CN108965253A - A kind of network safety system based on artificial intelligence - Google Patents

A kind of network safety system based on artificial intelligence Download PDF

Info

Publication number
CN108965253A
CN108965253A CN201810595279.0A CN201810595279A CN108965253A CN 108965253 A CN108965253 A CN 108965253A CN 201810595279 A CN201810595279 A CN 201810595279A CN 108965253 A CN108965253 A CN 108965253A
Authority
CN
China
Prior art keywords
artificial intelligence
electrically connected
cloud computing
analysis platform
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810595279.0A
Other languages
Chinese (zh)
Inventor
胡昆峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Bosen Internet Technology Co Ltd
Original Assignee
Anhui Bosen Internet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Bosen Internet Technology Co Ltd filed Critical Anhui Bosen Internet Technology Co Ltd
Priority to CN201810595279.0A priority Critical patent/CN108965253A/en
Publication of CN108965253A publication Critical patent/CN108965253A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of network safety systems based on artificial intelligence, including the anti-tracing system of cloud computing, artificial intelligence monitoring system, big data analysis platform, security context monitoring module, swindle data interception system, trojan horse shielding system, loophole data detection module and data protective separation system, the artificial intelligence monitoring system and the anti-tracing system of cloud computing are electrically connected, the artificial intelligence monitoring system and big data analysis platform are electrically connected, the artificial intelligence monitoring system and security context monitoring module are electrically connected, the artificial intelligence monitoring system and swindle data interception system are electrically connected, the artificial intelligence monitoring system and trojan horse shielding system are electrically connected, pass through the anti-tracing system of the cloud computing of setting, it can be tracked by the way that cloud computing technology is counter to trojan horse etc., pass through the artificial of setting Intelligent monitor system, for being monitored by AI artificial intelligence technology to network environment.

Description

A kind of network safety system based on artificial intelligence
Technical field
The present invention relates to technical field of network security, more particularly, to a kind of network safety system based on artificial intelligence.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.From net Network operation and manager's angle are said, it is desirable to the operations such as access, the read-write of local network information are protected and be controlled, avoided out Existing " trapdoor ", virus, illegal access, refusal services and the threats such as Internet resources are illegally occupied and illegally controlled, prevention and defence The attack of network hacker.For safe and secret department, they wish to illegal, harmful or be related to the information of state secret Be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, bring about great losses to country.In system While processing capacity improves, the concatenation ability of system is also in the continuous improvement.But it is improved in concatenation ability information, negotiability While, the safety problem based on network connection also becomes increasingly conspicuous, and whole network security is mainly manifested in the following aspects: Physical security, network topology structure safety, network system security, application system security and safety of network management of network etc..
It always will appear various careless omissions by common data or personal monitor to trojan horse at present, people's property made At great loss, in addition, it is also possible to cause state secret information leakage, greatly harm is generated to society, country is made At huge loss.
Summary of the invention
The technical problem to be solved by the present invention is to overcome the existing defects, provides a kind of network security based on artificial intelligence System, to solve the above problems.
To achieve the above object, the invention provides the following technical scheme: a kind of network safety system based on artificial intelligence, Including the anti-tracing system of cloud computing, artificial intelligence monitoring system, big data analysis platform, security context monitoring module, swindle number According to intercepting system, trojan horse shielding system, loophole data detection module and data protective separation system, the artificial intelligence prison Control system and the anti-tracing system of cloud computing are electrically connected, and the artificial intelligence monitoring system electrically connects with big data analysis platform It connects, the artificial intelligence monitoring system and security context monitoring module are electrically connected, the artificial intelligence monitoring system and swindle Data interception system is electrically connected, and the artificial intelligence monitoring system and trojan horse shielding system are electrically connected, described artificial Intelligent monitor system and loophole data detection module are electrically connected, the artificial intelligence monitoring system and data protection shielding system It is electrically connected.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference It is electrically connected with security context monitoring module.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference It is electrically connected with swindle data interception system.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference It is electrically connected with trojan horse shielding system.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference It is electrically connected with loophole data detection module.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference It is electrically connected with data protection shielding system.
Compared with prior art, the beneficial effects of the present invention are: network safety system of this kind based on artificial intelligence, passes through The anti-tracing system of the cloud computing of setting can be tracked by the way that cloud computing technology is counter to trojan horse etc., pass through the people of setting Work intelligent monitor system passes through the big data analysis of setting for being monitored by AI artificial intelligence technology to network environment Whether platform, can safe by network environment present in big data analysis data, and the security context for passing through setting monitors mould Block, for being monitored to network present in data, by the swindle data interception system of setting, for swindle data into Row intercepts, and passes through the loophole number of setting for carrying out isolation processing to trojan horse by the trojan horse shielding system of setting According to detection module, for carrying out detection processing to loophole data, by the data protection shielding system of setting, for data into The processing of row protective separation, it is scientific and reasonable for structure, it is safe and convenient to use, it provides a great help for people.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of network safety system modular structure schematic diagram based on artificial intelligence of the present invention;
In figure: 1, the anti-tracing system of cloud computing;2, artificial intelligence monitoring system;3, big data analysis platform;4, safety collar Border monitoring module;5, data interception system is swindled;6, trojan horse shielding system;7, loophole data detection module;8, data are protected Protect shielding system.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments, is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of network safety system based on artificial intelligence, including The anti-tracing system 1 of cloud computing, artificial intelligence monitoring system 2, big data analysis platform 3, security context monitoring module 4, swindle number According to intercepting system 5, trojan horse shielding system 6, loophole data detection module 7 and data protective separation system 8, artificial intelligence prison Control system 2 and the anti-tracing system 1 of cloud computing are electrically connected, and artificial intelligence monitoring system 2 electrically connects with big data analysis platform 3 It connects, artificial intelligence monitoring system 2 and security context monitoring module 4 are electrically connected, and artificial intelligence monitoring system 2 is blocked with swindle data It cuts system 5 to be electrically connected, artificial intelligence monitoring system 2 and trojan horse shielding system 6 are electrically connected, artificial intelligence monitoring system 2 are electrically connected with loophole data detection module 7, and artificial intelligence monitoring system 2 and data protection shielding system 8 are electrically connected.
The anti-tracing system 1 of cloud computing, big data analysis platform 3 are electrically connected with security context monitoring module 4 respectively, cloud meter It calculates anti-tracing system 1, big data analysis platform 3 to be electrically connected with swindle data interception system 5 respectively, the anti-tracing system of cloud computing 1, big data analysis platform 3 is electrically connected with trojan horse shielding system 6 respectively, the anti-tracing system 1 of cloud computing, big data analysis Platform 3 respectively with loophole data detection module 7 be electrically connected, the anti-tracing system 1 of cloud computing, big data analysis platform 3 respectively with Data protection shielding system 8 is electrically connected.
Concrete principle: in use, the anti-tracing system 1 of cloud computing is chased after by the way that cloud computing technology is counter to trojan horse etc. Track, artificial intelligence monitoring system 2 are monitored network environment by AI artificial intelligence technology, and big data analysis platform 3 passes through Network environment present in big data analysis data whether safety, security context monitoring module 4 to network present in data into Row monitoring, swindle 5 pairs of swindle data of data interception system intercept, trojan horse shielding system 6 to trojan horse progress every From processing, loophole data detection module 7 carries out detection processing to loophole data, and data protection shielding system 8 protects data Protect isolation processing.
Network safety system of this kind based on artificial intelligence can pass through cloud by the anti-tracing system 1 of the cloud computing of setting Computing technique is counter to trojan horse etc. to be tracked, by the artificial intelligence monitoring system 2 of setting, for passing through AI artificial intelligence Technology is monitored network environment, can be by present in big data analysis data by the big data analysis platform 3 of setting Network environment whether safety, by the security context monitoring module 4 of setting, for being supervised to network present in data Control is isolated for intercepting to swindle data by the trojan horse of setting by the swindle data interception system 5 of setting System 6, for carrying out isolation processing to trojan horse, by the loophole data detection module 7 of setting, for loophole data into Row detection processing, by the data protection shielding system 8 of setting, for carrying out protective separation processing to data, scientific structure is closed Reason, it is safe and convenient to use, it provides a great help for people.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features, All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (6)

1. a kind of network safety system based on artificial intelligence, including the anti-tracing system of cloud computing (1), artificial intelligence monitoring system (2), big data analysis platform (3), security context monitoring module (4), swindle data interception system (5), trojan horse isolation system System (6), loophole data detection module (7) and data protective separation system (8), which is characterized in that artificial intelligence monitoring system It unites (2) and the anti-tracing system of cloud computing (1) is electrically connected, the artificial intelligence monitoring system (2) and big data analysis platform (3) It is electrically connected, the artificial intelligence monitoring system (2) and security context monitoring module (4) are electrically connected, the artificial intelligence prison Control system (2) and swindle data interception system (5) are electrically connected, and the artificial intelligence monitoring system (2) is isolated with trojan horse System (6) is electrically connected, and the artificial intelligence monitoring system (2) and loophole data detection module (7) are electrically connected, described artificial Intelligent monitor system (2) and data protection shielding system (8) are electrically connected.
2. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing Anti- tracing system (1), big data analysis platform (3) are electrically connected with security context monitoring module (4) respectively.
3. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing Anti- tracing system (1), big data analysis platform (3) are electrically connected with swindle data interception system (5) respectively.
4. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing Anti- tracing system (1), big data analysis platform (3) are electrically connected with trojan horse shielding system (6) respectively.
5. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing Anti- tracing system (1), big data analysis platform (3) are electrically connected with loophole data detection module (7) respectively.
6. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing Anti- tracing system (1), big data analysis platform (3) are electrically connected with data protection shielding system (8) respectively.
CN201810595279.0A 2018-06-11 2018-06-11 A kind of network safety system based on artificial intelligence Withdrawn CN108965253A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810595279.0A CN108965253A (en) 2018-06-11 2018-06-11 A kind of network safety system based on artificial intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810595279.0A CN108965253A (en) 2018-06-11 2018-06-11 A kind of network safety system based on artificial intelligence

Publications (1)

Publication Number Publication Date
CN108965253A true CN108965253A (en) 2018-12-07

Family

ID=64488427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810595279.0A Withdrawn CN108965253A (en) 2018-06-11 2018-06-11 A kind of network safety system based on artificial intelligence

Country Status (1)

Country Link
CN (1) CN108965253A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404906A (en) * 2020-03-10 2020-07-10 北京微呼科技有限公司 Communication safety monitoring system based on artificial intelligence
CN111770108A (en) * 2020-07-09 2020-10-13 海南科技职业大学 Network safety system based on artificial intelligence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404906A (en) * 2020-03-10 2020-07-10 北京微呼科技有限公司 Communication safety monitoring system based on artificial intelligence
CN111770108A (en) * 2020-07-09 2020-10-13 海南科技职业大学 Network safety system based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN104023034B (en) Security defensive system and defensive method based on software-defined network
Sandhu et al. A survey of intrusion detection & prevention techniques
CN109995794A (en) A kind of security protection system, method, equipment and storage medium
CN108965210A (en) Safety test platform based on scene-type attacking and defending simulation
CN104660610A (en) Cloud computing environment based intelligent security defending system and defending method thereof
CN109672689A (en) A kind of big data network security monitoring equipment
CN105592016A (en) Virtual machine protection device of power information system in cloud environment
CN108965253A (en) A kind of network safety system based on artificial intelligence
CN108810035A (en) A kind of Network Security Device monitored in real time
Rawat et al. Cyber threat exploitation and growth during COVID-19 times
Li et al. Information resources sharing security in cloud computing
Ahmad et al. Security issues on banking systems
Lock Five steps to beating ransomware's five-minute warning
Capelão et al. Cybersecurity in healthcare: Risk analysis in health institution in Portugal
ALsaed et al. Covid-19 age: Challenges in cybersecurity and possible solution domains
Lakh et al. Using Honeypot Programs for Providing Defense of Banking Network Infrastructure
CN106598713A (en) Secure dynamic virtual machine migration method and system
Martsenyuk et al. Aspects of protection of accounting data in the conditions of use of innovation and information technologies.
Huang Computer network security hazards and preventive strategies
Xia Data security risk and preventive measures of virtual cloud server based on cloud computing
CN201742439U (en) Network device based on firewall and intrusion prevention system (IPS)
Taylor Covid-19: Silencing health workers, researchers, and journalists caused unnecessary deaths, says Amnesty
Levkin et al. The latest cybersecurity technologies in the context of digital transformation
CN112839020A (en) Artificial intelligence network safety system
Umar Inmate OS and VMM based Secured Virtualization for Cloud Encompassment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication