CN109547425A - A kind of information security of computer network monitor system - Google Patents
A kind of information security of computer network monitor system Download PDFInfo
- Publication number
- CN109547425A CN109547425A CN201811348232.0A CN201811348232A CN109547425A CN 109547425 A CN109547425 A CN 109547425A CN 201811348232 A CN201811348232 A CN 201811348232A CN 109547425 A CN109547425 A CN 109547425A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- signal
- server network
- connect
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/143—Termination or inactivation of sessions, e.g. event-controlled end of session
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of information security of computer network monitor systems, including server network module, data acquisition module, judgment module, trojan horse database, execution module and relay, compared with prior art, the present invention passes through the data-signal of acquisition server network module, the viral data of trojan horse database are compared by judgment module, when judgment module, which detects in the data transmitted in server network module, virus identical with trojan horse lane database, it outputs signal to execution module control relay and disconnects server network module, force effective disconnection network data transmission, prevent viral data from invading, effectively improve the network information security, it has the value of popularization and application.
Description
Technical field
The present invention relates to a kind of Computer Network Security System more particularly to a kind of information security of computer network monitoring systems
System.
Background technique
Information security mainly includes the content of following five aspect, i.e., need to guarantee the confidentiality of information, authenticity, integrality,
The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, including how taking precautions against quotient
The leakage of industry enterprise secret, prevention teenager are to leakage of browsing, personal information of flame etc..Information peace under network environment
Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital
Signature, message authentication, data encryption etc.), until security system, such as UniNAC, DLP, it can simply by the presence of security breaches
Threaten global safety.Information security refers to information system (including hardware, software, data, people, physical environment and its infrastructure)
It is protected, not by the reason of accidental or malice and by destroying, changing, revealing, system is continuously reliably normally run,
Information service is not interrupted, and finally realizes business continuance.In the prior art, the network information security is difficult to full-scope safeguards, therefore, needs
It constantly to improve and innovate.
Summary of the invention
The object of the invention is that providing a kind of information security of computer network monitoring system to solve the above-mentioned problems
System.
The present invention through the following technical solutions to achieve the above objectives:
The present invention includes server network module, data acquisition module, judgment module, trojan horse database, executes mould
The network signal transmission end of block and relay, the server network module is connect with computer, and the data acquisition module is adopted
Collect the data of the server network module, the input terminal of the data output end of the data acquisition module and the judgment module
Connection, the contrast signal input terminal of the judgment module are connect with the trojan horse database, the signal of the judgment module
Output end is connect with the signal input part of the execution module, and the control output end of the execution module and the relay connect
It connects, the control output end of the relay connects the power end connection of the server network module.
Further, the judgment module includes obtaining module, contrast module and control signal output module, the acquisition mould
Block is connect with the signal output end of the data acquisition module, the signal output end for obtaining module and the contrast module
Signal input part connection, the contrast module judge that output signal is exported to the control according to the trojan horse database and believe
Number output module.
The beneficial effects of the present invention are:
The present invention is a kind of information security of computer network monitor system, and compared with prior art, the present invention passes through acquisition
The data-signal of server network module is compared the viral data of trojan horse database by judgment module, works as judgment module
Detect have in the data transmitted in server network module it is identical with trojan horse lane database virus when, output signal to
Execution module controls relay and disconnects server network module, forces effective disconnection network data transmission, prevents viral data
Invasion, effectively improves the network information security, has the value of popularization and application.
Detailed description of the invention
Fig. 1 is structural principle block diagram of the invention.
Fig. 2 is judgment module structural principle block diagram of the invention.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings:
The present invention includes server network module, data acquisition module, judgment module, trojan horse data as shown in Figure 1:
The network signal transmission end of library, execution module and relay, the server network module is connect with computer, and the data are adopted
Collection module acquires the data of the server network module, the data output end of the data acquisition module and the judgment module
Input terminal connection, the contrast signal input terminal of the judgment module connect with the trojan horse database, the judgement mould
The signal output end of block is connect with the signal input part of the execution module, the control output end of the execution module and it is described after
Electric appliance connection, the control output end of the relay connect the power end connection of the server network module.
As shown in Figure 2: the judgment module includes obtaining module, contrast module and control signal output module, described to obtain
Modulus block is connect with the signal output end of the data acquisition module, the signal output end and the comparison mould for obtaining module
The signal input part of block connects, and the contrast module judges that output signal is exported to the control according to the trojan horse database
Signal output module processed.
Basic principles and main features and advantages of the present invention of the invention have been shown and described above.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.
Claims (2)
1. a kind of information security of computer network monitor system, it is characterised in that: including server network module, data acquisition module
Block, judgment module, trojan horse database, execution module and relay, the network signal transmission of the server network module
End is connect with computer, the data of server network module described in the data collecting module collected, the data acquisition module
Data output end connect with the input terminal of the judgment module, the contrast signal input terminal of the judgment module and the wooden horse
Virus database connection, the signal output end of the judgment module is connect with the signal input part of the execution module, described to hold
The control output end of row module is connect with the relay, and the control output end of the relay connects the server network mould
The power end of block connects.
2. information security of computer network monitor system according to claim 1, it is characterised in that: the judgment module packet
It includes and obtains module, contrast module and control signal output module, the acquisition module and the signal of the data acquisition module are defeated
Outlet connection, the signal output end for obtaining module are connect with the signal input part of the contrast module, the contrast module
Judge that output signal is exported to the control signal output module according to the trojan horse database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811348232.0A CN109547425A (en) | 2018-11-13 | 2018-11-13 | A kind of information security of computer network monitor system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811348232.0A CN109547425A (en) | 2018-11-13 | 2018-11-13 | A kind of information security of computer network monitor system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547425A true CN109547425A (en) | 2019-03-29 |
Family
ID=65847025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811348232.0A Pending CN109547425A (en) | 2018-11-13 | 2018-11-13 | A kind of information security of computer network monitor system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547425A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112637191A (en) * | 2020-12-19 | 2021-04-09 | 郑州航空工业管理学院 | Network information security management system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681251A (en) * | 2014-11-18 | 2016-06-15 | 青岛鑫益发工贸有限公司 | Network safety device system |
CN205356398U (en) * | 2015-12-17 | 2016-06-29 | 重庆电子工程职业学院 | Network security system |
US20170078455A1 (en) * | 2015-09-16 | 2017-03-16 | Profire Energy, Inc | Safety networking protocol and method |
-
2018
- 2018-11-13 CN CN201811348232.0A patent/CN109547425A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681251A (en) * | 2014-11-18 | 2016-06-15 | 青岛鑫益发工贸有限公司 | Network safety device system |
US20170078455A1 (en) * | 2015-09-16 | 2017-03-16 | Profire Energy, Inc | Safety networking protocol and method |
CN205356398U (en) * | 2015-12-17 | 2016-06-29 | 重庆电子工程职业学院 | Network security system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112637191A (en) * | 2020-12-19 | 2021-04-09 | 郑州航空工业管理学院 | Network information security management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10893068B1 (en) | Ransomware file modification prevention technique | |
US9979726B2 (en) | System and method for web application security | |
US9967270B2 (en) | Enterprise intrusion detection and remediation | |
CN101141447B (en) | HTTPS communication tunnel safety examination and content filtering system and method | |
KR101744631B1 (en) | Network security system and a method thereof | |
WO2011027496A1 (en) | Unauthorized process detection method and unauthorized process detection system | |
CN104778415B (en) | A kind of leakage-preventing system and method for data based on computer behavior | |
CN101626368A (en) | Device, method and system for preventing web page from being distorted | |
JP2008152791A (en) | Filtering device, filtering method, and program for making computer execute the method | |
JP2008541273A5 (en) | ||
CN108183901B (en) | FPGA-based host security protection physical card and data processing method thereof | |
CN105577639A (en) | Trusted device control messages | |
CN112597462A (en) | Industrial network safety system | |
CN104883364B (en) | Method and device for judging abnormity of user access server | |
CN103236932A (en) | Webpage tamper-proofing device and method based on access control and directory protection | |
CN103188254A (en) | Network security protection method capable of giving consideration to both smoothness and safety of internal and external network information | |
CN113382076A (en) | Internet of things terminal security threat analysis method and protection method | |
CN112653664A (en) | High-safety and reliable data exchange system and method between networks | |
KR101871406B1 (en) | Method for securiting control system using whitelist and system for the same | |
CN109547425A (en) | A kind of information security of computer network monitor system | |
KR100441409B1 (en) | Intrusion detection system with virus detection engine | |
KR100607110B1 (en) | Security information management and vulnerability analysis system | |
CN103440189A (en) | Software deadlock prevention method based on forced process running control | |
CN114124453B (en) | Processing method and device of network security information, electronic equipment and storage medium | |
US11032087B2 (en) | Certificate analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190329 |
|
WD01 | Invention patent application deemed withdrawn after publication |