CN110190998B - Network situation visualization method and system - Google Patents

Network situation visualization method and system Download PDF

Info

Publication number
CN110190998B
CN110190998B CN201910476505.8A CN201910476505A CN110190998B CN 110190998 B CN110190998 B CN 110190998B CN 201910476505 A CN201910476505 A CN 201910476505A CN 110190998 B CN110190998 B CN 110190998B
Authority
CN
China
Prior art keywords
network
attack
mobile network
intermediate equipment
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910476505.8A
Other languages
Chinese (zh)
Other versions
CN110190998A (en
Inventor
段彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuling Technology Co Ltd
Original Assignee
Wuhan Sipuling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuling Technology Co Ltd filed Critical Wuhan Sipuling Technology Co Ltd
Priority to CN201910476505.8A priority Critical patent/CN110190998B/en
Publication of CN110190998A publication Critical patent/CN110190998A/en
Application granted granted Critical
Publication of CN110190998B publication Critical patent/CN110190998B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the authentication strategy to the network intermediate device, so that the requirement of a mobile scene is met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that the administrator can be better helped to analyze the attack track and the attack flow animation.

Description

Network situation visualization method and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for visualizing a network situation.
Background
In the existing authentication scene, the mobile attribute of the mobile device is not considered, and the network security device sometimes has difficulty in balancing load, that is, a plurality of mobile devices may concentrate near a certain network security device for a period of time, so that the network security device is overloaded, and the authentication access of the mobile device is influenced. And the network side does not dynamically display the attack situation of the mobile equipment with abnormal access. These are areas where improvement is urgently needed by those skilled in the art.
Disclosure of Invention
The invention aims to provide a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to perform authentication operation on the mobile network element in an adjacent area according to an authentication strategy issued by a server, and reports information such as historical authentication data, self load and the like to the server, so that the server can perform dynamic adjustment according to the information, and the requirements of a mobile scene are met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that a manager can better analyze the attack track and the attack flow animation.
In a first aspect, the present application provides a method for visualizing network situations, where the method includes:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of the mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to the server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; and the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the first aspect, in a second possible implementation manner of the first aspect, when the security detection is deployed on the neighboring other network intermediate device, the local network intermediate device obtains a determination result of the neighboring other network intermediate device, and uploads the determination result and a deployment result of the local network intermediate device to the server.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
In a second aspect, the present application provides a system for network situation visualization, the system comprising:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
and the display device is used for displaying the geographical position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on a large screen in real time.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the second aspect, in a second possible implementation manner of the second aspect, when the security detection is deployed on the other neighboring network intermediate devices, the local network intermediate device obtains the determination result of the other neighboring network intermediate devices, and uploads the determination result and the deployment result of the local network intermediate device to the server.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
The invention provides a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the authentication strategy to the network intermediate device, so that the requirement of a mobile scene is met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that the administrator can be better helped to analyze the attack track and the attack flow animation.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a method for visualizing network situation of the present invention;
fig. 2 is an architecture diagram of an embodiment of the system for visualizing network situation of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the scope of the present invention will be more clearly and clearly defined.
Fig. 1 is a flowchart of a method for visualizing a network situation provided in the present application, where the method includes:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; and the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the other network intermediate device in the vicinity, the local network intermediate device obtains the determination result of the other network intermediate device in the vicinity, and uploads the determination result and the deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
Fig. 2 is an architecture diagram of a system for visualizing network situation provided in the present application, the system including:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
and the display device is used for displaying the geographic position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on the large screen in real time.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the other network intermediate device in the vicinity, the local network intermediate device obtains the determination result of the other network intermediate device in the vicinity, and uploads the determination result and the deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
multimedia data, audio data, video data, text data or a combination of several of them.
In specific implementation, the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments of the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments of the present specification may be referred to each other. In particular, for the embodiments, since they are substantially similar to the method embodiments, the description is simple, and the relevant points can be referred to the description in the method embodiments.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention.

Claims (2)

1. A method for network situational visualization, the method comprising:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel where the mobile network element is located, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen;
the safety service resource of the automatic deployment and expansion network element comprises: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: one or a plurality of combinations of multimedia data, audio data, video data and text data.
2. A system for network situational visualization, the system comprising:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
the display device is used for displaying the geographical position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on a large screen in real time;
the safety service resource of the automatic deployment and expansion network element comprises: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: one or a plurality of combinations of multimedia data, audio data, video data and text data.
CN201910476505.8A 2019-06-03 2019-06-03 Network situation visualization method and system Active CN110190998B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910476505.8A CN110190998B (en) 2019-06-03 2019-06-03 Network situation visualization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910476505.8A CN110190998B (en) 2019-06-03 2019-06-03 Network situation visualization method and system

Publications (2)

Publication Number Publication Date
CN110190998A CN110190998A (en) 2019-08-30
CN110190998B true CN110190998B (en) 2022-06-24

Family

ID=67719903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910476505.8A Active CN110190998B (en) 2019-06-03 2019-06-03 Network situation visualization method and system

Country Status (1)

Country Link
CN (1) CN110190998B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726352B (en) * 2020-06-17 2023-05-26 杭州安恒信息技术股份有限公司 Method, device, computer equipment and medium for visualizing monitoring probe state
CN114567517B (en) * 2022-01-17 2024-05-14 深圳绿米联创科技有限公司 Parameter adjustment method, device and server
CN114900439A (en) * 2022-05-06 2022-08-12 北京中睿天下信息技术有限公司 Visualization technology of inter-domain access relation

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231693A (en) * 2010-04-22 2011-11-02 北京握奇数据系统有限公司 Method and apparatus for managing access authority
CN105812592B (en) * 2014-12-30 2019-06-25 中国移动通信集团公司 Voice service access method and device
US10135957B2 (en) * 2015-06-15 2018-11-20 Qualcomm Incorporated Methods and apparatus for communicating high efficiency control information
CN105207986A (en) * 2015-07-31 2015-12-30 北京奇虎科技有限公司 Method and device for displaying network attack behavior
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN108924169A (en) * 2018-09-17 2018-11-30 武汉思普崚技术有限公司 A kind of visual network security system
CN109067645B (en) * 2018-09-17 2020-12-01 武汉思普崚技术有限公司 Network element equipment connected with NFV virtual security gateway

Also Published As

Publication number Publication date
CN110190998A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN110190998B (en) Network situation visualization method and system
US10904119B2 (en) Generating secure name records
US9401086B2 (en) Automatic update of crowd and traffic data using device monitoring
US6505240B1 (en) Ameliorating bandwidth requirements for the simultaneous provision of multiple sets of content over a network
AU2015267296B2 (en) Method and apparatus for a scoring service for security threat management
CN111614657B (en) Mobile edge security service method and system based on mode selection
CN104158891A (en) Method, device and system of cross-regional data transmission, and server
CN105357645A (en) Group based geographical position information interaction method and device
KR100979200B1 (en) GIS based network information monitoring system
CN104702603A (en) Multi-view-angle security auditing system for mobile internet
KR102154053B1 (en) Apparatus for Intelligent Load Balancing and Driving Method Thereof
CN105657711B (en) A kind of method for connecting network and electronic equipment
CN110381047B (en) Network attack surface tracking method, server and system
CN110213269B (en) Network behavior data authentication method and system
US9131167B2 (en) Broker service system to acquire location based image data
CN110138878B (en) Network security method and system
CN103971528B (en) The implementation method of the intelligent traffic monitoring system interconnected with vehicle to be monitored
CN102185892B (en) Method and system for realizing data transmission and display
CN108738053A (en) The roaming detection method and device of terminal
CN110213768A (en) A kind of network behavior data-reusing authentication method and system
CN110113755A (en) A kind of multi-business multiplexing method and system based on network authentication
Lähetkangas et al. Licensed shared access system possibilities for public safety
KR102518555B1 (en) Method of supporting to discover welfare cases and server using the method
Hou et al. Intersection Management, Cybersecurity, and Local Government: ITS Applications, Critical Issues, and Regulatory Schemes
US20240205126A1 (en) Methods, apparatuses, and systems for network accessibility

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant