CN110190998B - Network situation visualization method and system - Google Patents
Network situation visualization method and system Download PDFInfo
- Publication number
- CN110190998B CN110190998B CN201910476505.8A CN201910476505A CN110190998B CN 110190998 B CN110190998 B CN 110190998B CN 201910476505 A CN201910476505 A CN 201910476505A CN 110190998 B CN110190998 B CN 110190998B
- Authority
- CN
- China
- Prior art keywords
- network
- attack
- mobile network
- intermediate equipment
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/75—Indicating network or usage conditions on the user display
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the authentication strategy to the network intermediate device, so that the requirement of a mobile scene is met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that the administrator can be better helped to analyze the attack track and the attack flow animation.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for visualizing a network situation.
Background
In the existing authentication scene, the mobile attribute of the mobile device is not considered, and the network security device sometimes has difficulty in balancing load, that is, a plurality of mobile devices may concentrate near a certain network security device for a period of time, so that the network security device is overloaded, and the authentication access of the mobile device is influenced. And the network side does not dynamically display the attack situation of the mobile equipment with abnormal access. These are areas where improvement is urgently needed by those skilled in the art.
Disclosure of Invention
The invention aims to provide a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to perform authentication operation on the mobile network element in an adjacent area according to an authentication strategy issued by a server, and reports information such as historical authentication data, self load and the like to the server, so that the server can perform dynamic adjustment according to the information, and the requirements of a mobile scene are met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that a manager can better analyze the attack track and the attack flow animation.
In a first aspect, the present application provides a method for visualizing network situations, where the method includes:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of the mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to the server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; and the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the first aspect, in a second possible implementation manner of the first aspect, when the security detection is deployed on the neighboring other network intermediate device, the local network intermediate device obtains a determination result of the neighboring other network intermediate device, and uploads the determination result and a deployment result of the local network intermediate device to the server.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
In a second aspect, the present application provides a system for network situation visualization, the system comprising:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
and the display device is used for displaying the geographical position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on a large screen in real time.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the second aspect, in a second possible implementation manner of the second aspect, when the security detection is deployed on the other neighboring network intermediate devices, the local network intermediate device obtains the determination result of the other neighboring network intermediate devices, and uploads the determination result and the deployment result of the local network intermediate device to the server.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
The invention provides a method and a system for visualizing network situation, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network safety device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the authentication strategy to the network intermediate device, so that the requirement of a mobile scene is met. Meanwhile, the attack track and the attack flow animation of the abnormal mobile network element are displayed on the network situation display in real time, so that the administrator can be better helped to analyze the attack track and the attack flow animation.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a method for visualizing network situation of the present invention;
fig. 2 is an architecture diagram of an embodiment of the system for visualizing network situation of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the scope of the present invention will be more clearly and clearly defined.
Fig. 1 is a flowchart of a method for visualizing a network situation provided in the present application, where the method includes:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; and the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the other network intermediate device in the vicinity, the local network intermediate device obtains the determination result of the other network intermediate device in the vicinity, and uploads the determination result and the deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
Fig. 2 is an architecture diagram of a system for visualizing network situation provided in the present application, the system including:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
and the display device is used for displaying the geographic position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on the large screen in real time.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the other network intermediate device in the vicinity, the local network intermediate device obtains the determination result of the other network intermediate device in the vicinity, and uploads the determination result and the deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
multimedia data, audio data, video data, text data or a combination of several of them.
In specific implementation, the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments of the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments of the present specification may be referred to each other. In particular, for the embodiments, since they are substantially similar to the method embodiments, the description is simple, and the relevant points can be referred to the description in the method embodiments.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention.
Claims (2)
1. A method for network situational visualization, the method comprising:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel where the mobile network element is located, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack flowing picture to a display device, and the display device displays the complete attack track and the attack flowing picture on a large screen;
the safety service resource of the automatic deployment and expansion network element comprises: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: one or a plurality of combinations of multimedia data, audio data, video data and text data.
2. A system for network situational visualization, the system comprising:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server marks the geographical position of the mobile network element refused to authenticate the request on an electronic map and determines the initial position of an attack track; continuously recording and tracking the geographic position of the rejected mobile network element, marking the rejected mobile network element on an electronic map to form an attack complete track when obtaining one geographic position, and converting the attack track into an attack flow animation from an attack source to an attack target by adopting an animation technology; the server transmits the geographic position, the electronic map, the complete attack track and the attack cartoon to a display device;
the display device is used for displaying the geographical position of the rejected mobile network element, the electronic map, the complete attack track and the attack flowing picture on a large screen in real time;
the safety service resource of the automatic deployment and expansion network element comprises: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: one or a plurality of combinations of multimedia data, audio data, video data and text data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910476505.8A CN110190998B (en) | 2019-06-03 | 2019-06-03 | Network situation visualization method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910476505.8A CN110190998B (en) | 2019-06-03 | 2019-06-03 | Network situation visualization method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110190998A CN110190998A (en) | 2019-08-30 |
CN110190998B true CN110190998B (en) | 2022-06-24 |
Family
ID=67719903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910476505.8A Active CN110190998B (en) | 2019-06-03 | 2019-06-03 | Network situation visualization method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110190998B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111726352B (en) * | 2020-06-17 | 2023-05-26 | 杭州安恒信息技术股份有限公司 | Method, device, computer equipment and medium for visualizing monitoring probe state |
CN114567517B (en) * | 2022-01-17 | 2024-05-14 | 深圳绿米联创科技有限公司 | Parameter adjustment method, device and server |
CN114900439A (en) * | 2022-05-06 | 2022-08-12 | 北京中睿天下信息技术有限公司 | Visualization technology of inter-domain access relation |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231693A (en) * | 2010-04-22 | 2011-11-02 | 北京握奇数据系统有限公司 | Method and apparatus for managing access authority |
CN105812592B (en) * | 2014-12-30 | 2019-06-25 | 中国移动通信集团公司 | Voice service access method and device |
US10135957B2 (en) * | 2015-06-15 | 2018-11-20 | Qualcomm Incorporated | Methods and apparatus for communicating high efficiency control information |
CN105207986A (en) * | 2015-07-31 | 2015-12-30 | 北京奇虎科技有限公司 | Method and device for displaying network attack behavior |
CN107426168A (en) * | 2017-05-23 | 2017-12-01 | 国网山东省电力公司电力科学研究院 | A kind of Secure Network Assecc processing method and processing device |
CN108924169A (en) * | 2018-09-17 | 2018-11-30 | 武汉思普崚技术有限公司 | A kind of visual network security system |
CN109067645B (en) * | 2018-09-17 | 2020-12-01 | 武汉思普崚技术有限公司 | Network element equipment connected with NFV virtual security gateway |
-
2019
- 2019-06-03 CN CN201910476505.8A patent/CN110190998B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110190998A (en) | 2019-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110190998B (en) | Network situation visualization method and system | |
US10904119B2 (en) | Generating secure name records | |
US9401086B2 (en) | Automatic update of crowd and traffic data using device monitoring | |
US6505240B1 (en) | Ameliorating bandwidth requirements for the simultaneous provision of multiple sets of content over a network | |
AU2015267296B2 (en) | Method and apparatus for a scoring service for security threat management | |
CN111614657B (en) | Mobile edge security service method and system based on mode selection | |
CN104158891A (en) | Method, device and system of cross-regional data transmission, and server | |
CN105357645A (en) | Group based geographical position information interaction method and device | |
KR100979200B1 (en) | GIS based network information monitoring system | |
CN104702603A (en) | Multi-view-angle security auditing system for mobile internet | |
KR102154053B1 (en) | Apparatus for Intelligent Load Balancing and Driving Method Thereof | |
CN105657711B (en) | A kind of method for connecting network and electronic equipment | |
CN110381047B (en) | Network attack surface tracking method, server and system | |
CN110213269B (en) | Network behavior data authentication method and system | |
US9131167B2 (en) | Broker service system to acquire location based image data | |
CN110138878B (en) | Network security method and system | |
CN103971528B (en) | The implementation method of the intelligent traffic monitoring system interconnected with vehicle to be monitored | |
CN102185892B (en) | Method and system for realizing data transmission and display | |
CN108738053A (en) | The roaming detection method and device of terminal | |
CN110213768A (en) | A kind of network behavior data-reusing authentication method and system | |
CN110113755A (en) | A kind of multi-business multiplexing method and system based on network authentication | |
Lähetkangas et al. | Licensed shared access system possibilities for public safety | |
KR102518555B1 (en) | Method of supporting to discover welfare cases and server using the method | |
Hou et al. | Intersection Management, Cybersecurity, and Local Government: ITS Applications, Critical Issues, and Regulatory Schemes | |
US20240205126A1 (en) | Methods, apparatuses, and systems for network accessibility |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |