CN108965253A - A kind of network safety system based on artificial intelligence - Google Patents
A kind of network safety system based on artificial intelligence Download PDFInfo
- Publication number
- CN108965253A CN108965253A CN201810595279.0A CN201810595279A CN108965253A CN 108965253 A CN108965253 A CN 108965253A CN 201810595279 A CN201810595279 A CN 201810595279A CN 108965253 A CN108965253 A CN 108965253A
- Authority
- CN
- China
- Prior art keywords
- artificial intelligence
- electrically connected
- cloud computing
- analysis platform
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of network safety systems based on artificial intelligence, including the anti-tracing system of cloud computing, artificial intelligence monitoring system, big data analysis platform, security context monitoring module, swindle data interception system, trojan horse shielding system, loophole data detection module and data protective separation system, the artificial intelligence monitoring system and the anti-tracing system of cloud computing are electrically connected, the artificial intelligence monitoring system and big data analysis platform are electrically connected, the artificial intelligence monitoring system and security context monitoring module are electrically connected, the artificial intelligence monitoring system and swindle data interception system are electrically connected, the artificial intelligence monitoring system and trojan horse shielding system are electrically connected, pass through the anti-tracing system of the cloud computing of setting, it can be tracked by the way that cloud computing technology is counter to trojan horse etc., pass through the artificial of setting Intelligent monitor system, for being monitored by AI artificial intelligence technology to network environment.
Description
Technical field
The present invention relates to technical field of network security, more particularly, to a kind of network safety system based on artificial intelligence.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.From net
Network operation and manager's angle are said, it is desirable to the operations such as access, the read-write of local network information are protected and be controlled, avoided out
Existing " trapdoor ", virus, illegal access, refusal services and the threats such as Internet resources are illegally occupied and illegally controlled, prevention and defence
The attack of network hacker.For safe and secret department, they wish to illegal, harmful or be related to the information of state secret
Be filtered with it is anti-blocking, avoid confidential information leakage, avoid to society generate harm, bring about great losses to country.In system
While processing capacity improves, the concatenation ability of system is also in the continuous improvement.But it is improved in concatenation ability information, negotiability
While, the safety problem based on network connection also becomes increasingly conspicuous, and whole network security is mainly manifested in the following aspects:
Physical security, network topology structure safety, network system security, application system security and safety of network management of network etc..
It always will appear various careless omissions by common data or personal monitor to trojan horse at present, people's property made
At great loss, in addition, it is also possible to cause state secret information leakage, greatly harm is generated to society, country is made
At huge loss.
Summary of the invention
The technical problem to be solved by the present invention is to overcome the existing defects, provides a kind of network security based on artificial intelligence
System, to solve the above problems.
To achieve the above object, the invention provides the following technical scheme: a kind of network safety system based on artificial intelligence,
Including the anti-tracing system of cloud computing, artificial intelligence monitoring system, big data analysis platform, security context monitoring module, swindle number
According to intercepting system, trojan horse shielding system, loophole data detection module and data protective separation system, the artificial intelligence prison
Control system and the anti-tracing system of cloud computing are electrically connected, and the artificial intelligence monitoring system electrically connects with big data analysis platform
It connects, the artificial intelligence monitoring system and security context monitoring module are electrically connected, the artificial intelligence monitoring system and swindle
Data interception system is electrically connected, and the artificial intelligence monitoring system and trojan horse shielding system are electrically connected, described artificial
Intelligent monitor system and loophole data detection module are electrically connected, the artificial intelligence monitoring system and data protection shielding system
It is electrically connected.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference
It is electrically connected with security context monitoring module.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference
It is electrically connected with swindle data interception system.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference
It is electrically connected with trojan horse shielding system.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference
It is electrically connected with loophole data detection module.
As a preferred technical solution of the present invention, the anti-tracing system of the cloud computing, big data analysis platform difference
It is electrically connected with data protection shielding system.
