CN108900516A - A kind of cyberspace loophole merger platform distribution service system - Google Patents

A kind of cyberspace loophole merger platform distribution service system Download PDF

Info

Publication number
CN108900516A
CN108900516A CN201810746271.XA CN201810746271A CN108900516A CN 108900516 A CN108900516 A CN 108900516A CN 201810746271 A CN201810746271 A CN 201810746271A CN 108900516 A CN108900516 A CN 108900516A
Authority
CN
China
Prior art keywords
server
loophole
firewall
unit
distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810746271.XA
Other languages
Chinese (zh)
Other versions
CN108900516B (en
Inventor
赖洪昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810746271.XA priority Critical patent/CN108900516B/en
Publication of CN108900516A publication Critical patent/CN108900516A/en
Application granted granted Critical
Publication of CN108900516B publication Critical patent/CN108900516B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]

Abstract

The invention discloses a kind of cyberspace loophole merger platform distribution service systems, including distribution server, database server and backup server, the input terminal of the distribution server is connected with database server and output end is connected with backup server, it is connected by local area network between the distribution server, database server and backup server, wherein:The database server can be used for collecting user data and provide inquiry and calling function, and the distribution server can carry out distribution scanning, attack to the task that system user is submitted.The present invention carries out distribution scanning by using submitting to system user for task, the mode of attack is scanned task, solving existing cyberspace is often after starting a leak, relevant patch is repaired again, is be easy to cause because loophole finds to cause to this source data the problem of being affected not in time.

