CN109842631A - A kind of network information security intelligent analysis system - Google Patents

A kind of network information security intelligent analysis system Download PDF

Info

Publication number
CN109842631A
CN109842631A CN201910218074.5A CN201910218074A CN109842631A CN 109842631 A CN109842631 A CN 109842631A CN 201910218074 A CN201910218074 A CN 201910218074A CN 109842631 A CN109842631 A CN 109842631A
Authority
CN
China
Prior art keywords
module
alarm
information
network
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910218074.5A
Other languages
Chinese (zh)
Inventor
裴迎公
孙莹莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Wilson Communications Technology Co Ltd
Original Assignee
Anhui Wilson Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Wilson Communications Technology Co Ltd filed Critical Anhui Wilson Communications Technology Co Ltd
Priority to CN201910218074.5A priority Critical patent/CN109842631A/en
Publication of CN109842631A publication Critical patent/CN109842631A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of network information security intelligent analysis systems, including data access module, data processing module, network security monitoring modular, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation module, alarm sending module and alarm execution module;The data access module and data processing module communicate to connect, the big data acquisition module and data processing module communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and firewall are wirelessly connected, institute's firewall and alert analysis module communicate to connect, the logging modle and alert analysis module communicate to connect, the top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect;The present invention can acquire more data and carry out safety analysis, while can also more preferably protect using the computer of the system from damage.

Description

A kind of network information security intelligent analysis system
Technical field
The invention belongs to safety analysis fields, are related to network information exploitation technology, specifically a kind of network information security intelligence It can analysis system.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted, network Information security analysis system carries out a kind of system of safety analysis aiming at the network information, and effect is to guarantee network Information access into computer after will not cause damages to computer.
Existing network information security analysis system, the process of analysis is excessively single so that partial risks information be easy into Enter into computer, and the correlation data analyzed is less, also results in risk information and is easily accessible in computer, and is existing Analysis system merits and demerits cannot preferably protect computer, in order to solve these defects, it is proposed that a solution in single.
Summary of the invention
The purpose of the present invention is to provide a kind of network information security intelligent analysis systems.
The technical problems to be solved by the invention are as follows:
(1) more data how are acquired to compare and analyze;
(2) how preferably to protect using the computer of the system from damage.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of network information security intelligent analysis system, including data access module, data processing module, network security prison Survey module, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation module, alarm transmission Module and alarm execution module;
The data access module and data processing module communicate to connect, the big data acquisition module and data processing mould Block communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and fire prevention Wall is wirelessly connected, and institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect, The top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, the alarm hair Module and top control module is sent to communicate to connect, the alarm execution module and alarm sending module communicate to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module, The network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data In processing module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and this kind is believed The feature of breath is sent in data processing module, the data processing module receive after various information again can to various information into Row analysis processing, the firewall play certain protective action, and the alert analysis module can be handled in data processing module Corresponding data out is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another grading letter of logging modle Breath can be sent in top control module, and the logging modle can store the warning information graded out every time, the master control Module sends control instruction control alarm sending module according to the Alert Level evaluated and sends alarm, and the alarm sends mould Block can be sent an alarm in alarm execution module, and the alarm execution module is in the alarm for receiving the transmission of alarm sending module Alert content can be executed after information, the truncation module, which can be truncated when the network analysis goes out high-level security risk using this, is The connection of the computer and external network of system;
The data access module can acquire the IP information and transmission time information in information source in access information, described Data processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to is to receive for the first time and repeat to receive two kinds, is received for the first time The specific decision process for receiving two kinds with repetition is as follows: the system will record the source of each message received, connect when in real time The informed source of receipts is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is The source not recorded, the message are to receive type for the first time;
Step 2: it when received message attaches most importance to multiple connection sowing class, needs to believe the IP of the source-information of recorded mistake Breath is extracted to be compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat to receive the flat of message It receives duration and is labeled as T1;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk that will be had already appeared Information type is sent in data processing module, and the processing can be to received type of message and big data acquisition module from module Acquisition type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by word Symbol fragment label is ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be recorded Enter;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out secondary inspection again Rope;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be by for danger message Typing;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
Further, the alert analysis module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X Value Q;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through Top control module sends control instruction to alarm sending module, can be to network operation after alarm sending module receives control instruction The equipment of personnel issues the information for paying attention to maintenance, and information particular content is " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can lead to It crosses top control module and sends control instruction to alarm sending module, after alarm sending module receives control instruction, can be tieed up to network The equipment of shield personnel issues the information checked network, and information particular content is " to ask maintenance personnel in time to network security Carry out Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can be by total It controls module and sends control instruction to alarm sending module, after truncation module and alarm sending module receive control instruction, alarm Sending module connects first can issue urgent while instruct to the equipment of network maintenance staff, and alarm execution module can flash red Light and beep, alarm is sent rear truncation module and can cut off between the computer sounded an alarm and other equipment Connection.
Further, the warning information that the alert analysis module is analyzed can be all sent in logging modle, institute It states logging modle and can be sent the warning information content analyzed in big data acquisition module every preset time and followed Ring utilizes.
Further, the alarm execution module is made of several buzzers and several red colored lamps.
Beneficial effects of the present invention:
(1) present invention passes through the data processing module of setting, and data access module is simply divided the data of access Class, the type that the information that data access module will acquire is divided to is reception for the first time and repetition receives two kinds, and when reception Message attach most importance to multiple connection sowing class when, the IP information of the source-information of recorded mistake can be extracted same with real-time reception The IP of the message in source is compared, and IP is compared by illustrating information security, connects when IP, which is compared, not to be passed through to message Time receiving length is compared, and passes through formula formula T1-T2=| T |, available time difference T judges that computer connects further according to T Whether the message of receipts is safe, so that computer, which is effectively ensured, passes through the received information security of network, and data processing module It can be also compared what is received with the dangerous information type of big data acquisition module acquisition, ratio in several ways is to more The analytical effect of the system is further improved, also ensures the safety of the system;
(2) present invention can calculate collected danger message number in the unit time by the alert analysis module of setting, By formula P-X=Q, the difference Q between line threshold X, alert analysis are touched in available danger vehicle message reference numerals P and alarm Module can issue the warning information of different stage according to the size of Q value, and disconnected use is cut according to the rank of warning information Connection between the computer and external network and other equipment of the system can preferably protect computer from damage, should The design of kind of scheme allows the system to have more functions, so that the system is more suitable popularization and use.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is flow diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of network information security intelligent analysis system, a kind of network information security intelligent analysis system, Including data access module, data processing module, network security monitoring modular, big data acquisition module, firewall, alert analysis Module, logging modle top control module, truncation module, alarm sending module and alarm execution module;
The data access module and data processing module communicate to connect, the big data acquisition module and data processing mould Block communication connection, the network security monitoring modular and data processing module communicate to connect, the data processing module and fire prevention Wall is wirelessly connected, and institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect, The top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, the alarm hair Module and top control module is sent to communicate to connect, the alarm execution module and alarm sending module communicate to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module, The network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data In processing module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and this kind is believed The feature of breath is sent in data processing module, the data processing module receive after various information again can to various information into Row analysis processing, the firewall play certain protective action, and the alert analysis module can be handled in data processing module Corresponding data out is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another grading letter of logging modle Breath can be sent in top control module, and the logging modle can store the warning information graded out every time, the master control Module sends control instruction control alarm sending module according to the Alert Level evaluated and sends alarm, and the alarm sends mould Block can be sent an alarm in alarm execution module, and the alarm execution module is in the alarm for receiving the transmission of alarm sending module Alert content can be executed after information, the truncation module, which can be truncated when the network analysis goes out high-level security risk using this, is The connection of the computer and external network of system;
The data access module can acquire the IP information and transmission time information in information source in access information, described Data processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to is to receive for the first time and repeat to receive two kinds, is received for the first time The specific decision process for receiving two kinds with repetition is as follows: the system will record the source of each message received, connect when in real time The informed source of receipts is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is The source not recorded, the message are to receive type for the first time;
Step 2: it when received message attaches most importance to multiple connection sowing class, needs to believe the IP of the source-information of recorded mistake Breath is extracted to be compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat to receive the flat of message It receives duration and is labeled as T1;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk that will be had already appeared Information type is sent in data processing module, and the processing can be to received type of message and big data acquisition module from module Acquisition type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by word Symbol fragment label is ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be recorded Enter;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out secondary inspection again Rope;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be by for danger message Typing;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
Further, the alert analysis module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X Value Q;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through Top control module sends control instruction to alarm sending module, can be to network operation after alarm sending module receives control instruction The equipment of personnel issues the information for paying attention to maintenance, and information particular content is " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can lead to It crosses top control module and sends control instruction to alarm sending module, after alarm sending module receives control instruction, can be tieed up to network The equipment of shield personnel issues the information checked network, and information particular content is " to ask maintenance personnel in time to network security Carry out Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can be by total It controls module and sends control instruction to alarm sending module, after truncation module and alarm sending module receive control instruction, alarm Sending module connects first can issue urgent while instruct to the equipment of network maintenance staff, and alarm execution module can flash red Light and beep, alarm is sent rear truncation module and can cut off between the computer sounded an alarm and other equipment Connection.
The warning information that the alert analysis module is analyzed can be all sent in logging modle, the logging modle It can send the warning information content analyzed in big data acquisition module and recycle every preset time.
The alarm execution module is made of several buzzers and several red colored lamps.
A kind of network information security intelligent analysis system, at work, data access module are used to access external data, and The data of access are transferred in data processing module, network security monitoring modular also can real-time monitoring access network safe shape Condition, and network safety information is transmitted in data processing module, big data acquisition module can be acquired in network in real time and sent out Existing non-safety information, and send the feature of this kind of information in data processing module, data processing module receives respectively again Various information can be analyzed and processed after category information, the type of the information that data access module will acquire point is for the first time It receives and repeats to receive two kinds, and when received message attaches most importance to multiple connection sowing class, it can be by the source-information of recorded mistake IP information extract and be compared with the IP of the message in the same source of real-time reception, IP is compared by illustrating that information is pacified Entirely, when IP compare not by when the reception duration of message is compared, pass through formula formula T1-T2=| T |, can obtain To time difference T, judge whether the received message of computer is safe, connects so that computer be effectively ensured by network further according to T The information security of receipts, and the dangerous information class with the acquisition of big data acquisition module that data processing module can will also receive Type is compared, and comparison in several ways further improves the analytical effect of the system, also ensures the system Safety, firewall plays certain protective action, and alert analysis module can be in the respective counts that data processing module is handled out According to being assessed and graded, rating information can be divided into two parts of portions and be sent to logging modle another rating information and can be sent Into top control module, logging modle can store the warning information graded out every time, and top control module is according to the police evaluated Report rank sends alarm to send control instruction control alarm sending module, and alarm sending module can send an alarm to alarm and hold In row module, alarm execution module can execute alert content after the warning information for receiving the transmission of alarm sending module, be truncated The connection of the computer and external network using the system can be truncated in module when the network analysis goes out high-level security risk.
The present invention passes through the data processing module being arranged first, and data access module is simply divided the data of access Class, the type that the information that data access module will acquire is divided to is reception for the first time and repetition receives two kinds, and when reception Message attach most importance to multiple connection sowing class when, the IP information of the source-information of recorded mistake can be extracted same with real-time reception The IP of the message in source is compared, and IP is compared by illustrating information security, connects when IP, which is compared, not to be passed through to message Time receiving length is compared, and passes through formula formula T1-T2=| T |, available time difference T judges that computer connects further according to T Whether the message of receipts is safe, so that computer, which is effectively ensured, passes through the received information security of network, and data processing module It can be also compared what is received with the dangerous information type of big data acquisition module acquisition, ratio in several ways is to more The analytical effect of the system is further improved, also ensures the safety of the system;
Secondly the present invention can calculate collected danger message in the unit time by the alert analysis module of setting Number, by formula P-X=Q, the difference Q between line threshold X, alarm point are touched in available danger vehicle message reference numerals P and alarm Analysis module can issue the warning information of different stage according to the size of Q value, and disconnected make is cut according to the rank of warning information With the connection between the computer and external network and other equipment of the system, it can preferably protect computer from damaging, The design of this kind of scheme allows the system to have more functions, so that the system is more suitable popularization and use.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (4)

1. a kind of network information security intelligent analysis system, which is characterized in that including data access module, data processing module, Network security monitoring modular, big data acquisition module, firewall, alert analysis module, logging modle top control module, truncation mould Block, alarm sending module and alarm execution module;
The data access module and data processing module communicate to connect, and the big data acquisition module and data processing module are logical Letter connection, the network security monitoring modular and data processing module communication connection, the data processing module and firewall without Line connection, institute's firewall and alert analysis module communicate to connect, and the logging modle and alert analysis module communicate to connect, described Top control module and alert analysis module communicate to connect, and the truncation module and top control module communicate to connect, and the alarm sends mould On block and top control module communication connection, the alarm execution module and alarm sending module are communicated to connect;
The data access module is used to access external data, and the data of access are transferred in data processing module, described Network security monitoring modular also can real-time monitoring access network safe condition, and network safety information is transmitted to data processing In module, the big data acquisition module can acquire the non-safety information having been found that in network in real time, and by this kind of information Feature is sent in data processing module, and the data processing module can divide various information after receiving various information again Analysis processing, the firewall play certain protective action, and the alert analysis module can be handled out in data processing module Corresponding data is assessed and is graded, and rating information can be divided into two parts of portions and be sent to another rating information meeting of logging modle It is sent in top control module, the logging modle can store the warning information graded out every time, the top control module Control instruction control alarm sending module is sent according to the Alert Level evaluated sends alarm, the alarm sending module meeting It sends an alarm in alarm execution module, the alarm execution module is in the warning information for receiving the transmission of alarm sending module After can execute alert content, the truncation module can be truncated when the network analysis goes out high-level security risk uses the system The connection of computer and external network;
The data access module can acquire the IP information and transmission time information in information source, the data in access information Processing module can be handled the received data of data AM access module, and concrete processing procedure is as follows:
Step 1: the type that the information that will acquire is divided to be for the first time receive with repeat receive two kinds, for the first time receive with again The specific decision process that multiple connection receives two kinds is as follows: the system will record the source of each message received, when real-time reception Informed source is the source of recorded mistake, which is to repeat to receive message, when the informed source of real-time reception is not remember The source recorded, the message are to receive type for the first time;
Step 2: when received message attaches most importance to multiple connection sowing class, the IP information by the source-information of recorded mistake is needed to mention It takes out and is compared with the IP of the message in the same source of real-time reception;
Step 3: when IP comparison does not pass through, i.e., being compared the reception duration of message, will repeat being averaged for message of reception and connect Time receiving, long label was;
Step 4: the message duration that real-time reception is arrived is labeled as T2;
Step 5: pass through formula T1-T2=| T |, available time difference T;
Step 6: when T is greater than preset value, i.e., there are risks for expression information;
Step 7: when T within a preset range, i.e., expression information it is normal;
The big data acquisition module can acquire all risk information types having already appeared, and the risk information that will be had already appeared Type is sent in data processing module, and the processing can acquire received type of message and big data acquisition module from module Type of message is compared, and specific comparison process is as follows:
S1: the message that real-time reception is arrived is labeled as K, the character fragments of interception preset quantity is extracted at random from K, by character sheet Segment mark is denoted as ki, i=1 ... n;
S2: by big data data collecting module collected to message imported into search library;
S3: ki is copied into frame retrieval and is retrieved;
S4: when retrieving discovery character fragments identical with ki more than preset quantity, K is that dangerous information will not be logged;
S5: when retrieving discovery character sheet identical with ki less than preset quantity, i.e., interception ki carries out quadratic search again;
S6: when character sheet identical with ki is greater than preset quantity when quadratic search, it can determine that K will not be recorded for danger message Enter;
S7: when not retrieving character fragments identical with ki when quadratic search, i.e. judgement K is security message.
2. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alert analysis Module is analyzed danger message is received, and concrete analysis process is as follows:
SS1: danger message number collected in the unit time is labeled as P;
SS2: being X by default alarm touching line threshold marker;
SS3: the difference Q by formula P-X=Q, between available danger vehicle message reference numerals P and alarm touching line threshold X;
SS4: when Q is greater than preset value, alert analysis module can analyze III grade of alarm;
SS5: when Q is between preset value, alert analysis module can analyze II grade of alarm;
SS6: when Q is less than preset value, alert analysis module can analyze I grade of alarm;
I grade of alarm, the specific alert content of II grade of alarm and III grade of alarm are as follows:
(1): when I grade of alarm issues, will continue to normal operation using the computer of the system, alert analysis module can pass through master control Module sends control instruction to alarm sending module, can be to network maintenance staff after alarm sending module receives control instruction Equipment issue pay attention to maintenance information, information particular content be " there are risks for XXX computer, please handle in time ";
(2): when II grade of alarm issues, network can not be reconnected using the computer of the system, alert analysis module can be by total It controls module and sends control instruction to alarm sending module, it, can be to network operation people after alarm sending module receives control instruction The equipment of member issues the information checked network, and information particular content is " maintenance personnel to be asked to carry out in time to network security Inspection and maintenance ";
(3): when III grade of alarm issues, can not be reused using the computer of the system, alert analysis module can pass through master control mould Block sends control instruction to alarm sending module, and after truncation module and alarm sending module receive control instruction, alarm is sent Module connects first can issue urgent while instruct to the equipment of network maintenance staff, and the lamp of alarm execution module meeting flash red Light simultaneously beeps, and alarm, which is sent rear truncation module, can cut off company between the computer sounded an alarm and other equipment It connects.
3. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alert analysis The warning information that module is analyzed can be all sent in logging modle, and the logging modle can will divide every preset time The warning information content of precipitation, which is sent in big data acquisition module, to be recycled.
4. a kind of network information security intelligent analysis system according to claim 1, which is characterized in that the alarm executes Module is made of several buzzers and several red colored lamps.
CN201910218074.5A 2019-03-21 2019-03-21 A kind of network information security intelligent analysis system Pending CN109842631A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910218074.5A CN109842631A (en) 2019-03-21 2019-03-21 A kind of network information security intelligent analysis system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910218074.5A CN109842631A (en) 2019-03-21 2019-03-21 A kind of network information security intelligent analysis system

Publications (1)

Publication Number Publication Date
CN109842631A true CN109842631A (en) 2019-06-04

Family

ID=66886045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910218074.5A Pending CN109842631A (en) 2019-03-21 2019-03-21 A kind of network information security intelligent analysis system

Country Status (1)

Country Link
CN (1) CN109842631A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830441A (en) * 2019-09-30 2020-02-21 广西科技大学 Information safety monitoring system based on big data
CN112650317A (en) * 2020-12-18 2021-04-13 合肥阿格德信息科技有限公司 Integrated computer measurement and control system
CN114039747A (en) * 2021-10-21 2022-02-11 烽火通信科技股份有限公司 Method, device, equipment and storage medium for preventing DDOS data retransmission attack

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967537A (en) * 2015-06-30 2015-10-07 北京奇艺世纪科技有限公司 Alarm information pushing method and device
CN107864153A (en) * 2017-12-11 2018-03-30 江苏恒信和安电子科技有限公司 A kind of internet worm method for early warning based on network security sensor
CN108564087A (en) * 2018-04-13 2018-09-21 腾讯科技(深圳)有限公司 Risk Identification Method, device, terminal and the storage medium of small advertisement
CN108833442A (en) * 2018-07-25 2018-11-16 安徽三实信息技术服务有限公司 A kind of distributed network security monitoring device and its method
CN108900466A (en) * 2018-05-30 2018-11-27 北京五八信息技术有限公司 Prevent processing method, device, server and the storage medium of fallacious message
CN109067802A (en) * 2018-10-08 2018-12-21 安徽艾可信网络科技有限公司 A kind of identity authorization system of electric business platform account
US10200506B2 (en) * 2012-10-29 2019-02-05 Tencent Technology (Shenzhen) Company Limited Method, system and device for monitoring data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10200506B2 (en) * 2012-10-29 2019-02-05 Tencent Technology (Shenzhen) Company Limited Method, system and device for monitoring data
CN104967537A (en) * 2015-06-30 2015-10-07 北京奇艺世纪科技有限公司 Alarm information pushing method and device
CN107864153A (en) * 2017-12-11 2018-03-30 江苏恒信和安电子科技有限公司 A kind of internet worm method for early warning based on network security sensor
CN108564087A (en) * 2018-04-13 2018-09-21 腾讯科技(深圳)有限公司 Risk Identification Method, device, terminal and the storage medium of small advertisement
CN108900466A (en) * 2018-05-30 2018-11-27 北京五八信息技术有限公司 Prevent processing method, device, server and the storage medium of fallacious message
CN108833442A (en) * 2018-07-25 2018-11-16 安徽三实信息技术服务有限公司 A kind of distributed network security monitoring device and its method
CN109067802A (en) * 2018-10-08 2018-12-21 安徽艾可信网络科技有限公司 A kind of identity authorization system of electric business platform account

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830441A (en) * 2019-09-30 2020-02-21 广西科技大学 Information safety monitoring system based on big data
CN112650317A (en) * 2020-12-18 2021-04-13 合肥阿格德信息科技有限公司 Integrated computer measurement and control system
CN114039747A (en) * 2021-10-21 2022-02-11 烽火通信科技股份有限公司 Method, device, equipment and storage medium for preventing DDOS data retransmission attack
CN114039747B (en) * 2021-10-21 2023-05-16 烽火通信科技股份有限公司 DDOS data retransmission attack prevention method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109842631A (en) A kind of network information security intelligent analysis system
CN102280011B (en) Boundary safeguard alarm disposing method and system therefor
CN110768846A (en) Intelligent substation network safety protection system
CN103530967A (en) Security alarm system for residential area
CN112437041B (en) Industrial control safety audit system and method based on artificial intelligence
CN207909318U (en) Article leaves intelligent detecting prewarning system in a kind of high risk zone
CN104158677A (en) Safety state analysis alarm module, system and method
CN204927947U (en) A high intelligence protection screen cabinet for transformer substation
CN106506237B (en) A kind of Fault Locating Method and device of substation communication network
CN115879162B (en) Illegal operation alarm blocking system for database monitoring
CN103986236A (en) Ground lead management system
CN103530965B (en) Supermarket remote shelf monitor burglary-resisting system and method for work thereof
CN105739408A (en) Business monitoring method used for power scheduling system and business monitoring system
CN108616723A (en) A kind of video routing inspection system for GIL piping lanes
CN110176121A (en) A kind of method, transmitter, electronic equipment and the medium of fire water monitor fire extinguishing
CN110259515A (en) A kind of coal electric system coal mine signalling arrangement safe and intelligent guard system
CN205876395U (en) Multipurpose underground mine positioning system
CN109510312A (en) A kind of safety utilization of electric power monitoring system
CN213781138U (en) ETC portal equipment anti-theft system based on camera monitoring technology and power amplifier loudspeaker linkage
CN104243917A (en) Video monitoring device alarm protecting and monitoring system and control method thereof
CN208834444U (en) A kind of Along Railway safeguard alarm system based on Fibre Optical Sensor
CN108615326B (en) Method and system for networking monitoring of fire-fighting equipment
CN205647793U (en) Security and protection in bank network system
CN205405769U (en) Safety monitoring device prevents invading
CN111612995A (en) Frontier defense equipment and system for construction site safety supervision

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190604