CN108600006A - A kind of Computer Data Security monitoring system - Google Patents
A kind of Computer Data Security monitoring system Download PDFInfo
- Publication number
- CN108600006A CN108600006A CN201810372050.0A CN201810372050A CN108600006A CN 108600006 A CN108600006 A CN 108600006A CN 201810372050 A CN201810372050 A CN 201810372050A CN 108600006 A CN108600006 A CN 108600006A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- information
- iris
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of Computer Data Security monitoring systems, including computer data module, Intranet monitoring module, management module and display module, computer data module is connected with Intranet monitoring module, computer data module is connected with management module, and computer data module is connected with display module.The present invention to computer data monitor and manage comprehensively, in real time by Intranet monitoring module, management module, different data acquisition means are used for multi-source equipment, ensure the timeliness of data, most basic, most sound assurance is provided for the operation safety monitoring of whole network environment, realizes the real time integrated acquisition of the whole network operating status and security information and graphical presentation;Meanwhile administrator logs in using iris recognition login system in management module of the invention, operating process is simple, and accuracy is high, securely and reliably, avoids unauthorized person login management system, improves the safety of data management.
Description
Technical field
The invention belongs to data monitoring technical fields, and in particular, to a kind of Computer Data Security monitoring system.
Background technology
Chinese Enterprise basis for IT application is popularized comprehensively, and the fusion of " internet+" conventional industries accelerates.China advises in information industry
Mould, information-based application benefit etc. obtain marked improvement, and informatization development index is more than the average level of the country such as G20.
China's Informatization Development has penetrated into all trades and professions such as government, enterprise, medical treatment, education, and thing followed enterprise network security is asked
Topic is inevitable.
Include a large amount of device resource in enterprise network information platform, and user terminal computer operating system is various, net
Network environment is complicated, and company is equipped with ripe security protection product.Border Protection equipment is different, and equipment forms isolated island, and safety is not
It can effectively be promoted.In addition, enterprise procurement network device model number and brand have diversity, the unified formulation of each equipment vendors
International standard, all various aspects such as individual demand of enterprise cause network internal source device to be compatible with sexual dysfunction.Same Utilities Electric Co.
Equally, the traditional forms of enterprises lacks the professional in terms of network security management, and safety measure is not in place, and awareness of safety is weak, to net
The configuration and maintenance of network information platform cannot follow up in time, and most common configuration is improper, loophole patch does not synchronize upgrading etc. and all will
As security risk fire wall and encryption are excessively relied in addition, most enterprises lack comprehensive security management solution
Technology.To solve this problem, the computer operation behavioural analysis based on LAN is increasingly becoming with data safety management system
The needs of enterprise.
Invention content
The purpose of the present invention is to provide a kind of Computer Data Security monitoring system,
The purpose of the present invention can be achieved through the following technical solutions:
A kind of Computer Data Security monitoring system, including computer data module, Intranet monitoring module, management module and
Display module, computer data module are connected with Intranet monitoring module, and computer data module is connected with management module, computer
Data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, basis is set
Apply be system hardware foundation, mainly include router, interchanger, server, terminal computer, fire wall, IPS, RSAS and
Communication link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types,
It designs different acquisition modes and realizes data acquisition;The collected data information of collector is sent to data by data acquisition module
Analysis module;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module
The computer data information of transmission, and according to the corresponding computation rule of the parameter acquiring of request, with the computation rule combination database
In data carry out calculation process, handling result is transmitted to data memory module;
Data memory module is responsible for storing the running state data and business datum of company or enterprise computer
And maintenance;Data memory module includes running state data library, safe state data library and safety equipment database, operating status
Database is responsible for the operation data of storage networking device, terminal computer, server and link, point of storage device operating status
Analysis is as a result, the configuration information needed for storage system operation simultaneously and management information;Safe state data library be responsible for store fire wall,
The operating status and business information of RSAS and IPS;Safety equipment database mainly stores fire wall operating status, in real time connection letter
It ceases, the real-time running state of RSAS and IPS, and high-risk loophole, middle danger loophole and the low danger vulnerability information found, and by prestige
Coerce host;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and primary data information (pdi) is stored in phase
The initial data storage disk answered, data memory module receive the data information that the processing that data analysis module is sent is completed, and
Processed data information is stored in corresponding processed data storage disk;
Intranet monitoring module includes network equipment monitoring module, server monitoring module, terminal computer monitoring module, accuses
Alert module;Wherein, network equipment monitoring module, server monitoring module, terminal computer monitoring module respectively with alarm module
Connection, if network equipment monitoring module, server monitoring module, terminal computer monitoring module find abnormal operational conditions,
Corresponding warning information is then generated, and the warning information is sent to alarm module;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Manage mould
Block includes landing safely module, system log management module, system configuration management module, applied business management module;
Secure log module is iris authentication system, including iris line acquisition module, administrator information memory module and right
Than processing module, administrator information memory module is that iris stores database, and administrator is adopted when logging in by iris line
It is right to collect modules acquiring data and administrator information memory module database, only to successfully can just land safely system;
For being shown to operating status and safe condition, display module receives Intranet monitoring module and sends display module
Monitoring information, and monitor state is shown.
Further, the database in the data analysis module carries out data using Mongodb non-relational databases
Management, data information is using database device_info set, the facility information acquired for storing data, between distinct device
There are universal field, acquisition time time, CPU usage cpu, memory usage memory and equipment superclass type super_
For distinguishing device type, device type includes core router, core switch, access type by type, wherein super_type
Interchanger, access type router, convergence switch, convergence router, fire wall, RSAS, IPS, terminal computer and server.
Further, the Intranet monitoring module realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, are adopted with data
Based on collecting module, the monitoring function of Intranet important equipment is realized by the processing of data analysis layer.
Further, the Intranet monitoring module is by monitoring the CPU usage, interior of router, interchanger and each equipment
The performance datas such as utilization rate are deposited, by being compared with the secure threshold set in security strategy, warning information is generated to problem device,
Warning information is sent to management module and display module by alarm module, and administrator investigates by problem, takes corresponding processing
Strategy.
Further, the iris capturing module includes iris image acquisition unit, and iris image acquisition unit is by optics
Stabilization iris camera acquisition iris image carries out Iris Location, iris image normalization, image by iris image processor
Enhancing processing obtains stable, clear iris image;Comparison processing module includes iris feature extraction unit and control operating system
Startup/lock cell, iris feature extraction unit are to by treated, iris print image extracts textural characteristics, using quasi- zero tree
Coding method determines quantization threshold, carrys out the attribute of crossover frequency domain information, and is quantified as diad code;Iris stores data
The diad code that library generates the iris feature of each administrator carries out the corresponding storage of mapping one by one with corresponding other information.
Beneficial effects of the present invention:
The present invention to computer data monitor and manage comprehensively, in real time by Intranet monitoring module, management module,
Different data acquisition means are used for multi-source equipment, ensure the timeliness of data, are the operational safety of whole network environment
Monitoring provides most basic, most sound assurance, realizes real time integrated acquisition and the figure of the whole network operating status and security information
Shapeization is presented;Meanwhile administrator logs in using iris recognition login system in management module of the invention, operating process letter
Easily, accuracy is high, securely and reliably, avoids unauthorized person login management system, improves the safety of data management.
Description of the drawings
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is a kind of structural schematic diagram of Computer Data Security monitoring system of the present invention;
Fig. 2 is the structural schematic diagram that system is landed safely in Fig. 1.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality
It is only a part of the embodiment of the present invention to apply example, instead of all the embodiments.Based on the embodiments of the present invention, this field is general
All other embodiment that logical technical staff is obtained without creative efforts belongs to what the present invention protected
Range.