Description

A kind of cyberspace loophole merger platform distribution service system
Technical field
The present invention relates to cyberspace loophole merger platform field, in particular to a kind of cyberspace loophole merger platform point Cloth service system.
Background technique
With the rapid development of information technology, computer network is widely applied, network rings open extensively are utilized Border carries out the trend that global communication has become era development, and the daily economic and social life of people is also increasingly dependent on interconnection Net.
Human society progressed by digitlization, networking and it is intelligent characterized by information age, information it is quick-fried Fried formula increases the arriving for further causing big data era.Search engine, social networks, E-Government, electronic banking, electronics The various information systems such as commercial affairs, intelligent transportation, intelligent plant emerge like the mushrooms after rain, quietly by obtaining magnanimity number According to perceiving, managing and regulating and controlling real physical environment and different social sectors, provide for organization and individual family Various convenient and fast services, greatly change the life, production and way to manage of human society.These data, information and it is System describes the virtual image of physical world and human society from multiple dimensions, constitutes a corresponding information space. Especially, the development of mobile Internet and technology of Internet of things allow anyone, thing, object whenever and wherever possible, active-passive real estate It is raw or obtain information, widely shared information and interrelated and influence each other.This diversified, group feature information Perception mould Formula merges information space gradually with physical world and human society, depth is associated with and interacts, and foring one has closed loop Organic whole-" information-physics-society " ternary space of feedback loop.
But existing cyberspace is often repaired after starting a leak, then to relevant patch, is be easy to cause Because loophole finds to cause to be affected to this source data not in time.
Therefore, it is necessary to solve the above problems to invent a kind of cyberspace loophole merger platform distribution service system.
Summary of the invention
The purpose of the present invention is to provide a kind of cyberspace loophole merger platform distribution service system, by using to being The task that system user submits carries out distribution scanning, the mode of attack is scanned task, to solve to mention in above-mentioned background technique Existing cyberspace out is often repaired after starting a leak, then to relevant patch, is be easy to cause because of loophole It was found that causing not in time to this source data the problem of being affected.
To achieve the above object, the present invention provides the following technical solutions:A kind of cyberspace loophole merger platform distribution clothes Business system, including distribution server, database server and backup server, the input terminal of the distribution server are connected with number Backup server, the distribution server, database server and backup server are connected with according to library server and output end Between be connected by local area network, wherein:
The database server can be used for collecting user data and provide inquiry and calling function;
The distribution server can carry out distribution scanning, attack to the task that system user is submitted;
The backup server can back up completely the data association message of distribution server before and after the processing, to accelerate to be distributed Server to system user repeat submit task identification speed, thus quickly excitation firewall come to cyberspace loophole into Row attack, it is ensured that the stable operation of merger platform;
The distribution server includes data acquisition unit, and the data acquisition unit connecting pin is connected with query unit, institute It states query unit connecting pin and is connected with detection unit, the detection unit connecting pin is connected with data processing unit, the data Processing unit connecting pin is connected with management and running unit, and management and running unit connecting pin is connected with safety guard unit, and Safety guard unit is arranged at the connectivity port between data acquisition unit and query unit.
Preferably, the query unit is anti-by inquiry of the domain name subdomain functional module, inquiry of the domain name IP functional module and IP The form looking into domain name module to be constituted, and being worked independently between each portion using formula submits domain name when task to system user It is inquired with IP address, quickly to be positioned to the loophole of cyberspace.
Preferably, the detection unit is by port scan and service detection module, operating system detection module and WEB service Device detection module is constituted, and the task and operation submitted using the form that formula works independently to system user between each portion System is detected, to find relevant loophole in time.
Preferably, the data processing unit is by the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module And WEB service component judgment module is constituted, and the data of task can be submitted to carry out analytical integration to system user.
Preferably, the management and running unit is made of distribution task communication module and distributed attacks module, combinable Data information after analytical integration carries out distributed attacks to the loophole of appearance to be distributed to task.
Preferably, the safety guard unit includes the storage server of multiple subsystems, the machine firewall, region fire prevention Wall, hardware firewall, software firewall and remote firewall, the remote firewall include remote software firewall and long-range hard Part firewall.
Preferably, the storage server of the subsystem is connected with the machine firewall, the machine firewall and region Firewall connection, and be connected with each other between the firewall of subsystems.
Technical effect and advantage of the invention:
1, carry out distribution scanning by using submitting to system user for task, the mode of attack is scanned task, can and Loophole in Shi Faxian submission task, and safety guard net is established rapidly, to avoid occurring finding to cause not in time because of loophole To this source data the problem of being affected;
2, by being equipped with backup server, it can be used for collecting user data and inquiry and calling function be provided, simultaneously, additionally it is possible to keep away Exempt from the case where this source data is damaged;
3, inserting knot to each area can be solved into loophole, scanning speed caused by network factors etc. using distributed computing technology Security evaluation problem is influenced, meanwhile, task distribution can be carried out specific aim assessment into each node by distributed computing technology.
Detailed description of the invention
Fig. 1 is distributed server deployment scheme schematic diagram of the invention;
Fig. 2 is system construction drawing of the invention;
Fig. 3 is query unit structural schematic diagram of the invention;
Fig. 4 is detection unit structural schematic diagram of the invention;
Fig. 5 is data processing unit structural schematic diagram of the invention;
Fig. 6 is management and running cellular construction schematic diagram of the invention;
Fig. 7 is safety guard cellular construction schematic diagram of the invention;
In figure:1 distribution server, 11 data acquisition units, 12 query units, 13 detection units, 14 data processing units, 15 are adjusted Spend administrative unit, 16 safety guard units, 2 database servers, 3 backup servers.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment 1:
The present invention provides a kind of cyberspace loophole merger platform distribution service systems as shown in figs. 1-7, including distribution clothes Be engaged in device 1, database server 2 and backup server 3, the input terminal of the distribution server 1 be connected with database server 2 with And output end is connected with backup server 3, it is logical between the distribution server 1, database server 2 and backup server 3 Local area network is crossed to be connected, wherein:
The database server 2 can be used for collecting user data and provide inquiry and calling function;
The distribution server 1 can carry out distribution scanning, attack to the task that system user is submitted;
The backup server 3 can back up completely the data association message of distribution server 1 before and after the processing, to accelerate to divide The identification speed for the task that cloth server 1 repeats to submit to system user, so that quickly excitation firewall to leak cyberspace Hole is attacked, it is ensured that the stable operation of merger platform;
The distribution server 1 includes data acquisition unit 11, and 11 connecting pin of data acquisition unit is connected with cargo tracer Member 12,12 connecting pin of query unit is connected with detection unit 13, and 13 connecting pin of detection unit is connected with data processing Unit 14,14 connecting pin of data processing unit are connected with management and running unit 15,15 connecting pin of management and running unit It is connected with safety guard unit 16, and the company between data acquisition unit 11 and query unit 12 is arranged in safety guard unit 16 It connects at port.
Above-mentioned technical proposal has the beneficial effect that:By by distribution server 1, database server 2 and backup server 3 By LAN connection to together, to be carried out using backup server 3 to the data association message of distribution server 1 before and after the processing Backup completely to accelerate the identification speed for the task that distribution server 1 repeats to submit to system user, and then quickly excites anti- Wall with flues attacks cyberspace loophole, it is ensured that the stable operation of merger platform.
Embodiment 2:
Further, in the technical solution of embodiment 1, the query unit 12 is by inquiry of the domain name subdomain functional module, domain name Inquiry IP functional module and the anti-domain name module of looking into of IP are constituted, and between each portion using the form of formula autonomous working to being System user submits domain name and IP address when task to inquire, quickly to position to the loophole of cyberspace.
Further, in the technical solution of embodiment 1, the detection unit 13 is by port scan and service detection mould Block, operating system detection module and WEB server detection module are constituted, and the shape to be worked independently between each portion using formula The task and operating system that formula submits system user detect, to find relevant loophole in time.
Further, in the technical solution of embodiment 1, the data processing unit 14 is creeped mould by the whole station WEB in website Block, WEB page vulnerability scanning analysis module and WEB service component judgment module are constituted, and can be submitted and be appointed to system user The data of business carry out analytical integration.
Further, in the technical solution of embodiment 1, the management and running unit 15 by distribution task communication module and Distributed attacks module is constituted, and is distributed in combination with the data information after analytical integration to task, while the leakage to appearance Hole carries out distributed attacks.
Further, in the technical solution of embodiment 1, the safety guard unit 16 includes the storage of multiple subsystems Server, the machine firewall, region firewall, hardware firewall, software firewall and remote firewall, the remote firewall Including remote software firewall and remote hardware firewall, the storage server of the subsystem is connected with the machine firewall, The machine firewall is connect with region firewall, and is connected with each other between the firewall of subsystems, fault-tolerant to be formed The complementary relationship of control makes the server cluster of entire distributed deployment connect hardware firewall, software firewall and remotely prevent Wall with flues protects the normal operation of in house software running environment, provides security strategy for operating system.
Working principle of the present invention:
Referring to Figure of description 1, the input terminal of distribution server is connected with database server and output end is connected with backup Server is connected by local area network, wherein database between distribution server, database server and backup server Server can be used for collecting user data and provide inquiry and calling function, and distribution server can submit system user Task carry out distribution scanning, attack, meanwhile, backup server can to the data association message of distribution server before and after the processing into Row backup completely, to accelerate the identification speed for the task that distribution server repeats to submit to system user, so that quickly excitation is anti- Wall with flues attacks cyberspace loophole, it is ensured that the stable operation of merger platform;
Referring to Figure of description 2-6, in the process of work, data acquisition unit appoints system user submission to distribution server Business carries out the acquisition of related data, then by according to collected related data situation, by inquiry of the domain name subdomain functional module, Inquiry of the domain name IP functional module or the anti-domain name for looking into domain name module come to system user submission task when of IP and IP address are looked into It askes, quickly to be positioned to the loophole of cyberspace, meanwhile, utilize port scan and service detection module, operating system Detection module and WEB server detection module detect come the task and operating system submitted to system user, so as to and The relevant loophole of Shi Faxian, followed by the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module and WEB Serviced component judgment module submits the data of task to carry out analytical integration system user, and is distributed task communication module and distribution Data information of the attack module then after binding analysis integration is distributed task, while carrying out distribution to the loophole of appearance and attacking It hits, and establishes firewall and this source data of system is protected;
Referring to Figure of description 7, safety guard unit 16 includes the storage server of multiple subsystems, the machine firewall, region Firewall, hardware firewall, software firewall and remote firewall, and remote firewall then includes remote software firewall and remote Journey hardware firewall, meanwhile, the storage server of subsystem is connected with the machine firewall, the machine firewall and region firewall Connection, and be connected with each other between the firewall of subsystems, to form the complementary relationship of faults-tolerant control, make entire distribution Server cluster connection hardware firewall, software firewall and the remote firewall of deployment, protection in house software running environment It operates normally, provides security strategy for operating system.
Finally it should be noted that:The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features, All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (7)

1. a kind of cyberspace loophole merger platform distribution service system, including distribution server(1), database server(2) And backup server(3), it is characterised in that:The distribution server(1)Input terminal be connected with database server(2)And Output end is connected with backup server(3), the distribution server(1), database server(2)And backup server(3)It Between be connected by local area network, wherein:
The database server(2)It can be used for collecting user data and inquiry and calling function be provided;
The distribution server(1)Distribution scanning, attack can be carried out to the task that system user is submitted;
The backup server(3)It can be to distribution server(1)Data association message before and after the processing is backed up completely, to add Fast distribution server(1)To the identification speed for the task that system user repeats to submit, so that quickly excitation firewall comes to network Space loophole is attacked, it is ensured that the stable operation of merger platform;
The distribution server(1)It include data acquisition unit(11), the data acquisition unit(11)Connecting pin is connected with Query unit(12), the query unit(12)Connecting pin is connected with detection unit(13), the detection unit(13)Connecting pin It is connected with data processing unit(14), the data processing unit(14)Connecting pin is connected with management and running unit(15), described Management and running unit(15)Connecting pin is connected with safety guard unit(16), and safety guard unit(16)Setting is acquired in data Unit(11)With query unit(12)Between connectivity port at.
2. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described Query unit(12)By inquiry of the domain name subdomain functional module, inquiry of the domain name IP functional module and IP is counter looks into domain name module institute structure At, and the form to be worked independently between each portion using formula submits domain name and IP address when task to look into system user It askes, quickly to be positioned to the loophole of cyberspace.
3. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described Detection unit(13)By port scan and service detection module, operating system detection module and WEB server detection module institute structure At, and the form to be worked independently between each portion using formula the submitting to system user of the task and operating system are detected, To find relevant loophole in time.
4. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described Data processing unit(14)By the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module and WEB service component Judgment module is constituted, and the data of task can be submitted to carry out analytical integration to system user.
5. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described Management and running unit(15)It is made of distribution task communication module and distributed attacks module, in combination with the data after analytical integration Information carries out distributed attacks to the loophole of appearance to be distributed to task.
6. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described Safety guard unit(16)Storage server, the machine firewall, region firewall, hardware firewall including multiple subsystems, Software firewall and remote firewall, the remote firewall include remote software firewall and remote hardware firewall.
7. a kind of cyberspace loophole merger platform distribution service system according to claim 6, it is characterised in that:It is described The storage server of subsystem is connected with the machine firewall, and the machine firewall is connect with region firewall, and each height It is connected with each other between the firewall of system.
CN201810746271.XA 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform Active CN108900516B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810746271.XA CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810746271.XA CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Publications (2)

