CN109842631A - A kind of network information security intelligent analysis system - Google Patents
A kind of network information security intelligent analysis system Download PDFInfo
- Publication number
- CN109842631A CN109842631A CN201910218074.5A CN201910218074A CN109842631A CN 109842631 A CN109842631 A CN 109842631A CN 201910218074 A CN201910218074 A CN 201910218074A CN 109842631 A CN109842631 A CN 109842631A
- Authority
- CN
- China
- Prior art keywords
- module
- alarm
- information
- network
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of network information security intelligent analysis systems, including data access module, data processing module, network security monitoring modular, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation module, alarm sending module and alarm execution module;The data access module and data processing module communicate to connect, the big data acquisition module and data processing module communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and firewall are wirelessly connected, institute's firewall and alert analysis module communicate to connect, the logging modle and alert analysis module communicate to connect, the top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect;The present invention can acquire more data and carry out safety analysis, while can also more preferably protect using the computer of the system from damage.
Description
Technical field
The invention belongs to safety analysis fields, are related to network information exploitation technology, specifically a kind of network information security intelligence
It can analysis system.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted, network
Information security analysis system carries out a kind of system of safety analysis aiming at the network information, and effect is to guarantee network
Information access into computer after will not cause damages to computer.
Existing network information security analysis system, the process of analysis is excessively single so that partial risks information be easy into
Enter into computer, and the correlation data analyzed is less, also results in risk information and is easily accessible in computer, and is existing
Analysis system merits and demerits cannot preferably protect computer, in order to solve these defects, it is proposed that a solution in single.
Summary of the invention
The purpose of the present invention is to provide a kind of network information security intelligent analysis systems.
The technical problems to be solved by the invention are as follows:
(1) more data how are acquired to compare and analyze;
(2) how preferably to protect using the computer of the system from damage.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of network information security intelligent analysis system, including data access module, data processing module, network security prison
Survey module, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation module, alarm transmission
Module and alarm execution module;
The data access module and data processing module communicate to connect, the big data acquisition module and data processing mould
Block communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and fire prevention
Wall is wirelessly connected, and institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect,
The top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, the alarm hair
Module and top control module is sent to communicate to connect, the alarm execution module and alarm sending module communicate to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module,
The network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data
In processing module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and this kind is believed
The feature of breath is sent in data processing module, the data processing module receive after various information again can to various information into
Row analysis processing, the firewall play certain protective action, and the alert analysis module can be handled in data processing module
Corresponding data out is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another grading letter of logging modle
Breath can be sent in top control module, and the logging modle can store the warning information graded out every time, the master control
Module sends control instruction control alarm sending module according to the Alert Level evaluated and sends alarm, and the alarm sends mould
Block can be sent an alarm in alarm execution module, and the alarm execution module is in the alarm for receiving the transmission of alarm sending module
Alert content can be executed after information, the truncation module, which can be truncated when the network analysis goes out high-level security risk using this, is
The connection of the computer and external network of system;
The data access module can acquire the IP information and transmission time information in information source in access information, described
Data processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to is to receive for the first time and repeat to receive two kinds, is received for the first time
The specific decision process for receiving two kinds with repetition is as follows: the system will record the source of each message received, connect when in real time
The informed source of receipts is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is
The source not recorded, the message are to receive type for the first time;
Step 2: it when received message attaches most importance to multiple connection sowing class, needs to believe the IP of the source-information of recorded mistake
Breath is extracted to be compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat to receive the flat of message
It receives duration and is labeled as T1;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk that will be had already appeared
Information type is sent in data processing module, and the processing can be to received type of message and big data acquisition module from module
Acquisition type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by word
Symbol fragment label is ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be recorded
Enter;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out secondary inspection again
Rope;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be by for danger message
Typing;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
Further, the alert analysis module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X
Value Q;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through
Top control module sends control instruction to alarm sending module, can be to network operation after alarm sending module receives control instruction
The equipment of personnel issues the information for paying attention to maintenance, and information particular content is " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can lead to
It crosses top control module and sends control instruction to alarm sending module, after alarm sending module receives control instruction, can be tieed up to network
The equipment of shield personnel issues the information checked network, and information particular content is " to ask maintenance personnel in time to network security
Carry out Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can be by total
It controls module and sends control instruction to alarm sending module, after truncation module and alarm sending module receive control instruction, alarm
Sending module connects first can issue urgent while instruct to the equipment of network maintenance staff, and alarm execution module can flash red
Light and beep, alarm is sent rear truncation module and can cut off between the computer sounded an alarm and other equipment
Connection.
Further, the warning information that the alert analysis module is analyzed can be all sent in logging modle, institute
It states logging modle and can be sent the warning information content analyzed in big data acquisition module every preset time and followed
Ring utilizes.
Further, the alarm execution module is made of several buzzers and several red colored lamps.
Beneficial effects of the present invention:
(1) present invention passes through the data processing module of setting, and data access module is simply divided the data of access
Class, the type that the information that data access module will acquire is divided to is reception for the first time and repetition receives two kinds, and when reception
Message attach most importance to multiple connection sowing class when, the IP information of the source-information of recorded mistake can be extracted same with real-time reception
The IP of the message in source is compared, and IP is compared by illustrating information security, connects when IP, which is compared, not to be passed through to message
Time receiving length is compared, and passes through formula formula T1-T2=| T |, available time difference T judges that computer connects further according to T
Whether the message of receipts is safe, so that computer, which is effectively ensured, passes through the received information security of network, and data processing module
It can be also compared what is received with the dangerous information type of big data acquisition module acquisition, ratio in several ways is to more
The analytical effect of the system is further improved, also ensures the safety of the system;
(2) present invention can calculate collected danger message number in the unit time by the alert analysis module of setting,
By formula P-X=Q, the difference Q between line threshold X, alert analysis are touched in available danger vehicle message reference numerals P and alarm
Module can issue the warning information of different stage according to the size of Q value, and disconnected use is cut according to the rank of warning information
Connection between the computer and external network and other equipment of the system can preferably protect computer from damage, should
The design of kind of scheme allows the system to have more functions, so that the system is more suitable popularization and use.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is flow diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of network information security intelligent analysis system, a kind of network information security intelligent analysis system,
Including data access module, data processing module, network security monitoring modular, big data acquisition module, firewall, alert analysis
Module, logging modle top control module, truncation module, alarm sending module and alarm execution module;
The data access module and data processing module communicate to connect, the big data acquisition module and data processing mould
Block communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and fire prevention
Wall is wirelessly connected, and institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect,
The top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, the alarm hair
Module and top control module is sent to communicate to connect, the alarm execution module and alarm sending module communicate to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module,
The network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data
In processing module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and this kind is believed
The feature of breath is sent in data processing module, the data processing module receive after various information again can to various information into
Row analysis processing, the firewall play certain protective action, and the alert analysis module can be handled in data processing module
Corresponding data out is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another grading letter of logging modle
Breath can be sent in top control module, and the logging modle can store the warning information graded out every time, the master control
Module sends control instruction control alarm sending module according to the Alert Level evaluated and sends alarm, and the alarm sends mould
Block can be sent an alarm in alarm execution module, and the alarm execution module is in the alarm for receiving the transmission of alarm sending module
Alert content can be executed after information, the truncation module, which can be truncated when the network analysis goes out high-level security risk using this, is
The connection of the computer and external network of system;
The data access module can acquire the IP information and transmission time information in information source in access information, described
Data processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to is to receive for the first time and repeat to receive two kinds, is received for the first time
The specific decision process for receiving two kinds with repetition is as follows: the system will record the source of each message received, connect when in real time
The informed source of receipts is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is
The source not recorded, the message are to receive type for the first time;
Step 2: it when received message attaches most importance to multiple connection sowing class, needs to believe the IP of the source-information of recorded mistake
Breath is extracted to be compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat to receive the flat of message
It receives duration and is labeled as T1;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk that will be had already appeared
Information type is sent in data processing module, and the processing can be to received type of message and big data acquisition module from module
Acquisition type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by word
Symbol fragment label is ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be recorded
Enter;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out secondary inspection again
Rope;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be by for danger message
Typing;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
Further, the alert analysis module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X
Value Q;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through
Top control module sends control instruction to alarm sending module, can be to network operation after alarm sending module receives control instruction
The equipment of personnel issues the information for paying attention to maintenance, and information particular content is " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can lead to
It crosses top control module and sends control instruction to alarm sending module, after alarm sending module receives control instruction, can be tieed up to network
The equipment of shield personnel issues the information checked network, and information particular content is " to ask maintenance personnel in time to network security
Carry out Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can be by total
It controls module and sends control instruction to alarm sending module, after truncation module and alarm sending module receive control instruction, alarm
Sending module connects first can issue urgent while instruct to the equipment of network maintenance staff, and alarm execution module can flash red
Light and beep, alarm is sent rear truncation module and can cut off between the computer sounded an alarm and other equipment
Connection.
The warning information that the alert analysis module is analyzed can be all sent in logging modle, the logging modle
It can send the warning information content analyzed in big data acquisition module and recycle every preset time.
The alarm execution module is made of several buzzers and several red colored lamps.
A kind of network information security intelligent analysis system, at work, data access module are used to access external data, and
The data of access are transferred in data processing module, network security monitoring modular also can real-time monitoring access network safe shape
Condition, and network safety information is transmitted in data processing module, big data acquisition module can be acquired in network in real time and sent out
Existing non-safety information, and send the feature of this kind of information in data processing module, data processing module receives respectively again
Various information can be analyzed and processed after category information, the type of the information that data access module will acquire point is for the first time
It receives and repeats to receive two kinds, and when received message attaches most importance to multiple connection sowing class, it can be by the source-information of recorded mistake
IP information extract and be compared with the IP of the message in the same source of real-time reception, IP is compared by illustrating that information is pacified
Entirely, when IP compare not by when the reception duration of message is compared, pass through formula formula T1-T2=| T |, can obtain
To time difference T, judge whether the received message of computer is safe, connects so that computer be effectively ensured by network further according to T
The information security of receipts, and the dangerous information class with the acquisition of big data acquisition module that data processing module can will also receive
Type is compared, and comparison in several ways further improves the analytical effect of the system, also ensures the system
Safety, firewall plays certain protective action, and alert analysis module can be in the respective counts that data processing module is handled out
According to being assessed and graded, rating information can be divided into two parts of portions and be sent to logging modle another rating information and can be sent
Into top control module, logging modle can store the warning information graded out every time, and top control module is according to the police evaluated
Report rank sends alarm to send control instruction control alarm sending module, and alarm sending module can send an alarm to alarm and hold
In row module, alarm execution module can execute alert content after the warning information for receiving the transmission of alarm sending module, be truncated
The connection of the computer and external network using the system can be truncated in module when the network analysis goes out high-level security risk.
The present invention passes through the data processing module being arranged first, and data access module is simply divided the data of access
Class, the type that the information that data access module will acquire is divided to is reception for the first time and repetition receives two kinds, and when reception
Message attach most importance to multiple connection sowing class when, the IP information of the source-information of recorded mistake can be extracted same with real-time reception
The IP of the message in source is compared, and IP is compared by illustrating information security, connects when IP, which is compared, not to be passed through to message
Time receiving length is compared, and passes through formula formula T1-T2=| T |, available time difference T judges that computer connects further according to T
Whether the message of receipts is safe, so that computer, which is effectively ensured, passes through the received information security of network, and data processing module
It can be also compared what is received with the dangerous information type of big data acquisition module acquisition, ratio in several ways is to more
The analytical effect of the system is further improved, also ensures the safety of the system;
Secondly the present invention can calculate collected danger message in the unit time by the alert analysis module of setting
Number, by formula P-X=Q, the difference Q between line threshold X, alarm point are touched in available danger vehicle message reference numerals P and alarm
Analysis module can issue the warning information of different stage according to the size of Q value, and disconnected make is cut according to the rank of warning information
With the connection between the computer and external network and other equipment of the system, it can preferably protect computer from damaging,
The design of this kind of scheme allows the system to have more functions, so that the system is more suitable popularization and use.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple
Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention
Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.
Claims (4)
1. a kind of network information security intelligent analysis system, which is characterized in that including data access module, data processing module,
Network security monitoring modular, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation mould
Block, alarm sending module and alarm execution module;
The data access module and data processing module communicate to connect, and the big data acquisition module and data processing module are logical
Letter connection, the network security monitoring modular and data processing module communication connection, the data processing module and firewall without
Line connection, institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect, described
Top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, and the alarm sends mould
On block and top control module communication connection, the alarm execution module and alarm sending module are communicated to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module, described
Network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data processing
In module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and by this kind of information
Feature is sent in data processing module, and the data processing module can divide various information after receiving various information again
Analysis processing, the firewall play certain protective action, and the alert analysis module can be handled out in data processing module
Corresponding data is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another rating information meeting of logging modle
It is sent in top control module, the logging modle can store the warning information graded out every time, the top control module
Control instruction control alarm sending module is sent according to the Alert Level evaluated sends alarm, the alarm sending module meeting
It sends an alarm in alarm execution module, the alarm execution module is in the warning information for receiving the transmission of alarm sending module
After can execute alert content, the truncation module can be truncated when the network analysis goes out high-level security risk uses the system
The connection of computer and external network;
The data access module can acquire the IP information and transmission time information in information source, the data in access information
Processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to be for the first time receive with repeat receive two kinds, for the first time receive with again
The specific decision process that multiple connection receives two kinds is as follows: the system will record the source of each message received, when real-time reception
Informed source is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is not remember
The source recorded, the message are to receive type for the first time;
Step 2: when received message attaches most importance to multiple connection sowing class, the IP information by the source-information of recorded mistake is needed to mention
It takes out and is compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat being averaged for message of reception and connect
Time receiving, long label was;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk information that will be had already appeared
Type is sent in data processing module, and the processing can acquire received type of message and big data acquisition module from module
Type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by character sheet
Segment mark is denoted as ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be logged;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out quadratic search again;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be recorded for danger message
Enter;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
2. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alert analysis
Module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference Q by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through master control
Module sends control instruction to alarm sending module, can be to network maintenance staff after alarm sending module receives control instruction
Equipment issue pay attention to maintenance information, information particular content be " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can be by total
It controls module and sends control instruction to alarm sending module, it, can be to network operation people after alarm sending module receives control instruction
The equipment of member issues the information checked network, and information particular content is " maintenance personnel to be asked to carry out in time to network security
Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can pass through master control mould
Block sends control instruction to alarm sending module, and after truncation module and alarm sending module receive control instruction, alarm is sent
Module connects first can issue urgent while instruct to the equipment of network maintenance staff, and the lamp of alarm execution module meeting flash red
Light simultaneously beeps, and alarm, which is sent rear truncation module, can cut off company between the computer sounded an alarm and other equipment
It connects.
3. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alert analysis
The warning information that module is analyzed can be all sent in logging modle, and the logging modle can will divide every preset time
The warning information content of precipitation, which is sent in big data acquisition module, to be recycled.
4. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alarm executes
Module is made of several buzzers and several red colored lamps.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910218074.5A CN109842631A (en) | 2019-03-21 | 2019-03-21 | A kind of network information security intelligent analysis system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910218074.5A CN109842631A (en) | 2019-03-21 | 2019-03-21 | A kind of network information security intelligent analysis system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109842631A true CN109842631A (en) | 2019-06-04 |
Family
ID=66886045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910218074.5A Pending CN109842631A (en) | 2019-03-21 | 2019-03-21 | A kind of network information security intelligent analysis system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109842631A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830441A (en) * | 2019-09-30 | 2020-02-21 | 广西科技大学 | Information safety monitoring system based on big data |
CN112650317A (en) * | 2020-12-18 | 2021-04-13 | 合肥阿格德信息科技有限公司 | Integrated computer measurement and control system |
CN114039747A (en) * | 2021-10-21 | 2022-02-11 | 烽火通信科技股份有限公司 | Method, device, equipment and storage medium for preventing DDOS data retransmission attack |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967537A (en) * | 2015-06-30 | 2015-10-07 | 北京奇艺世纪科技有限公司 | Alarm information pushing method and device |
CN107864153A (en) * | 2017-12-11 | 2018-03-30 | 江苏恒信和安电子科技有限公司 | A kind of internet worm method for early warning based on network security sensor |
CN108564087A (en) * | 2018-04-13 | 2018-09-21 | 腾讯科技(深圳)有限公司 | Risk Identification Method, device, terminal and the storage medium of small advertisement |
CN108833442A (en) * | 2018-07-25 | 2018-11-16 | 安徽三实信息技术服务有限公司 | A kind of distributed network security monitoring device and its method |
CN108900466A (en) * | 2018-05-30 | 2018-11-27 | 北京五八信息技术有限公司 | Prevent processing method, device, server and the storage medium of fallacious message |
CN109067802A (en) * | 2018-10-08 | 2018-12-21 | 安徽艾可信网络科技有限公司 | A kind of identity authorization system of electric business platform account |
US10200506B2 (en) * | 2012-10-29 | 2019-02-05 | Tencent Technology (Shenzhen) Company Limited | Method, system and device for monitoring data |
-
2019
- 2019-03-21 CN CN201910218074.5A patent/CN109842631A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10200506B2 (en) * | 2012-10-29 | 2019-02-05 | Tencent Technology (Shenzhen) Company Limited | Method, system and device for monitoring data |
CN104967537A (en) * | 2015-06-30 | 2015-10-07 | 北京奇艺世纪科技有限公司 | Alarm information pushing method and device |
CN107864153A (en) * | 2017-12-11 | 2018-03-30 | 江苏恒信和安电子科技有限公司 | A kind of internet worm method for early warning based on network security sensor |
CN108564087A (en) * | 2018-04-13 | 2018-09-21 | 腾讯科技(深圳)有限公司 | Risk Identification Method, device, terminal and the storage medium of small advertisement |
CN108900466A (en) * | 2018-05-30 | 2018-11-27 | 北京五八信息技术有限公司 | Prevent processing method, device, server and the storage medium of fallacious message |
CN108833442A (en) * | 2018-07-25 | 2018-11-16 | 安徽三实信息技术服务有限公司 | A kind of distributed network security monitoring device and its method |
CN109067802A (en) * | 2018-10-08 | 2018-12-21 | 安徽艾可信网络科技有限公司 | A kind of identity authorization system of electric business platform account |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830441A (en) * | 2019-09-30 | 2020-02-21 | 广西科技大学 | Information safety monitoring system based on big data |
CN112650317A (en) * | 2020-12-18 | 2021-04-13 | 合肥阿格德信息科技有限公司 | Integrated computer measurement and control system |
CN114039747A (en) * | 2021-10-21 | 2022-02-11 | 烽火通信科技股份有限公司 | Method, device, equipment and storage medium for preventing DDOS data retransmission attack |
CN114039747B (en) * | 2021-10-21 | 2023-05-16 | 烽火通信科技股份有限公司 | DDOS data retransmission attack prevention method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109842631A (en) | A kind of network information security intelligent analysis system | |
CN102280011B (en) | Boundary safeguard alarm disposing method and system therefor | |
CN110768846A (en) | Intelligent substation network safety protection system | |
CN103530967A (en) | Security alarm system for residential area | |
CN112437041B (en) | Industrial control safety audit system and method based on artificial intelligence | |
CN207909318U (en) | Article leaves intelligent detecting prewarning system in a kind of high risk zone | |
CN104158677A (en) | Safety state analysis alarm module, system and method | |
CN204927947U (en) | A high intelligence protection screen cabinet for transformer substation | |
CN106506237B (en) | A kind of Fault Locating Method and device of substation communication network | |
CN115879162B (en) | Illegal operation alarm blocking system for database monitoring | |
CN103986236A (en) | Ground lead management system | |
CN103530965B (en) | Supermarket remote shelf monitor burglary-resisting system and method for work thereof | |
CN105739408A (en) | Business monitoring method used for power scheduling system and business monitoring system | |
CN108616723A (en) | A kind of video routing inspection system for GIL piping lanes | |
CN110176121A (en) | A kind of method, transmitter, electronic equipment and the medium of fire water monitor fire extinguishing | |
CN110259515A (en) | A kind of coal electric system coal mine signalling arrangement safe and intelligent guard system | |
CN205876395U (en) | Multipurpose underground mine positioning system | |
CN109510312A (en) | A kind of safety utilization of electric power monitoring system | |
CN213781138U (en) | ETC portal equipment anti-theft system based on camera monitoring technology and power amplifier loudspeaker linkage | |
CN104243917A (en) | Video monitoring device alarm protecting and monitoring system and control method thereof | |
CN208834444U (en) | A kind of Along Railway safeguard alarm system based on Fibre Optical Sensor | |
CN108615326B (en) | Method and system for networking monitoring of fire-fighting equipment | |
CN205647793U (en) | Security and protection in bank network system | |
CN205405769U (en) | Safety monitoring device prevents invading | |
CN111612995A (en) | Frontier defense equipment and system for construction site safety supervision |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190604 |