Compared with prior art, the beneficial effects of the present invention are: network safety system of this kind based on artificial intelligence, passes through
The anti-tracing system of the cloud computing of setting can be tracked by the way that cloud computing technology is counter to trojan horse etc., pass through the people of setting
Work intelligent monitor system passes through the big data analysis of setting for being monitored by AI artificial intelligence technology to network environment
Whether platform, can safe by network environment present in big data analysis data, and the security context for passing through setting monitors mould
Block, for being monitored to network present in data, by the swindle data interception system of setting, for swindle data into
Row intercepts, and passes through the loophole number of setting for carrying out isolation processing to trojan horse by the trojan horse shielding system of setting
According to detection module, for carrying out detection processing to loophole data, by the data protection shielding system of setting, for data into
The processing of row protective separation, it is scientific and reasonable for structure, it is safe and convenient to use, it provides a great help for people.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention
It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of network safety system modular structure schematic diagram based on artificial intelligence of the present invention;
In figure: 1, the anti-tracing system of cloud computing;2, artificial intelligence monitoring system;3, big data analysis platform;4, safety collar
Border monitoring module;5, data interception system is swindled;6, trojan horse shielding system;7, loophole data detection module;8, data are protected
Protect shielding system.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments, is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of network safety system based on artificial intelligence, including
The anti-tracing system 1 of cloud computing, artificial intelligence monitoring system 2, big data analysis platform 3, security context monitoring module 4, swindle number
According to intercepting system 5, trojan horse shielding system 6, loophole data detection module 7 and data protective separation system 8, artificial intelligence prison
Control system 2 and the anti-tracing system 1 of cloud computing are electrically connected, and artificial intelligence monitoring system 2 electrically connects with big data analysis platform 3
It connects, artificial intelligence monitoring system 2 and security context monitoring module 4 are electrically connected, and artificial intelligence monitoring system 2 is blocked with swindle data
It cuts system 5 to be electrically connected, artificial intelligence monitoring system 2 and trojan horse shielding system 6 are electrically connected, artificial intelligence monitoring system
2 are electrically connected with loophole data detection module 7, and artificial intelligence monitoring system 2 and data protection shielding system 8 are electrically connected.
The anti-tracing system 1 of cloud computing, big data analysis platform 3 are electrically connected with security context monitoring module 4 respectively, cloud meter
It calculates anti-tracing system 1, big data analysis platform 3 to be electrically connected with swindle data interception system 5 respectively, the anti-tracing system of cloud computing
1, big data analysis platform 3 is electrically connected with trojan horse shielding system 6 respectively, the anti-tracing system 1 of cloud computing, big data analysis
Platform 3 respectively with loophole data detection module 7 be electrically connected, the anti-tracing system 1 of cloud computing, big data analysis platform 3 respectively with
Data protection shielding system 8 is electrically connected.
Concrete principle: in use, the anti-tracing system 1 of cloud computing is chased after by the way that cloud computing technology is counter to trojan horse etc.
Track, artificial intelligence monitoring system 2 are monitored network environment by AI artificial intelligence technology, and big data analysis platform 3 passes through
Network environment present in big data analysis data whether safety, security context monitoring module 4 to network present in data into
Row monitoring, swindle 5 pairs of swindle data of data interception system intercept, trojan horse shielding system 6 to trojan horse progress every
From processing, loophole data detection module 7 carries out detection processing to loophole data, and data protection shielding system 8 protects data
Protect isolation processing.
Network safety system of this kind based on artificial intelligence can pass through cloud by the anti-tracing system 1 of the cloud computing of setting
Computing technique is counter to trojan horse etc. to be tracked, by the artificial intelligence monitoring system 2 of setting, for passing through AI artificial intelligence
Technology is monitored network environment, can be by present in big data analysis data by the big data analysis platform 3 of setting
Network environment whether safety, by the security context monitoring module 4 of setting, for being supervised to network present in data
Control is isolated for intercepting to swindle data by the trojan horse of setting by the swindle data interception system 5 of setting
System 6, for carrying out isolation processing to trojan horse, by the loophole data detection module 7 of setting, for loophole data into
Row detection processing, by the data protection shielding system 8 of setting, for carrying out protective separation processing to data, scientific structure is closed
Reason, it is safe and convenient to use, it provides a great help for people.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features,
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (6)
1. a kind of network safety system based on artificial intelligence, including the anti-tracing system of cloud computing (1), artificial intelligence monitoring system
(2), big data analysis platform (3), security context monitoring module (4), swindle data interception system (5), trojan horse isolation system
System (6), loophole data detection module (7) and data protective separation system (8), which is characterized in that artificial intelligence monitoring system
It unites (2) and the anti-tracing system of cloud computing (1) is electrically connected, the artificial intelligence monitoring system (2) and big data analysis platform (3)
It is electrically connected, the artificial intelligence monitoring system (2) and security context monitoring module (4) are electrically connected, the artificial intelligence prison
Control system (2) and swindle data interception system (5) are electrically connected, and the artificial intelligence monitoring system (2) is isolated with trojan horse
System (6) is electrically connected, and the artificial intelligence monitoring system (2) and loophole data detection module (7) are electrically connected, described artificial
Intelligent monitor system (2) and data protection shielding system (8) are electrically connected.
2. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing
Anti- tracing system (1), big data analysis platform (3) are electrically connected with security context monitoring module (4) respectively.
3. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing
Anti- tracing system (1), big data analysis platform (3) are electrically connected with swindle data interception system (5) respectively.
4. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing
Anti- tracing system (1), big data analysis platform (3) are electrically connected with trojan horse shielding system (6) respectively.
5. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing
Anti- tracing system (1), big data analysis platform (3) are electrically connected with loophole data detection module (7) respectively.
6. a kind of network safety system based on artificial intelligence according to claim 1, which is characterized in that the cloud computing
Anti- tracing system (1), big data analysis platform (3) are electrically connected with data protection shielding system (8) respectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810595279.0A CN108965253A (en) | 2018-06-11 | 2018-06-11 | A kind of network safety system based on artificial intelligence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810595279.0A CN108965253A (en) | 2018-06-11 | 2018-06-11 | A kind of network safety system based on artificial intelligence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108965253A true CN108965253A (en) | 2018-12-07 |
Family
ID=64488427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810595279.0A Withdrawn CN108965253A (en) | 2018-06-11 | 2018-06-11 | A kind of network safety system based on artificial intelligence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108965253A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111404906A (en) * | 2020-03-10 | 2020-07-10 | 北京微呼科技有限公司 | Communication safety monitoring system based on artificial intelligence |
CN111770108A (en) * | 2020-07-09 | 2020-10-13 | 海南科技职业大学 | Network safety system based on artificial intelligence |
-
2018
- 2018-06-11 CN CN201810595279.0A patent/CN108965253A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111404906A (en) * | 2020-03-10 | 2020-07-10 | 北京微呼科技有限公司 | Communication safety monitoring system based on artificial intelligence |
CN111770108A (en) * | 2020-07-09 | 2020-10-13 | 海南科技职业大学 | Network safety system based on artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104023034B (en) | Security defensive system and defensive method based on software-defined network | |
Sandhu et al. | A survey of intrusion detection & prevention techniques | |
CN109995794A (en) | A kind of security protection system, method, equipment and storage medium | |
CN108965210A (en) | Safety test platform based on scene-type attacking and defending simulation | |
CN104660610A (en) | Cloud computing environment based intelligent security defending system and defending method thereof | |
CN109672689A (en) | A kind of big data network security monitoring equipment | |
CN105592016A (en) | Virtual machine protection device of power information system in cloud environment | |
CN108965253A (en) | A kind of network safety system based on artificial intelligence | |
CN108810035A (en) | A kind of Network Security Device monitored in real time | |
Rawat et al. | Cyber threat exploitation and growth during COVID-19 times | |
Li et al. | Information resources sharing security in cloud computing | |
Ahmad et al. | Security issues on banking systems | |
Lock | Five steps to beating ransomware's five-minute warning | |
Capelão et al. | Cybersecurity in healthcare: Risk analysis in health institution in Portugal | |
ALsaed et al. | Covid-19 age: Challenges in cybersecurity and possible solution domains | |
Lakh et al. | Using Honeypot Programs for Providing Defense of Banking Network Infrastructure | |
CN106598713A (en) | Secure dynamic virtual machine migration method and system | |
Martsenyuk et al. | Aspects of protection of accounting data in the conditions of use of innovation and information technologies. | |
Huang | Computer network security hazards and preventive strategies | |
Xia | Data security risk and preventive measures of virtual cloud server based on cloud computing | |
CN201742439U (en) | Network device based on firewall and intrusion prevention system (IPS) | |
Taylor | Covid-19: Silencing health workers, researchers, and journalists caused unnecessary deaths, says Amnesty | |
Levkin et al. | The latest cybersecurity technologies in the context of digital transformation | |
CN112839020A (en) | Artificial intelligence network safety system | |
Umar | Inmate OS and VMM based Secured Virtualization for Cloud Encompassment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |