and/or only send a warning message etc. processing automatically according to user configuration.

Description

A kind of video monitoring safety cut-in method based on equipment feature recognition
【Technical field】
The present invention relates to the technical field of video surveillance network safety, more particularly to a kind of regarding based on equipment feature recognition Frequency monitoring safety access method.
【Background technology】
Current video monitoring system is deeply applied to each industry field concerning national economy, wherein being also no lack of relationship The important department of national security.It is the information with highly confidential value that this, which means that these video datas all, once by It illegally steals, consequence is hardly imaginable.Therefore it for important department as each video surveillance network especially such as public security, needs Perfect technological means is taken to prevent what security threat from bringing to seriously affect.
Video monitoring equipment deployment place is mostly exposed to the public places such as road, block, is easily maliciously invaded.Video Monitoring system has come into IPC (web camera) epoch, and front end camera only needs one IP address of setting can be straight It is connected in succession in video private network.When front end, camera is deployed in the wide free space in outdoor, easily by unauthorized personnel's object Reason contact, to cause illegal invasion, destruction and unauthorized access.So one kind can be with automatic identification equipment feature, detection device It is whether counterfeit, and the means of illegal invasion and unauthorized access is blocked to be very important.
【Invention content】
It is an object of the invention to overcome above-mentioned the deficiencies in the prior art, a kind of video based on equipment feature recognition is provided Monitor safety access method, aim to solve the problem that video monitoring equipment is easily maliciously invaded in the prior art, cause illegal invasion, Destruction and unauthorized access, the low technical problem of video monitoring system safety.
To achieve the above object, the present invention proposes a kind of video monitoring safety access side based on equipment feature recognition Method, for this method based on the front end management host being connect with access device, the front end management host is the same with general switch It is connect, is provided in the front end management host with illegal access and unauthorized access with server by center switch The CPU of function is detected and controlled, multiple outside ports connected for access device are provided on the front end management host, often A outside port is connect with the CPU of front end management host, and the server can be by center switch to every front end Managing main frame issues device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device, Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Nothing is returned less than if if matching The device type of effect is numbered, and the CPU of front end management host executes action according to user configuration, and goes to S5;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification It levies in library, goes to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent, And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When When thering is access device to access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow When abnormal, report and alarm.
Preferably, the device type identification feature library includes:Device type number, device type title, equipment The authorization message of type protocol feature, port numbers, message length and device type number, the device type protocol characteristic packet Protocol number is included, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset letter Breath.
Preferably, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Preferably, the front end management host and general switch are communicated by a smooth cat with center switch respectively Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
Preferably, the general switch can be substituted for front end management host, with center switch communication link It connects.
Beneficial effects of the present invention:Compared with prior art, a kind of regarding based on equipment feature recognition provided by the invention Frequency monitoring safety access method carries out Port Mirroring, message analysis, equipment feature to access device by front end management host and knows The functions such as not realize that illegal access, equipment be counterfeit and unauthorized access detects and controls;And it is hindered automatically according to user configuration Disconnected access device communication and/or the processing such as only send a warning message.More traditional video frequency monitoring method, has the following advantages that:
1), secure accessing directly accomplishes front end management host port, can automatically rapidly identification equipment type, find it is illegal It accesses and blocks, detect counterfeit equipment and access and block and automatically update device type identification feature library;
2) environment in an effective safety, can be formed, while all being found and being blocked in up going port and down going port;
If 3), all deploy front end management host, it can ensure that access safety, safety carry significantly in total system It is high.
The feature and advantage of the present invention will be described in detail by embodiment combination attached drawing.
【Description of the drawings】
Fig. 1 is the layout of the video monitoring network system of the embodiment of the present invention;
Fig. 2 is a kind of flow of video monitoring safety cut-in method based on equipment feature recognition of the embodiment of the present invention Figure.
【Specific implementation mode】
In order to make the objectives, technical solutions and advantages of the present invention clearer, below by accompanying drawings and embodiments, to this Invention is further elaborated.However, it should be understood that the specific embodiments described herein are merely illustrative of the present invention, The range being not intended to restrict the invention.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to keep away Exempt from unnecessarily to obscure idea of the invention.
Refering to fig. 1 and Fig. 2, the embodiment of the present invention provide a kind of video monitoring safety access side based on equipment feature recognition Method, for this method based on the front end management host being connect with access device, the front end management host is the same with general switch It is connect, is provided in the front end management host with illegal access and unauthorized access with server by center switch The CPU of function is detected and controlled, multiple outside ports connected for access device are provided on the front end management host, often A outside port is connect with the CPU of front end management host, and the server can be by center switch to every front end Managing main frame issues device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device, Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code.
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Nothing is returned less than if if matching The device type of effect is numbered, and the CPU of front end management host executes action according to user configuration, and goes to S5.
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification It levies in library, goes to S5.
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent, And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6.
In embodiments of the present invention, S2 access devices identify, are to determine that the access is set by the identification of device type feature Standby is what kind of equipment, for example is the equipment of which production, what kind of equipment;The legal identification of S3 equipment is into one It walks and authority checking is carried out to the type of the equipment, determine whether the access device is legitimate device by mandate, but more than Two steps can not detect whether the access device is counterfeit equipment, and the personation identification of S4 equipment can be according to the IP of access device Address and MAC Address (embedding a unique MAC Address when each network equipment (such as network interface card, hub, router) production) Matched with device type identification feature library whether consistent and compatibility relation, whether the equipment of automatic detection access is counterfeit Equipment.For example, when match it is inconsistent when, there are it is following the fact that, i.e., the network interface card in the access device carried out replacement, Then the MAC Address of the access device is exactly the MAC Address of the network interface card, if the network interface card be by certification can with the access device into Row is matched, means that the access device and the MAC Address are compatible, it can be assumed that being non-counterfeit devices;Otherwise incompatible, it can It is exactly counterfeit devices to regard as the access device.
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When When thering is access device to access front end management host, then S1 is back to.
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow When abnormal, report and alarm.
Wherein, the device type identification feature library includes:Device type number, device type title, device type The authorization message of protocol characteristic, port numbers, message length and device type number, the device type protocol characteristic include association View number, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
Further, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Further, the front end management host and general switch are logical by a smooth cat and center switch respectively Letter connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
In embodiments of the present invention, camera is connect as access device with the outside port on front end management host, In, the outside port being connect with camera uses RJ45 interfaces, the outside port being connect with light cat to use RJ45-UP interfaces, tool Body utilization is as follows, refering to fig. 1:
1) access device of unauthorized access, is accessed from the RJ45 mouths of front end management host, at this point, front end management host point Mirror image this paper of the port is analysed, if it find that the equipment puts to the proof information not in device type identification feature library, then according to user Configuration directly blocks the access device to communicate and sends " illegal access " warning information or only send " illegal access " warning information.
2), if it find that identifying spy from the device type of front end management host local or server according to device IP and MAC Obtained device type and to put to the proof the device type obtained from device type identification feature library according to equipment inconsistent in sign library, It then directly blocks the access device to communicate according to user configuration and sends " equipment is counterfeit " warning information or only send that " equipment is imitative Emit " warning information;If it is the known device type equipment being newly added, then the access device information is added to front end management master In machine local or the device type identification feature library of server.
3) access device of unauthorized access, is accessed from the RJ45 mouths of general switch, which can It, should but if being accessed by front end management host RJ45-UP the data for the other-end for not being front end management host are accessed The data of front end management host, then mirror image this paper of the front end management host analysis port, believes if it find that the equipment is put to the proof Breath then executes devices block according to user configuration and alerts or only alert not in device type identification feature library;If this sets It is inconsistent in standby type number and device type identification feature library, then according to user configuration execution devices block and alarm or only Alarm.
4) access device of unauthorized access, is accessed from the RJ45 mouths of center switch, which can It, should but if being accessed by front end management host RJ45-UP the data for the other-end for not being front end management host are accessed The data of front end management host, mirror image this paper of the front end management host analysis port, if it find that the access device is put to the proof Information then executes devices block according to user configuration and alerts or only alert not in device type identification feature library;If should Device type number and device type identification feature library in it is inconsistent, then according to user configuration execute devices block and alert or Only alert.
In embodiments of the present invention, the general switch can be substituted for front end management host, be exchanged with center Machine communicates to connect.When all deploying front end management host, then it can ensure access safety in total system, realize video monitoring comprehensively The safety of network.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention Any modification, equivalent replacement or improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (5)

1. a kind of video monitoring safety cut-in method based on equipment feature recognition, it is characterised in that:This method is based on and access The front end management host of equipment connection, the front end management host equally pass through center switch and clothes with general switch Business device connects, and the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host, It is provided with multiple outside ports connected for access device on the front end management host, each outside port is and front tube The CPU connections of host are managed, the server can issue device type by center switch to every front end management host Identification feature library, this method are as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, front end The CPU of managing main frame starts Port Mirroring poll, according to the sequence of front end management host outside port, successively by message mirror As managing mouth to CPU, the CPU of front end management host analyzes mirror image message, obtains the information of each access device, including Access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host is according to the condition code of access device in device type identification feature library In matched, if matched arrive, returning equipment type number, and go to S3;
Invalid device type number is returned to less than if if matching, and the CPU of front end management host is held according to user configuration Action is made, and goes to S5;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return in device type identification feature It is matched in library, verifies the authorization message of the device type, then tentatively confirm that the access device is legal if the verification passes Authorisation device, and go to S4;If verification does not pass through, the information of the access device is added to device type identification feature library In, go to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching unit Type identification feature database and does not have if the device type number returned and identifying inconsistent in device type identification feature library There is compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and goes to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When connecing When entering equipment access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow be abnormal When, report and alarm.
2. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that: The device type identification feature library includes:Device type number, device type title, device type protocol characteristic, port Number, message length and device type number authorization message, the device type protocol characteristic includes protocol number, each sets Standby type protocol feature includes one or more features code, condition code mask, condition code offset information.
3. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that: In the S2 and S4, if user configuration is alarm, the CPU of front end management host sends a warning message;If user Configuration is to block and alert, then the CPU of front end management host directly blocks the access device to communicate, and sends a warning message, Wherein, the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
4. a kind of video monitoring safety cut-in method based on equipment feature recognition as described in claim 1, it is characterised in that: The front end management host and general switch are communicated to connect by a smooth cat and center switch respectively, and different front ends It can be communicated to connect between managing main frame, between front end management host and general switch.
5. a kind of video monitoring safety cut-in method based on white list and constraint set flow control as described in claim 1 or 4, It is characterized in that:The general switch can be substituted for front end management host, be communicated to connect with center switch.
CN201810157256.1A 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition Pending CN108494737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810157256.1A CN108494737A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810157256.1A CN108494737A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition

Publications (1)

Publication Number Publication Date
CN108494737A true CN108494737A (en) 2018-09-04

Family

ID=63340638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810157256.1A Pending CN108494737A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition

Country Status (1)

Country Link
CN (1) CN108494737A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113345A (en) * 2019-05-13 2019-08-09 四川长虹电器股份有限公司 A method of the assets based on Internet of Things flow are found automatically
CN110290124A (en) * 2019-06-14 2019-09-27 杭州迪普科技股份有限公司 A kind of interchanger inbound port blocking-up method and device
CN110913179A (en) * 2019-12-02 2020-03-24 北京志成合创信息技术有限公司 Intelligent management and control method, device, equipment and storage medium for video monitoring equipment
CN111277421A (en) * 2018-11-16 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 System and method for network camera access safety protection
CN114978721A (en) * 2022-05-26 2022-08-30 新华三信息安全技术有限公司 Access detection method and device of terminal equipment, electronic equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916625A (en) * 2013-01-04 2014-07-09 北京兆维电子(集团)有限责任公司 Video monitoring system and method based on cloud computing
CN105356595A (en) * 2011-10-28 2016-02-24 江苏省电力公司常州供电公司 Intensive remote management and control system
CN105450619A (en) * 2014-09-28 2016-03-30 腾讯科技(深圳)有限公司 Method, device and system of protection of hostile attacks
CN105791047A (en) * 2016-02-29 2016-07-20 农忠海 Method for controlling management system of secure video private network
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device
CN107395588A (en) * 2017-07-18 2017-11-24 浙江远望通信技术有限公司 Video monitoring accesses safe blocking-up method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105356595A (en) * 2011-10-28 2016-02-24 江苏省电力公司常州供电公司 Intensive remote management and control system
CN103916625A (en) * 2013-01-04 2014-07-09 北京兆维电子(集团)有限责任公司 Video monitoring system and method based on cloud computing
CN105450619A (en) * 2014-09-28 2016-03-30 腾讯科技(深圳)有限公司 Method, device and system of protection of hostile attacks
CN105791047A (en) * 2016-02-29 2016-07-20 农忠海 Method for controlling management system of secure video private network
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device
CN107395588A (en) * 2017-07-18 2017-11-24 浙江远望通信技术有限公司 Video monitoring accesses safe blocking-up method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277421A (en) * 2018-11-16 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 System and method for network camera access safety protection
CN111277421B (en) * 2018-11-16 2022-09-23 慧盾信息安全科技(苏州)股份有限公司 System and method for network camera access safety protection
CN110113345A (en) * 2019-05-13 2019-08-09 四川长虹电器股份有限公司 A method of the assets based on Internet of Things flow are found automatically
CN110113345B (en) * 2019-05-13 2021-04-06 四川长虹电器股份有限公司 Automatic asset discovery method based on flow of Internet of things
CN110290124A (en) * 2019-06-14 2019-09-27 杭州迪普科技股份有限公司 A kind of interchanger inbound port blocking-up method and device
CN110913179A (en) * 2019-12-02 2020-03-24 北京志成合创信息技术有限公司 Intelligent management and control method, device, equipment and storage medium for video monitoring equipment
CN114978721A (en) * 2022-05-26 2022-08-30 新华三信息安全技术有限公司 Access detection method and device of terminal equipment, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN108494737A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition
CN108521399A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition and white list
US8200798B2 (en) Address security in a routed access network
CN108521398A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition, white list and constraint set flow control
CN109729180B (en) Whole system intelligent community platform
CN100384150C (en) Method and system for preventing asynchronous ARP cache poisoning of multiple hosts
CN106465416A (en) Sensor network gateway
CN108156043A (en) A kind of video monitoring safety cut-in method based on white list and constraint set flow control
CN107395588A (en) Video monitoring accesses safe blocking-up method and system
JP3618245B2 (en) Network monitoring system
CN101529862A (en) Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis
CN108629201A (en) A method of database illegal operation is blocked
KR20040099864A (en) Security gateway system and method for intrusion detection
CN107276983A (en) A kind of the traffic security control method and system synchronous with cloud based on DPI
CN112491888A (en) Method and system for preventing equipment from being falsely used
CN109981587A (en) A kind of network security monitoring traceability system based on APT attack
CN111970233B (en) Analysis and identification method for network violation external connection scene
KR101308085B1 (en) Intrusion prevention system using correlation attack pattern and method thereof
CN112565202A (en) Internet of things access gateway for video network system
CN103139056A (en) Secure gateway and network data interactive method
CN114900377B (en) Induction data packet-based illegal external connection monitoring method and system
CN107864164B (en) Linkage alarm device based on IP embezzlement and MAC address tampering
CN108206828A (en) A kind of double monitoring method of controlling security and system
CN114124884A (en) Local area network IP address abuse detection device and method
CN109922058B (en) Intranet protection method for preventing illegal access to intranet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 311800 Jiyang city street, Jiyang, Zhuji, Shaoxing, Zhejiang (Jiyang Industrial Park)

Applicant after: Zhejiang Yuanwang Telecom Technology Co., Ltd

Address before: 311800 Shaoxing, Zhuji, Zhejiang Jiyang Road 98 North Ring Road No.

Applicant before: Zhejiang Yuanwang Telecom Technology Co., Ltd

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904

RJ01 Rejection of invention patent application after publication