A kind of Computer Data Security monitoring system, as shown in Figure 1, including computer data module, Intranet monitoring module,
Management module and display module, computer data module are connected with Intranet monitoring module, computer data module and management module
It is connected, computer data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, basis is set
Apply be system hardware foundation, mainly include router, interchanger, server, terminal computer, fire wall, IPS, RSAS and
Communication link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types,
It designs different acquisition modes and realizes data acquisition;Collected data information is sent to data analysis mould by data collector
Block;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module
The computer data information of transmission, and according to the corresponding computation rule of the parameter acquiring of request, with the computation rule combination database
In data carry out calculation process, handling result is transmitted to data memory module;Wherein, database uses the non-passes Mongodb
It is that type database carries out data management, using database device_info set, what is acquired for storing data sets data information
Standby information acquisition time time, CPU usage cpu, memory usage memory and is set there are universal field between distinct device
For distinguishing device type, device type includes core router, core by standby superclass type super_type, wherein super_type
Heart interchanger, access type interchanger, access type router, convergence switch, convergence router, fire wall, RSAS, IPS, terminal
Computer and server;
Data memory module is responsible for storing the running state data and business datum of company or enterprise computer
And maintenance;Data memory module includes running state data library, safe state data library and safety equipment database, operating status
Database is responsible for the operation data of storage networking device, terminal computer, server and link, point of storage device operating status
Analysis is as a result, the configuration information needed for storage system operation simultaneously and management information;Safe state data library be responsible for store fire wall,
The operating status and business information of RSAS and IPS;Safety equipment database mainly stores fire wall operating status, in real time connection letter
Breath etc..The real-time running state of RSAS and IPS, and find high-risk loophole, middle danger loophole and low danger vulnerability information, and
Compromised host etc.;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and by primary data information (pdi)
It is stored in corresponding initial data storage disk, data memory module receives the data letter that the processing that data analysis module is sent is completed
Breath, and processed data information is stored in corresponding processed data storage disk;
Intranet monitoring module realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, based on data acquisition module,
The monitoring function of Intranet important equipment is realized by the processing of data analysis layer;Intranet monitoring module includes network equipment monitoring mould
Block, server monitoring module, terminal computer monitoring module, alarm module;Wherein, network equipment monitoring module, server prison
Control module, terminal computer monitoring module are connect with alarm module respectively, network equipment monitoring module, server monitoring module,
If terminal computer monitoring module finds abnormal operational conditions, corresponding warning information is generated, and the warning information is passed
It send to alarm module;Specifically, pass through the performances such as CPU usage, the memory usage of monitoring router, interchanger and each equipment
Data generate warning information, alarm module will be alerted by being compared with the secure threshold set in security strategy to problem device
Information is sent to management module and display module, and administrator investigates by problem, takes corresponding processing strategy;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Manage mould
Block includes landing safely module, system log management module, system configuration management module, applied business management module;
Wherein, secure log module is iris authentication system, including iris line acquisition module, administrator information memory module
With comparison processing module, administrator information memory module is that iris stores database, and administrator passes through iris when logging in
Line acquisition module gathered data and administrator information memory module database are right, only can just be landed safely to success and are
System;Wherein, iris capturing module includes iris image acquisition unit, and iris image acquisition unit moves iris by optical anti-vibration and images
Machine acquires iris image, and Iris Location, iris image normalization, image enhancement processing acquisition are carried out surely by iris image processor
Fixed, clear iris image;Comparison processing module include iris feature extraction unit and control os starting/lock cell,
Iris feature extraction unit is to by treated, iris print image extracts textural characteristics, using quasi- zerotree image method determination amount
Change thresholding, carrys out the attribute of crossover frequency domain information, and be quantified as diad code;Iris stores database by each administrator
Iris feature the diad code and the corresponding other information that generate carry out mapping one by one and correspond to store;
For being shown to operating status and safe condition, display module receives Intranet monitoring module and sends display module
Monitoring information, and monitor state is shown.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment
All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,
It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the present invention
Principle and practical application, to enable skilled artisan to be best understood by and utilize the present invention.The present invention is only
It is limited by claims and its full scope and equivalent.
Claims (5)
1. a kind of Computer Data Security monitoring system, which is characterized in that including computer data module, Intranet monitoring module,
Management module and display module, computer data module are connected with Intranet monitoring module, computer data module and management module
It is connected, computer data module is connected with display module;
Computer data module includes data acquisition module, data analysis module, data memory module;
Data acquisition module by company or enterprise network information platform infrastructure and collector constitute, infrastructure is
The hardware foundation of system includes mainly router, interchanger, server, terminal computer, fire wall, IPS, RSAS and communication
Link etc.;Collector includes mainly active detector, reptile engine and client probe, for different device types, design
Different acquisition modes realizes data acquisition;The collected data information of collector is sent to data analysis by data acquisition module
Module;
Data analysis module includes data processing module and database, and data processing module is for receiving data acquisition module transmission
Computer data information, and according to the corresponding computation rule of the parameter acquiring of request, in the computation rule combination database
Data carry out calculation process, and handling result is transmitted to data memory module;
Data memory module is responsible for that the running state data and business datum of company or enterprise computer are stored and tieed up
Shield;Data memory module includes running state data library, safe state data library and safety equipment database, running state data
It is responsible for the operation data of storage networking device, terminal computer, server and link, the analysis knot of storage device operating status in library
Fruit, while the configuration information needed for storage system operation and management information;It is responsible for storing fire wall, RSAS in safe state data library
With the operating status and business information of IPS;Safety equipment database mainly stores fire wall operating status, real time connection information,
The real-time running state of RSAS and IPS, and high-risk loophole, middle danger loophole and the low danger vulnerability information and compromised that find
Host;Data memory module receives the primary data information (pdi) that data acquisition module is sent, and primary data information (pdi) is stored in accordingly
Initial data storage disk, data memory module receive data analysis module send processing complete data information, and will
The processed corresponding processed data storage disk of data information deposit;
Intranet monitoring module includes network equipment monitoring module, server monitoring module, terminal computer monitoring module, alarm mould
Block;Wherein, network equipment monitoring module, server monitoring module, terminal computer monitoring module are connect with alarm module respectively,
If network equipment monitoring module, server monitoring module, terminal computer monitoring module find abnormal operational conditions, generate
Corresponding warning information, and the warning information is sent to alarm module;
Management module is company's either computer data of the enterprise administrator for management company or enterprise;Management module packet
It includes and lands safely module, system log management module, system configuration management module, applied business management module;
Secure log module is at iris authentication system, including iris line acquisition module, administrator information memory module and comparison
Module is managed, administrator information memory module is that iris stores database, and administrator acquires mould when logging in, by iris line
Block gathered data and administrator information memory module database are right, only can just land safely system to success;
For display module for being shown to operating status and safe condition, display module receives the prison that Intranet monitoring module is sent
Information is controlled, and monitor state is shown.
2. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the data analysis mould
Database in the block carries out data management using Mongodb non-relational databases, and data information uses database device_
Info gathers, the facility information acquired for storing data, and there are universal fields, acquisition time time, CPU to make between distinct device
With rate cpu, memory usage memory and equipment superclass type super_type, wherein super_type for distinguishing equipment class
Type, device type include core router, core switch, access type interchanger, access type router, convergence switch, remittance
Poly- router, fire wall, RSAS, IPS, terminal computer and server.
3. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the Intranet monitors mould
Block realizes N using ZMQ PUB-SUB technologies:M multi-point monitorings, based on data acquisition module, by the place of data analysis layer
Reason realizes the monitoring function of Intranet important equipment.
4. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the Intranet monitors mould
Block by performance datas such as the CPU usage, the memory usages that monitor router, interchanger and each equipment, by with safe plan
The secure threshold set in slightly compares, and generates warning information to problem device, warning information is sent to management mould by alarm module
Block and display module, administrator investigate by problem, take corresponding processing strategy.
5. a kind of Computer Data Security monitoring system according to claim 1, which is characterized in that the iris capturing mould
Block includes iris image acquisition unit, and iris image acquisition unit moves iris camera acquisition iris image by optical anti-vibration, by
Iris image processor carries out Iris Location, iris image normalizes, image enhancement processing obtains stable, clear iris image;
Comparison processing module includes iris feature extraction unit and control os starting/lock cell, iris feature extraction unit
It is quantization threshold to be determined using quasi- zerotree image method, to iris print image extracts textural characteristics by treated to distinguish frequency
The attribute of rate domain information, and it is quantified as diad code;Iris stores database and generates the iris feature of each administrator
Diad code and corresponding other information carry out the corresponding storage of mapping one by one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810372050.0A CN108600006A (en) | 2018-04-24 | 2018-04-24 | A kind of Computer Data Security monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810372050.0A CN108600006A (en) | 2018-04-24 | 2018-04-24 | A kind of Computer Data Security monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108600006A true CN108600006A (en) | 2018-09-28 |
Family
ID=63614891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810372050.0A Pending CN108600006A (en) | 2018-04-24 | 2018-04-24 | A kind of Computer Data Security monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108600006A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111159785A (en) * | 2019-11-18 | 2020-05-15 | 福建东正信息科技有限公司 | Cloud platform data information security protection method and system |
CN112995342A (en) * | 2021-04-22 | 2021-06-18 | 航天神舟智慧系统技术有限公司 | Report monitoring method and system based on public security intranet and intranet transmission |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1425629A1 (en) * | 2001-07-17 | 2004-06-09 | Mason Ricardo Storm | Portable device |
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
CN104898533A (en) * | 2015-04-29 | 2015-09-09 | 陈龙晶 | Machine room monitoring method, device and system |
CN106372480A (en) * | 2016-08-19 | 2017-02-01 | 刘晓亮 | Computer for guaranteeing database information security |
-
2018
- 2018-04-24 CN CN201810372050.0A patent/CN108600006A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1425629A1 (en) * | 2001-07-17 | 2004-06-09 | Mason Ricardo Storm | Portable device |
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
CN104898533A (en) * | 2015-04-29 | 2015-09-09 | 陈龙晶 | Machine room monitoring method, device and system |
CN106372480A (en) * | 2016-08-19 | 2017-02-01 | 刘晓亮 | Computer for guaranteeing database information security |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111159785A (en) * | 2019-11-18 | 2020-05-15 | 福建东正信息科技有限公司 | Cloud platform data information security protection method and system |
CN112995342A (en) * | 2021-04-22 | 2021-06-18 | 航天神舟智慧系统技术有限公司 | Report monitoring method and system based on public security intranet and intranet transmission |
CN112995342B (en) * | 2021-04-22 | 2021-08-06 | 航天神舟智慧系统技术有限公司 | Report monitoring method and system based on public security intranet and intranet transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11765198B2 (en) | Selecting actions responsive to computing environment incidents based on severity rating | |
WO2023216641A1 (en) | Security protection method and system for power terminal | |
US11238366B2 (en) | Adaptive object modeling and differential data ingestion for machine learning | |
KR20210072132A (en) | System and method for cloud-based operating system event and data access monitoring | |
CN111163115A (en) | Internet of things safety monitoring method and system based on double engines | |
US10142365B2 (en) | System and methods for responding to cybersecurity threats | |
CN112887268B (en) | Network security guarantee method and system based on comprehensive detection and identification | |
CN109040130A (en) | Mainframe network behavior pattern measure based on attributed relational graph | |
CN112351031A (en) | Generation method and device of attack behavior portrait, electronic equipment and storage medium | |
CN107463839A (en) | A kind of system and method for managing application program | |
CN108600006A (en) | A kind of Computer Data Security monitoring system | |
CN107944293B (en) | Fictitious assets guard method, system, equipment and storage medium | |
CN109977700A (en) | A kind of big data processing system based on network security | |
CN116074075A (en) | Security event association behavior analysis method, system and equipment based on association rule | |
CN110061854A (en) | A kind of non-boundary network intelligence operation management method and system | |
CN112383573B (en) | Security intrusion playback equipment based on multiple attack stages | |
KR102311997B1 (en) | Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis | |
CN104899078A (en) | Auditing system and method in virtual machine environment | |
CN112350858A (en) | Cloud intelligent home data security management system | |
CN110647762A (en) | Government affair supervising platform based on cloud desktop | |
CN114697141B (en) | C4ISR situation awareness analysis system and method based on state machine | |
CN106254163B (en) | Monitor the method and device of the USB port of computer in local area network | |
CN115473692A (en) | Service request processing method, device, equipment and medium | |
CN114374530A (en) | IDS system and detection method for monitoring and analyzing based on real-time network flow | |
Revathi et al. | Detecting denial of service attack using principal component analysis with random forest classifier |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |