CN109933983A - A kind of information security of computer network management system - Google Patents
A kind of information security of computer network management system Download PDFInfo
- Publication number
- CN109933983A CN109933983A CN201910063481.3A CN201910063481A CN109933983A CN 109933983 A CN109933983 A CN 109933983A CN 201910063481 A CN201910063481 A CN 201910063481A CN 109933983 A CN109933983 A CN 109933983A
- Authority
- CN
- China
- Prior art keywords
- module
- computer
- data
- monitoring
- controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
The present invention relates to computer information safes; more particularly to a kind of information security of computer network management system; including controller; the network monitoring module for monitoring network data being connected with controller; what is be connected with controller exchanges the data monitoring module of data for monitoring network; the file scan module for being scanned to calculator memory storage file being connected with controller, the monitoring scan module for being monitored to configuration file, protection mechanism being connected with controller;The defect that technical side provided by the invention can effectively overcome protective performance present in the prior art poor.
Description
Technical field
The present invention relates to computer information safes, and in particular to a kind of information security of computer network management system.
Background technique
Computer network is the department of computer science that is connected multiple computers with communication line for the purpose of transmitting information
The set of system, a computer network composition includes transmission medium and communication equipment.In terms of user perspective, computer network is determined
Justice is: it is the network operating system that user manages automatically there is an energy, the resource completing user and being called is called by it, and
Whole network is transparent to user as a big computer system.One more common definition is: utilizing communication line
Computer system being geographically spread out, with standalone feature and communication equipment are connected in different forms, with function
The system of perfect network software and protocol realization resource-sharing and information transmitting.Overall, computer network is exactly
Being distributed in the computers of different geographic regions with special external equipment and being mutually unified into communication line, a scale is big, function is strong
System share the resources such as hardware, software, data information so that numerous computers be made to can be convenient ground transmitting information mutually.
In simple terms, computer network is exactly the aggregate being made of the computer of many utonomous workings of communication line interconnection.
It grows up after Chinese computer network equipment manufacturing reform and opening-up, is deposited in early days with advanced international standard
In huge spread.But it benefits from the continuous improvement of computer network facility industry production technology and downstream demand market is constantly expanded
Greatly, the development of China's computer network facility manufacturing is very rapid.Nearly 2 years, with Chinese national economy it is fast-developing with
And the gradually recession of international financial crisis, computer network facility manufacturing obtain good opportunity to develop, China has become entirely
Ball computer network facility manufacturing gives priority to market.
With the rapid development of computer technology, information network has become the important guarantee of social development.In recent years, it counts
Calculation machine network security problem is increasingly subject to people's concern, and a kind of information security of computer network management system is needed to calculate to ensure
Machine network security prevents criminal's irrational utilization network from stealing information.
Summary of the invention
(1) the technical issues of solving
For disadvantages mentioned above present in the prior art, the present invention provides a kind of information security of computer network management systems
System, the defect that can effectively overcome protective performance present in the prior art poor.
(2) technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs:
A kind of information security of computer network management system, including controller, what is be connected with the controller is used to monitor
The network monitoring module of network data, what is be connected with the controller exchanges the data monitoring module of data for monitoring network,
The file scan module for being scanned to calculator memory storage file being connected with the controller, with the controller phase
The monitoring scan module for being monitored to configuration file, protection mechanism even;
The safe space for separating setting safe space in hard disc of computer being connected with the controller separates mould
Block, what is be connected with the controller is used for the software detection module that antivirus software whether is installed in computer to be detected, with the control
What device processed was connected is used to detect the firewall detection module whether computer opens firewall, is used for what the controller was connected
Pop up the classification pair of classification warning dialog box on a display screen according to software detection module, the testing result of firewall detection module
Talk about module;
The Resource Locator for the data traffic for monitoring computer connection resource finger URL being connected with the controller
Monitoring modular, what is be connected with the controller is used to carry out the monitoring result of Resource Locator monitoring modular and preset flow value
The black and white lists setup module of comparison, what is be connected with the controller is used for according to black and white lists setup module, file scan mould
The testing result of block deletes the data resource removing module of respective resources finger URL and storage file, is connected with the controller
Data resource backup module for being backed up to computer data resource.
Preferably, the network monitoring module includes data packet monitoring modular, data fractionation module and data scan module.
Preferably, the data monitoring module includes uploading data monitoring module and downloading data monitoring modular, the number
It further include flow rate calculation monitoring module according to monitoring modular.
Preferably, the monitoring scan module includes NESS detection module, strobe detection module, SATAN detection module
With ISS detection module.
Preferably, the software detection module, which detects, is fitted without antivirus software in computer, then is classified session module
It pops up level-one and warns dialog box;The firewall detection module detects that computer is not turned on firewall, then is classified dialogue mould
Block pops up second level and warns dialog box;The software detection module, which detects, is fitted without antivirus software in computer, prevent fires simultaneously
Wall detection module detects that computer is not turned on firewall, then is classified session module pop-up three-level warning dialog box;Otherwise, institute
It states classification session module and does not pop up dialog box.
Preferably, the safe space is the concealed space on hard disk, which can not be modifiable by the user and can not
See, the software detection module, firewall detection module, classification session module are run in safe space.
Preferably, when the computer has two or more independent hard disks, the computer pops up dialog box
Inquiry user selects one of hard disk as safe space.
Preferably, the black and white lists setup module detects that the data traffic of Resource Locator is greater than preset flow value
When, which is put into blacklist by the black and white lists setup module, be put into Resource Locator in blacklist without
Method and computer establish connection.
Preferably, the data resource removing module deletes the Resource orientation that black and white lists setup module is put into blacklist
Symbol and file scan module are scanned containing virulent storage file.
Preferably, the black and white lists setup module is sourced to containing virulent storage file, and the storage is literary
The corresponding Resource Locator of part is put into blacklist.
(3) beneficial effect
Compared with prior art, a kind of information security of computer network management system provided by the present invention has with following
Beneficial effect:
(1) safe space separating modules separate setting safe space, software detection module detection meter in hard disc of computer
Whether antivirus software is installed, whether firewall detection module detection computer opens firewall, be classified session module root in calculation machine
Pop up classification warning dialog box on a display screen according to software detection module, the testing result of firewall detection module, so as to
User installation antivirus software is effectively reminded, while opening firewall;
(2) network monitoring module monitoring network data, data monitoring module monitors network exchange data, file scan module
Calculator memory storage file is scanned, monitoring scan module is monitored configuration file, protection mechanism, Resource Locator
Resource Locator is monitored mould by the data traffic of monitoring module monitors computer connection resource finger URL, black and white lists setup module
The monitoring result of block is compared with preset flow value, and data resource removing module is swept according to black and white lists setup module, file
The testing result for retouching module deletes respective resources finger URL and storage file, comprehensive monitoring can be carried out to computer, while fast
Speed effectively removes the data resource with menace.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described.It should be evident that the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is present system structural schematic diagram;
Fig. 2 is network monitoring module structural schematic diagram in Fig. 1 of the present invention;
Fig. 3 is data monitoring modular structure schematic diagram in Fig. 1 of the present invention;
Fig. 4 is that scan module structural schematic diagram is monitored in Fig. 1 of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
A kind of information security of computer network management system, as shown in Figures 1 to 4, including controller, it is connected with controller
The network monitoring module for monitoring network data, what is be connected with controller exchanges the data monitorings of data for monitoring network
Module, the file scan module for being scanned to calculator memory storage file being connected with controller, is connected with controller
The monitoring scan module for being monitored to configuration file, protection mechanism;
The safe space separating modules for the separation setting safe space in hard disc of computer being connected with controller, with
What controller was connected is used for the software detection module that antivirus software whether is installed in computer to be detected, and what is be connected with controller is used for
Whether detection computer opens the firewall detection module of firewall, be connected with controller be used for according to software detection module,
The testing result of firewall detection module pops up the classification session module of classification warning dialog box on a display screen;
The Resource Locator for the data traffic for monitoring computer connection resource finger URL being connected with controller monitors
Module, what is be connected with controller is black for the monitoring result of Resource Locator monitoring modular to be compared with preset flow value
White list setup module, what is be connected with controller is used for according to black and white lists setup module, the testing result of file scan module
The data resource removing module for deleting respective resources finger URL and storage file, what is be connected with controller is used for computer data
The data resource backup module that resource is backed up.
Network monitoring module includes data packet monitoring modular, data fractionation module and data scan module.
Data monitoring module includes upload data monitoring module and downloading data monitoring modular, data monitoring module further include
Flow rate calculation monitoring module.
Monitoring scan module includes NESS detection module, strobe detection module, SATAN detection module and ISS detection mould
Block.
Software detection module, which detects, is fitted without antivirus software in computer, then is classified session module pop-up level-one warning
Dialog box;Firewall detection module detects that computer is not turned on firewall, then is classified session module pop-up second level warning pair
Talk about frame;Software detection module, which detects, is fitted without antivirus software in computer, while firewall detection module detects calculating
Machine is not turned on firewall, then is classified session module pop-up three-level warning dialog box;Otherwise, classification session module does not pop up dialogue
Frame.
Safe space is the concealed space on hard disk, which can not be modifiable by the user and invisible, software detection
Module, firewall detection module, classification session module are run in safe space.
When computer has two or more independent hard disks, computer pops up dialog box inquiry user selection wherein
One hard disk is as safe space.
When black and white lists setup module detects that the data traffic of Resource Locator is greater than preset flow value, black and white lists are set
It sets module the Resource Locator is put into blacklist, the Resource Locator being put into blacklist can not be established with computer to be connected
It connects.
Data resource removing module deletion black and white lists setup module is put into the Resource Locator of blacklist and file is swept
It retouches module scans and goes out to contain virulent storage file.
Black and white lists setup module is to sourcing containing virulent storage file, and by the corresponding resource of the storage file
Finger URL is put into blacklist.
Safe space separating modules separate setting safe space in hard disc of computer, and software detection module detects computer
In whether antivirus software be installed, whether firewall detection module detection computer opens firewall, is classified session module according to soft
Part detection module, firewall detection module testing result pop up on a display screen classification warning dialog box.
Network monitoring module includes data packet monitoring modular, data fractionation module and data scan module.Data monitoring mould
Block includes upload data monitoring module and downloading data monitoring modular, data monitoring module further include flow rate calculation monitoring module.
Monitoring scan module includes NESS detection module, strobe detection module, SATAN detection module and ISS detection module.
Software detection module, which detects, is fitted without antivirus software in computer, then is classified session module pop-up level-one warning
Dialog box;Firewall detection module detects that computer is not turned on firewall, then is classified session module pop-up second level warning pair
Talk about frame;Software detection module, which detects, is fitted without antivirus software in computer, while firewall detection module detects calculating
Machine is not turned on firewall, then is classified session module pop-up three-level warning dialog box;Otherwise, classification session module does not pop up dialogue
Frame.
Network monitoring module monitoring network data, data monitoring module monitors network exchange data, file scan module pair
Calculator memory storage file is scanned, and monitoring scan module is monitored configuration file, protection mechanism, Resource Locator prison
The data traffic of module monitors computer connection resource finger URL is surveyed, black and white lists setup module is by Resource Locator monitoring modular
Monitoring result be compared with preset flow value, data resource removing module is according to black and white lists setup module, file scan
The testing result of module deletes respective resources finger URL and storage file.
Safe space is the concealed space on hard disk, which can not be modifiable by the user and invisible, software detection
Module, firewall detection module, classification session module are run in safe space.Computer has two or more
When independent hard disk, computer pop-up dialog box inquiry user selects one of hard disk as safe space.
When black and white lists setup module detects that the data traffic of Resource Locator is greater than preset flow value, black and white lists are set
It sets module the Resource Locator is put into blacklist, the Resource Locator being put into blacklist can not be established with computer to be connected
It connects.
Data resource removing module deletion black and white lists setup module is put into the Resource Locator of blacklist and file is swept
It retouches module scans and goes out to contain virulent storage file.Black and white lists setup module is sourced to containing virulent storage file,
And the corresponding Resource Locator of the storage file is put into blacklist.
A kind of information security of computer network management system provided by the present invention has the advantages that
(1) safe space separating modules separate setting safe space, software detection module detection meter in hard disc of computer
Whether antivirus software is installed, whether firewall detection module detection computer opens firewall, be classified session module root in calculation machine
Pop up classification warning dialog box on a display screen according to software detection module, the testing result of firewall detection module, so as to
User installation antivirus software is effectively reminded, while opening firewall;
(2) network monitoring module monitoring network data, data monitoring module monitors network exchange data, file scan module
Calculator memory storage file is scanned, monitoring scan module is monitored configuration file, protection mechanism, Resource Locator
Resource Locator is monitored mould by the data traffic of monitoring module monitors computer connection resource finger URL, black and white lists setup module
The monitoring result of block is compared with preset flow value, and data resource removing module is swept according to black and white lists setup module, file
The testing result for retouching module deletes respective resources finger URL and storage file, comprehensive monitoring can be carried out to computer, while fast
Speed effectively removes the data resource with menace.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, can't be such that the essence of corresponding technical solution departs from the spirit and scope of the technical scheme of various embodiments of the present invention.
Claims (10)
1. a kind of information security of computer network management system, it is characterised in that: including controller, be connected with the controller
For the network monitoring module of monitoring network data, the data for exchanging data for monitoring network being connected with the controller are supervised
Survey module, be connected with the controller for storing up the file scan module that is scanned of file to calculator memory, and it is described
The connected monitoring scan module for being monitored to configuration file, protection mechanism of controller;
The safe space separating modules for the separation setting safe space in hard disc of computer being connected with the controller, with
What the controller was connected is used for the software detection module that antivirus software whether is installed in computer to be detected, with the controller phase
What is connected is used to detect the firewall detection module whether computer opens firewall, and what is be connected with the controller is used for according to soft
Part detection module, firewall detection module testing result pop up on a display screen classification warning dialog box classification dialogue mould
Block;
The Resource Locator for the data traffic for monitoring computer connection resource finger URL being connected with the controller monitors
Module, what is be connected with the controller is used to for the monitoring result of Resource Locator monitoring modular being compared with preset flow value
Black and white lists setup module, be connected with the controller for according to black and white lists setup module, file scan module
Testing result deletes the data resource removing module of respective resources finger URL and storage file, is used for what the controller was connected
The data resource backup module that computer data resource is backed up.
2. information security of computer network management system according to claim 1, it is characterised in that: the network monitor mould
Block includes data packet monitoring modular, data fractionation module and data scan module.
3. information security of computer network management system according to claim 1, it is characterised in that: the data monitoring mould
Block includes uploading data monitoring module and downloading data monitoring modular, and the data monitoring module further includes flow rate calculation monitoring mould
Block.
4. information security of computer network management system according to claim 1, it is characterised in that: the monitoring scans mould
Block includes NESS detection module, strobe detection module, SATAN detection module and ISS detection module.
5. information security of computer network management system according to claim 1, it is characterised in that: the software detection mould
Block, which detects, is fitted without antivirus software in computer, then is classified session module pop-up level-one warning dialog box;The firewall
Detection module detects that computer is not turned on firewall, then is classified session module pop-up second level warning dialog box;The software
Detection module, which detects, is fitted without antivirus software in computer, while firewall detection module detects that computer is not turned on
Firewall is then classified session module pop-up three-level warning dialog box;Otherwise, the classification session module does not pop up dialog box.
6. information security of computer network management system according to claim 1, it is characterised in that: the safe space is
Concealed space on hard disk, which can not be modifiable by the user and invisible, the software detection module, firewall detection
Module, classification session module are run in safe space.
7. information security of computer network management system according to claim 1, it is characterised in that: the computer has
When two or more independent hard disks, the computer pop-up dialog box inquiry user selects one of hard disk as peace
The total space.
8. information security of computer network management system according to claim 1, it is characterised in that: the black and white lists are set
When setting module and detecting that the data traffic of Resource Locator is greater than preset flow value, the black and white lists setup module is by the resource
Finger URL is put into blacklist, and the Resource Locator being put into blacklist can not establish connection with computer.
9. information security of computer network management system according to claim 1, it is characterised in that: the data resource is deleted
Except module is deleted, black and white lists setup module is put into the Resource Locator of blacklist and file scan module is scanned containing ill
The storage file of poison.
10. information security of computer network management system according to claim 9, it is characterised in that: the black and white lists
Setup module is sourced to containing virulent storage file, and the corresponding Resource Locator of the storage file is put into blacklist
In.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910063481.3A CN109933983A (en) | 2019-01-23 | 2019-01-23 | A kind of information security of computer network management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910063481.3A CN109933983A (en) | 2019-01-23 | 2019-01-23 | A kind of information security of computer network management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109933983A true CN109933983A (en) | 2019-06-25 |
Family
ID=66985167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910063481.3A Pending CN109933983A (en) | 2019-01-23 | 2019-01-23 | A kind of information security of computer network management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109933983A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107347079A (en) * | 2017-09-05 | 2017-11-14 | 合肥丹朋科技有限公司 | Computer network means of defence |
CN108377242A (en) * | 2018-02-24 | 2018-08-07 | 河南工程学院 | A kind of computer network security detection method |
CN108881260A (en) * | 2018-07-01 | 2018-11-23 | 安徽合软信息技术有限公司 | A kind of novel computer network protection method |
CN109067731A (en) * | 2018-07-26 | 2018-12-21 | 合肥瑞智电力电子有限公司 | A kind of computer network security monitoring device |
-
2019
- 2019-01-23 CN CN201910063481.3A patent/CN109933983A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107347079A (en) * | 2017-09-05 | 2017-11-14 | 合肥丹朋科技有限公司 | Computer network means of defence |
CN108377242A (en) * | 2018-02-24 | 2018-08-07 | 河南工程学院 | A kind of computer network security detection method |
CN108881260A (en) * | 2018-07-01 | 2018-11-23 | 安徽合软信息技术有限公司 | A kind of novel computer network protection method |
CN109067731A (en) * | 2018-07-26 | 2018-12-21 | 合肥瑞智电力电子有限公司 | A kind of computer network security monitoring device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111935170B (en) | Network abnormal flow detection method, device and equipment | |
AU2016242813B2 (en) | Networking flow logs for multi-tenant environments | |
WO2023216641A1 (en) | Security protection method and system for power terminal | |
US9794287B1 (en) | Implementing cloud based malware container protection | |
Zhe et al. | DoS attack detection model of smart grid based on machine learning method | |
US11153338B2 (en) | Preventing network attacks | |
US10657971B1 (en) | Systems and methods for detecting suspicious voice calls | |
CN107547273B (en) | Method and system for guaranteeing high availability of virtual instance of power system | |
CN105471875A (en) | Computer network monitoring system | |
CN106130806B (en) | Data layer real-time monitoring method | |
CN206164589U (en) | Computer network safety monitoring device | |
US11074652B2 (en) | System and method for model-based prediction using a distributed computational graph workflow | |
US9843934B1 (en) | Systems and methods for detecting public networks | |
CN109254922A (en) | A kind of automated testing method and device of server B MC Redfish function | |
US10187250B2 (en) | System and method for capacity planning on a high speed data network | |
WO2022031462A1 (en) | Systems and methods for application placement in a network based on host security posture | |
CN113965341A (en) | Intrusion detection system based on software defined network | |
CN2932873Y (en) | Digital monitoring and control system | |
JP2022512195A (en) | Systems and methods for behavioral threat detection | |
CN116527362A (en) | Data protection method based on LayerCFL intrusion detection | |
CN102857798A (en) | Monitoring system of system software operation condition based on set-top box | |
CN109067731A (en) | A kind of computer network security monitoring device | |
CN110061854A (en) | A kind of non-boundary network intelligence operation management method and system | |
CN108366077B (en) | Crack type anti-attack network access system | |
CN202841168U (en) | Network resource monitoring system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190625 |
|
RJ01 | Rejection of invention patent application after publication |