Publication Number Publication Date
CN108900516A true CN108900516A (en) 2018-11-27
CN108900516B CN108900516B (en) 2021-06-22

Family

ID=64348231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810746271.XA Active CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Country Status (1)

Country Link
CN (1) CN108900516B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111090418A (en) * 2019-11-26 2020-05-01 常州工业职业技术学院 Intelligent service enterprise labeling operation maintenance system
CN111885094A (en) * 2020-09-28 2020-11-03 浙江省能源集团有限公司 Industrial control system network safety protection capability inspection and evaluation system
CN112637119A (en) * 2020-11-13 2021-04-09 北京大米科技有限公司 Host scanning method and device, storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495884A (en) * 2011-12-08 2012-06-13 中国信息安全测评中心 Vulnerability information cloud service method based on Internet
CN104348829A (en) * 2014-09-26 2015-02-11 智慧城市信息技术有限公司 Network security situation sensing system and method
CN105069158A (en) * 2015-08-25 2015-11-18 携程计算机技术(上海)有限公司 Data mining method and system
CN106874755A (en) * 2017-01-22 2017-06-20 中国人民解放军信息工程大学 The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks
CN107087001A (en) * 2017-05-15 2017-08-22 华中科技大学 A kind of important address spatial retrieval system in distributed internet
US20180018463A1 (en) * 2016-07-14 2018-01-18 IronNet Cybersecurity, Inc. Simulation and virtual reality based cyber behavioral systems
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method
CN108769018A (en) * 2018-05-29 2018-11-06 北京理工大学 A kind of cyberspace security measure method of the more granularities of multidimensional

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495884A (en) * 2011-12-08 2012-06-13 中国信息安全测评中心 Vulnerability information cloud service method based on Internet
CN104348829A (en) * 2014-09-26 2015-02-11 智慧城市信息技术有限公司 Network security situation sensing system and method
CN105069158A (en) * 2015-08-25 2015-11-18 携程计算机技术(上海)有限公司 Data mining method and system
US20180018463A1 (en) * 2016-07-14 2018-01-18 IronNet Cybersecurity, Inc. Simulation and virtual reality based cyber behavioral systems
CN106874755A (en) * 2017-01-22 2017-06-20 中国人民解放军信息工程大学 The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks
CN107087001A (en) * 2017-05-15 2017-08-22 华中科技大学 A kind of important address spatial retrieval system in distributed internet
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method
CN108769018A (en) * 2018-05-29 2018-11-06 北京理工大学 A kind of cyberspace security measure method of the more granularities of multidimensional

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张焕国 等: "《网络空间安全综述》", 《中国科学:信息科学》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111090418A (en) * 2019-11-26 2020-05-01 常州工业职业技术学院 Intelligent service enterprise labeling operation maintenance system
CN111090418B (en) * 2019-11-26 2023-08-01 常州工业职业技术学院 Intelligent service enterprise labeling operation maintenance system
CN111885094A (en) * 2020-09-28 2020-11-03 浙江省能源集团有限公司 Industrial control system network safety protection capability inspection and evaluation system
CN111885094B (en) * 2020-09-28 2021-02-26 浙江省能源集团有限公司 Industrial control system network safety protection capability inspection and evaluation system
CN112637119A (en) * 2020-11-13 2021-04-09 北京大米科技有限公司 Host scanning method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN108900516B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN107659543B (en) Protection method for APT (android packet) attack of cloud platform
CN109922075A (en) Network security knowledge map construction method and apparatus, computer equipment
CN110324313B (en) Honeypot system-based malicious user identification method and related equipment
CN108900516A (en) A kind of cyberspace loophole merger platform distribution service system
CN103942639B (en) Policy management system and its method for policy consultation service system
CN107800709B (en) A kind of method and device generating network attack detection strategy
CN100362803C (en) Network safety warning system based on cluster and relavance
CN102685145A (en) Domain name server (DNS) data packet-based bot-net domain name discovery method
CN112269316B (en) High-robustness threat hunting system and method based on graph neural network
CN103281333A (en) Forwarding method and device of data flow
CN101873231B (en) Network intrusion character configuration method and system
CN103986706A (en) Security structure design method dealing with APT attacks
Cao et al. Combating friend spam using social rejections
CN111510463B (en) Abnormal behavior recognition system
US8117181B2 (en) System for notification of group membership changes in directory service
CN113382010B (en) Large-scale network security defense system based on cooperative intrusion detection
CN108833368A (en) Network space vulnerability merging platform system
CN107835153B (en) Vulnerability situation data fusion method
CN108377275B (en) Network security protection method based on neural network algorithm
CN105915513B (en) The lookup method and device of the malicious service supplier of composite services in cloud system
CN114363002A (en) Method and device for generating network attack relation graph
CN100428731C (en) Method for preventing star-shape network from invading and attacking based on intelligent exchanger
CN112291263A (en) Data blocking method and device
CN103428029B (en) Search authentication processing method and device
Xu et al. NetworkTrace: probabilistic relevant pattern recognition approach to attribution trace analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant