CN108600006A - A kind of Computer Data Security monitoring system - Google Patents

A kind of Computer Data Security monitoring system Download PDF

Info

Publication number
CN108600006A
CN108600006A CN201810372050.0A CN201810372050A CN108600006A CN 108600006 A CN108600006 A CN 108600006A CN 201810372050 A CN201810372050 A CN 201810372050A CN 108600006 A CN108600006 A CN 108600006A
Authority
CN
China
Prior art keywords
module
data
information
iris
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810372050.0A
Other languages
Chinese (zh)
Inventor
杨峥
高子雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yinchuan Hualian Technology Co Ltd
Original Assignee
Yinchuan Hualian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yinchuan Hualian Technology Co Ltd filed Critical Yinchuan Hualian Technology Co Ltd
Priority to CN201810372050.0A priority Critical patent/CN108600006A/en
Publication of CN108600006A publication Critical patent/CN108600006A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of Computer Data Security monitoring systems, including computer data module, Intranet monitoring module, management module and display module, computer data module is connected with Intranet monitoring module, computer data module is connected with management module, and computer data module is connected with display module.The present invention to computer data monitor and manage comprehensively, in real time by Intranet monitoring module, management module, different data acquisition means are used for multi-source equipment, ensure the timeliness of data, most basic, most sound assurance is provided for the operation safety monitoring of whole network environment, realizes the real time integrated acquisition of the whole network operating status and security information and graphical presentation;Meanwhile administrator logs in using iris recognition login system in management module of the invention, operating process is simple, and accuracy is high, securely and reliably, avoids unauthorized person login management system, improves the safety of data management.

Description

A kind of Computer Data Security monitoring system
Technical field
The invention belongs to data monitoring technical fields, and in particular, to a kind of Computer Data Security monitoring system.
Background technology
Chinese Enterprise basis for IT application is popularized comprehensively, and the fusion of " internet+" conventional industries accelerates.China advises in information industry Mould, information-based application benefit etc. obtain marked improvement, and informatization development index is more than the average level of the country such as G20. China's Informatization Development has penetrated into all trades and professions such as government, enterprise, medical treatment, education, and thing followed enterprise network security is asked Topic is inevitable.
Include a large amount of device resource in enterprise network information platform, and user terminal computer operating system is various, net Network environment is complicated, and company is equipped with ripe security protection product.Border Protection equipment is different, and equipment forms isolated island, and safety is not It can effectively be promoted.In addition, enterprise procurement network device model number and brand have diversity, the unified formulation of each equipment vendors International standard, all various aspects such as individual demand of enterprise cause network internal source device to be compatible with sexual dysfunction.Same Utilities Electric Co. Equally, the traditional forms of enterprises lacks the professional in terms of network security management, and safety measure is not in place, and awareness of safety is weak, to net The configuration and maintenance of network information platform cannot follow up in time, and most common configuration is improper, loophole patch does not synchronize upgrading etc. and all will As security risk fire wall and encryption are excessively relied in addition, most enterprises lack comprehensive security management solution Technology.To solve this problem, the computer operation behavioural analysis based on LAN is increasingly becoming with data safety management system The needs of enterprise.
Invention content
The purpose of the present invention is to provide a kind of Computer Data Security monitoring system,
The purpose of the present invention can be achieved through the following technical solutions:
A kind of Computer Data Security monitoring system, including computer data module, Intranet monitoring module, management module and Display module, computer data module are connected with Intranet monitoring module, and computer data module is connected with management module, computer Data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, basis is set Apply be system hardware foundation, mainly include router, interchanger, server, terminal computer, fire wall, IPS, RSAS and Communication link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types, It designs different acquisition modes and realizes data acquisition;The collected data information of collector is sent to data by data acquisition module Analysis module;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module The computer data information of transmission, and according to the corresponding computation rule of the parameter acquiring of request, with the computation rule combination database In data carry out calculation process, handling result is transmitted to data memory module;
Data memory module is responsible for storing the running state data and business datum of company or enterprise computer And maintenance;Data memory module includes running state data library, safe state data library and safety equipment database, operating status Database is responsible for the operation data of storage networking device, terminal computer, server and link, point of storage device operating status Analysis is as a result, the configuration information needed for storage system operation simultaneously and management information;Safe state data library be responsible for store fire wall, The operating status and business information of RSAS and IPS;Safety equipment database mainly stores fire wall operating status, in real time connection letter It ceases, the real-time running state of RSAS and IPS, and high-risk loophole, middle danger loophole and the low danger vulnerability information found, and by prestige Coerce host;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and primary data information (pdi) is stored in phase The initial data storage disk answered, data memory module receive the data information that the processing that data analysis module is sent is completed, and Processed data information is stored in corresponding processed data storage disk;
Intranet monitoring module includes network equipment monitoring module, server monitoring module, terminal computer monitoring module, accuses Alert module;Wherein, network equipment monitoring module, server monitoring module, terminal computer monitoring module respectively with alarm module Connection, if network equipment monitoring module, server monitoring module, terminal computer monitoring module find abnormal operational conditions, Corresponding warning information is then generated, and the warning information is sent to alarm module;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Manage mould Block includes landing safely module, system log management module, system configuration management module, applied business management module;
Secure log module is iris authentication system, including iris line acquisition module, administrator information memory module and right Than processing module, administrator information memory module is that iris stores database, and administrator is adopted when logging in by iris line It is right to collect modules acquiring data and administrator information memory module database, only to successfully can just land safely system;
For being shown to operating status and safe condition, display module receives Intranet monitoring module and sends display module Monitoring information, and monitor state is shown.
Further, the database in the data analysis module carries out data using Mongodb non-relational databases Management, data information is using database device_info set, the facility information acquired for storing data, between distinct device There are universal field, acquisition time time, CPU usage cpu, memory usage memory and equipment superclass type super_ For distinguishing device type, device type includes core router, core switch, access type by type, wherein super_type Interchanger, access type router, convergence switch, convergence router, fire wall, RSAS, IPS, terminal computer and server.
Further, the Intranet monitoring module realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, are adopted with data Based on collecting module, the monitoring function of Intranet important equipment is realized by the processing of data analysis layer.
Further, the Intranet monitoring module is by monitoring the CPU usage, interior of router, interchanger and each equipment The performance datas such as utilization rate are deposited, by being compared with the secure threshold set in security strategy, warning information is generated to problem device, Warning information is sent to management module and display module by alarm module, and administrator investigates by problem, takes corresponding processing Strategy.
Further, the iris capturing module includes iris image acquisition unit, and iris image acquisition unit is by optics Stabilization iris camera acquisition iris image carries out Iris Location, iris image normalization, image by iris image processor Enhancing processing obtains stable, clear iris image;Comparison processing module includes iris feature extraction unit and control operating system Startup/lock cell, iris feature extraction unit are to by treated, iris print image extracts textural characteristics, using quasi- zero tree Coding method determines quantization threshold, carrys out the attribute of crossover frequency domain information, and is quantified as diad code;Iris stores data The diad code that library generates the iris feature of each administrator carries out the corresponding storage of mapping one by one with corresponding other information.
Beneficial effects of the present invention:
The present invention to computer data monitor and manage comprehensively, in real time by Intranet monitoring module, management module, Different data acquisition means are used for multi-source equipment, ensure the timeliness of data, are the operational safety of whole network environment Monitoring provides most basic, most sound assurance, realizes real time integrated acquisition and the figure of the whole network operating status and security information Shapeization is presented;Meanwhile administrator logs in using iris recognition login system in management module of the invention, operating process letter Easily, accuracy is high, securely and reliably, avoids unauthorized person login management system, improves the safety of data management.
Description of the drawings
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of structural schematic diagram of Computer Data Security monitoring system of the present invention;
Fig. 2 is the structural schematic diagram that system is landed safely in Fig. 1.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality It is only a part of the embodiment of the present invention to apply example, instead of all the embodiments.Based on the embodiments of the present invention, this field is general All other embodiment that logical technical staff is obtained without creative efforts belongs to what the present invention protected Range.
A kind of Computer Data Security monitoring system, as shown in Figure 1, including computer data module, Intranet monitoring module, Management module and display module, computer data module are connected with Intranet monitoring module, computer data module and management module It is connected, computer data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, basis is set Apply be system hardware foundation, mainly include router, interchanger, server, terminal computer, fire wall, IPS, RSAS and Communication link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types, It designs different acquisition modes and realizes data acquisition;Collected data information is sent to data analysis mould by data collector Block;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module The computer data information of transmission, and according to the corresponding computation rule of the parameter acquiring of request, with the computation rule combination database In data carry out calculation process, handling result is transmitted to data memory module;Wherein, database uses the non-passes Mongodb It is that type database carries out data management, using database device_info set, what is acquired for storing data sets data information Standby information acquisition time time, CPU usage cpu, memory usage memory and is set there are universal field between distinct device For distinguishing device type, device type includes core router, core by standby superclass type super_type, wherein super_type Heart interchanger, access type interchanger, access type router, convergence switch, convergence router, fire wall, RSAS, IPS, terminal Computer and server;
Data memory module is responsible for storing the running state data and business datum of company or enterprise computer And maintenance;Data memory module includes running state data library, safe state data library and safety equipment database, operating status Database is responsible for the operation data of storage networking device, terminal computer, server and link, point of storage device operating status Analysis is as a result, the configuration information needed for storage system operation simultaneously and management information;Safe state data library be responsible for store fire wall, The operating status and business information of RSAS and IPS;Safety equipment database mainly stores fire wall operating status, in real time connection letter Breath etc..The real-time running state of RSAS and IPS, and find high-risk loophole, middle danger loophole and low danger vulnerability information, and Compromised host etc.;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and by primary data information (pdi) It is stored in corresponding initial data storage disk, data memory module receives the data letter that the processing that data analysis module is sent is completed Breath, and processed data information is stored in corresponding processed data storage disk;
Intranet monitoring module realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, based on data acquisition module, The monitoring function of Intranet important equipment is realized by the processing of data analysis layer;Intranet monitoring module includes network equipment monitoring mould Block, server monitoring module, terminal computer monitoring module, alarm module;Wherein, network equipment monitoring module, server prison Control module, terminal computer monitoring module are connect with alarm module respectively, network equipment monitoring module, server monitoring module, If terminal computer monitoring module finds abnormal operational conditions, corresponding warning information is generated, and the warning information is passed It send to alarm module;Specifically, pass through the performances such as CPU usage, the memory usage of monitoring router, interchanger and each equipment Data generate warning information, alarm module will be alerted by being compared with the secure threshold set in security strategy to problem device Information is sent to management module and display module, and administrator investigates by problem, takes corresponding processing strategy;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Manage mould Block includes landing safely module, system log management module, system configuration management module, applied business management module;
Wherein, secure log module is iris authentication system, including iris line acquisition module, administrator information memory module With comparison processing module, administrator information memory module is that iris stores database, and administrator passes through iris when logging in Line acquisition module gathered data and administrator information memory module database are right, only can just be landed safely to success and are System;Wherein, iris capturing module includes iris image acquisition unit, and iris image acquisition unit moves iris by optical anti-vibration and images Machine acquires iris image, and Iris Location, iris image normalization, image enhancement processing acquisition are carried out surely by iris image processor Fixed, clear iris image;Comparison processing module include iris feature extraction unit and control os starting/lock cell, Iris feature extraction unit is to by treated, iris print image extracts textural characteristics, using quasi- zerotree image method determination amount Change thresholding, carrys out the attribute of crossover frequency domain information, and be quantified as diad code;Iris stores database by each administrator Iris feature the diad code and the corresponding other information that generate carry out mapping one by one and correspond to store;
For being shown to operating status and safe condition, display module receives Intranet monitoring module and sends display module Monitoring information, and monitor state is shown.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the present invention Principle and practical application, to enable skilled artisan to be best understood by and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (5)

1. a kind of Computer Data Security monitoring system, which is characterized in that including computer data module, Intranet monitoring module, Management module and display module, computer data module are connected with Intranet monitoring module, computer data module and management module It is connected, computer data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, infrastructure is The hardware foundation of system includes mainly router, interchanger, server, terminal computer, fire wall, IPS, RSAS and communication Link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types, design Different acquisition modes realizes data acquisition;The collected data information of collector is sent to data analysis by data acquisition module Module;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module transmission Computer data information, and according to the corresponding computation rule of the parameter acquiring of request, in the computation rule combination database Data carry out calculation process, and handling result is transmitted to data memory module;
Data memory module is responsible for that the running state data and business datum of company or enterprise computer are stored and tieed up Shield;Data memory module includes running state data library, safe state data library and safety equipment database, running state data It is responsible for the operation data of storage networking device, terminal computer, server and link, the analysis knot of storage device operating status in library Fruit, while the configuration information needed for storage system operation and management information;It is responsible for storing fire wall, RSAS in safe state data library With the operating status and business information of IPS;Safety equipment database mainly stores fire wall operating status, real time connection information, The real-time running state of RSAS and IPS, and high-risk loophole, middle danger loophole and the low danger vulnerability information and compromised that find Host;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and primary data information (pdi) is stored in accordingly Initial data storage disk, data memory module receive data analysis module send processing complete data information, and will The processed corresponding processed data storage disk of data information deposit;
Intranet monitoring module includes network equipment monitoring module, server monitoring module, terminal computer monitoring module, alarm mould Block;Wherein, network equipment monitoring module, server monitoring module, terminal computer monitoring module are connect with alarm module respectively, If network equipment monitoring module, server monitoring module, terminal computer monitoring module find abnormal operational conditions, generate Corresponding warning information, and the warning information is sent to alarm module;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Management module packet It includes and lands safely module, system log management module, system configuration management module, applied business management module;
Secure log module is at iris authentication system, including iris line acquisition module, administrator information memory module and comparison Module is managed, administrator information memory module is that iris stores database, and administrator acquires mould when logging in, by iris line Block gathered data and administrator information memory module database are right, only can just land safely system to success;
For display module for being shown to operating status and safe condition, display module receives the prison that Intranet monitoring module is sent Information is controlled, and monitor state is shown.
2. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the data analysis mould Database in the block carries out data management using Mongodb non-relational databases, and data information uses database device_ Info gathers, the facility information acquired for storing data, and there are universal fields, acquisition time time, CPU to make between distinct device With rate cpu, memory usage memory and equipment superclass type super_type, wherein super_type for distinguishing equipment class Type, device type include core router, core switch, access type interchanger, access type router, convergence switch, remittance Poly- router, fire wall, RSAS, IPS, terminal computer and server.
3. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the Intranet monitors mould Block realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, based on data acquisition module, by the place of data analysis layer Reason realizes the monitoring function of Intranet important equipment.
4. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the Intranet monitors mould Block by performance datas such as the CPU usage, the memory usages that monitor router, interchanger and each equipment, by with safe plan The secure threshold set in slightly compares, and generates warning information to problem device, warning information is sent to management mould by alarm module Block and display module, administrator investigate by problem, take corresponding processing strategy.
5. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the iris capturing mould Block includes iris image acquisition unit, and iris image acquisition unit moves iris camera acquisition iris image by optical anti-vibration, by Iris image processor carries out Iris Location, iris image normalizes, image enhancement processing obtains stable, clear iris image; Comparison processing module includes iris feature extraction unit and control os starting/lock cell, iris feature extraction unit It is quantization threshold to be determined using quasi- zerotree image method, to iris print image extracts textural characteristics by treated to distinguish frequency The attribute of rate domain information, and it is quantified as diad code;Iris stores database and generates the iris feature of each administrator Diad code and corresponding other information carry out the corresponding storage of mapping one by one.
CN201810372050.0A 2018-04-24 2018-04-24 A kind of Computer Data Security monitoring system Pending CN108600006A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810372050.0A CN108600006A (en) 2018-04-24 2018-04-24 A kind of Computer Data Security monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810372050.0A CN108600006A (en) 2018-04-24 2018-04-24 A kind of Computer Data Security monitoring system

Publications (1)

Publication Number Publication Date
CN108600006A true CN108600006A (en) 2018-09-28

Family

ID=63614891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810372050.0A Pending CN108600006A (en) 2018-04-24 2018-04-24 A kind of Computer Data Security monitoring system

Country Status (1)

Country Link
CN (1) CN108600006A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159785A (en) * 2019-11-18 2020-05-15 福建东正信息科技有限公司 Cloud platform data information security protection method and system
CN112995342A (en) * 2021-04-22 2021-06-18 航天神舟智慧系统技术有限公司 Report monitoring method and system based on public security intranet and intranet transmission

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1425629A1 (en) * 2001-07-17 2004-06-09 Mason Ricardo Storm Portable device
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system
CN104898533A (en) * 2015-04-29 2015-09-09 陈龙晶 Machine room monitoring method, device and system
CN106372480A (en) * 2016-08-19 2017-02-01 刘晓亮 Computer for guaranteeing database information security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1425629A1 (en) * 2001-07-17 2004-06-09 Mason Ricardo Storm Portable device
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system
CN104898533A (en) * 2015-04-29 2015-09-09 陈龙晶 Machine room monitoring method, device and system
CN106372480A (en) * 2016-08-19 2017-02-01 刘晓亮 Computer for guaranteeing database information security

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159785A (en) * 2019-11-18 2020-05-15 福建东正信息科技有限公司 Cloud platform data information security protection method and system
CN112995342A (en) * 2021-04-22 2021-06-18 航天神舟智慧系统技术有限公司 Report monitoring method and system based on public security intranet and intranet transmission
CN112995342B (en) * 2021-04-22 2021-08-06 航天神舟智慧系统技术有限公司 Report monitoring method and system based on public security intranet and intranet transmission

Similar Documents

Publication Publication Date Title
US11765198B2 (en) Selecting actions responsive to computing environment incidents based on severity rating
WO2023216641A1 (en) Security protection method and system for power terminal
US11238366B2 (en) Adaptive object modeling and differential data ingestion for machine learning
KR20210072132A (en) System and method for cloud-based operating system event and data access monitoring
CN111163115A (en) Internet of things safety monitoring method and system based on double engines
US10142365B2 (en) System and methods for responding to cybersecurity threats
CN112887268B (en) Network security guarantee method and system based on comprehensive detection and identification
CN109040130A (en) Mainframe network behavior pattern measure based on attributed relational graph
CN112351031A (en) Generation method and device of attack behavior portrait, electronic equipment and storage medium
CN107463839A (en) A kind of system and method for managing application program
CN108600006A (en) A kind of Computer Data Security monitoring system
CN107944293B (en) Fictitious assets guard method, system, equipment and storage medium
CN109977700A (en) A kind of big data processing system based on network security
CN116074075A (en) Security event association behavior analysis method, system and equipment based on association rule
CN110061854A (en) A kind of non-boundary network intelligence operation management method and system
CN112383573B (en) Security intrusion playback equipment based on multiple attack stages
KR102311997B1 (en) Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis
CN104899078A (en) Auditing system and method in virtual machine environment
CN112350858A (en) Cloud intelligent home data security management system
CN110647762A (en) Government affair supervising platform based on cloud desktop
CN114697141B (en) C4ISR situation awareness analysis system and method based on state machine
CN106254163B (en) Monitor the method and device of the USB port of computer in local area network
CN115473692A (en) Service request processing method, device, equipment and medium
CN114374530A (en) IDS system and detection method for monitoring and analyzing based on real-time network flow
Revathi et al. Detecting denial of service attack using principal component analysis with random forest classifier

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928