CN110324348A - A kind of information security of computer network monitoring system - Google Patents
A kind of information security of computer network monitoring system Download PDFInfo
- Publication number
- CN110324348A CN110324348A CN201910609844.9A CN201910609844A CN110324348A CN 110324348 A CN110324348 A CN 110324348A CN 201910609844 A CN201910609844 A CN 201910609844A CN 110324348 A CN110324348 A CN 110324348A
- Authority
- CN
- China
- Prior art keywords
- network
- module
- computer
- monitoring
- monitoring modular
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/143—Termination or inactivation of sessions, e.g. event-controlled end of session
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of information security of computer network to monitor system, including main control module, it is connected to the network monitoring modular, local computer screen operator monitoring modular, strange computer monitoring modular, intrusion detection module, automatically cut off network module, it is detached from monitoring server range reminding module, alarm module and network firewall, the main control module respectively with network connection monitoring modular, local computer screen operator monitoring modular, strange computer monitoring modular, intrusion detection module, automatically cut off network module, it is detached from monitoring server range reminding module, alarm module, network firewall connection.Information security of computer network of the invention monitors system, and design rationally, improves the safety and confidentiality of data;Can be according to monitoring result by automatically cutting off network module, once discovery has illegal invasion, then cutting network connection immediately, ensures the safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.
Description
Technical field
The invention belongs to field of computer technology, are related to a kind of information security of computer network monitoring system.
Background technique
Now with the rapid development of information technology, application of the computer networking technology in life is very extensive, respectively
Large enterprises are also all step by step being managed enterprise using computer technology.Although something which increases enterprises
The efficiency of management, the management cost of enterprise has been saved, but some problems also occur with it, than if any many illegal
Molecule utilizes computer networking technology transmitted virus on network, has seriously threatened the safety and stability of network, or intrusion enterprise
The management system of industry steals internal business information, brings huge loss to enterprise.Existing information can not be solved to net safely
The problem of network data signature, not can guarantee the safety of data transmission in signature process;If existing information access encounters non-
When method is invaded, it not can be carried out and automatically cut off network, information has had leaked when user discovers.
Computer information technology incorporates the every aspect of Chinese work, life, computer virus, hacker attacks already
Etc. network information securitys event the also therefore extensive attention by Chinese that takes place frequently, in order to reduce computer network peace
The occurrence probability of total event is badly in need of a kind of information security of computer network monitoring system in the prior art.
Summary of the invention
The purpose of the present invention is to provide a kind of information security of computer network to monitor system.
Itself the specific technical proposal is:
A kind of information security of computer network monitoring system, including front end processor, multimedia server, video/audio host, phone
Remote alarm interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring server, Web service
Device, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen operator monitor mould
Block, intrusion detection module, automatically cuts off network module, is detached from monitoring server range prompting mould strange computer monitoring modular
Block, alarm module and network firewall, the main control module respectively with network connection monitoring modular, local computer screen operator
Monitoring modular, intrusion detection module, automatically cuts off network module, is detached from monitoring server range strange computer monitoring modular
Reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal
Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting
The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered
The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed
Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction,
Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network
The case where safety monitoring, monitors the information automatically and issues alarm at once.
Further, the intrusion detection module includes data source acquisition submodule, data and processing submodule, feature extraction
Submodule, neural metwork training submodule and neural network detection sub-module, system respond submodule.
Further, the screen of user's local computer in the net and operation include all on subscriber computer screen
The operating process of behavior and user's keyboard, mouse.
It further, further include data encryption module.
Further, further include security information statistical analysis module, for intercepting bottom-layer network data, analyze network flow feelings
Condition simultaneously exports Statistical Analysis Report.
It further, further include user management module, for being managed to system user information and system host information.
The utility model has the advantages that
Information security of computer network of the invention monitors system, and design rationally, improves the safety and confidentiality of data;It is logical
Cross automatically cut off network module can according to monitoring result, once discovery have illegal invasion, then immediately cutting network connection, ensure
The safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.
Detailed description of the invention
Fig. 1 is the schematic diagram of information security of computer network monitoring system of the present invention;
Fig. 2 is the schematic diagram of intrusion detection module.
Specific embodiment
Technical solution of the present invention is described in more detail combined with specific embodiments below.
Referring to Fig.1, a kind of information security of computer network monitoring system, including front end processor, multimedia server, video/
Audio host, telephone call interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring clothes
Business device, Web server, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen
Curtain operation monitoring modular, intrusion detection module, automatically cuts off network module, is detached from server prison strange computer monitoring modular
Range reminding module, alarm module and network firewall are surveyed, the main control module is counted with network connection monitoring modular, locally respectively
Calculation machine screen operator monitoring modular, intrusion detection module, automatically cuts off network module, is detached from clothes strange computer monitoring modular
Business device monitoring range reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal
Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting
The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered
The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed
Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction,
Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network
The case where safety monitoring, monitors the information automatically and issues alarm at once.
As shown in Fig. 2, the intrusion detection module includes data source acquisition submodule, data and processing submodule, feature
Extracting sub-module, neural metwork training submodule and neural network detection sub-module, system respond submodule.
The screen of user's local computer in the net and operation include all behaviors on subscriber computer screen and
The operating process of user's keyboard, mouse.
It further include data encryption module.
It further include security information statistical analysis module, for intercepting bottom-layer network data, analysis network traffic conditions are simultaneously defeated
Statistical Analysis Report out.
It further include user management module, for being managed to system user information and system host information.
Information security of computer network monitoring system of the invention in the specific application process, improves the safety of data
And confidentiality;Net once discovery has illegal invasion, then can be cut off according to monitoring result immediately by automatically cutting off network module
Network connection, ensures the safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.
The foregoing is only a preferred embodiment of the present invention, the scope of protection of the present invention is not limited to this, it is any ripe
Know those skilled in the art within the technical scope of the present disclosure, the letter for the technical solution that can be become apparent to
Altered or equivalence replacement are fallen within the protection scope of the present invention.
Claims (6)
1. a kind of information security of computer network monitors system, which is characterized in that including front end processor, multimedia server, video/
Audio host, telephone call interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring clothes
Business device, Web server, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen
Curtain operation monitoring modular, intrusion detection module, automatically cuts off network module, is detached from server prison strange computer monitoring modular
Range reminding module, alarm module and network firewall are surveyed, the main control module is counted with network connection monitoring modular, locally respectively
Calculation machine screen operator monitoring modular, intrusion detection module, automatically cuts off network module, is detached from clothes strange computer monitoring modular
Business device monitoring range reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal
Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting
The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered
The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed
Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction,
Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network
The case where safety monitoring, monitors the information automatically and issues alarm at once.
2. information security of computer network according to claim 1 monitors system, which is characterized in that the intrusion detection mould
Block includes data source acquisition submodule, data and processing submodule, feature extraction submodule, neural metwork training submodule and mind
Submodule is responded through network detection sub-module, system.
3. information security of computer network according to claim 1 monitors system, which is characterized in that the user in the net
The screen of local computer and operation include the operation of all behaviors and user's keyboard, mouse on subscriber computer screen
Journey.
4. information security of computer network according to claim 1 monitors system, which is characterized in that further include data encryption
Module.
5. information security of computer network according to claim 1 monitors system, which is characterized in that further include security information
Statistical analysis module, for intercepting bottom-layer network data, analyzing network traffic conditions and exporting Statistical Analysis Report.
6. information security of computer network according to claim 1 monitors system, which is characterized in that further include user management
Module, for being managed to system user information and system host information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910609844.9A CN110324348A (en) | 2019-07-08 | 2019-07-08 | A kind of information security of computer network monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910609844.9A CN110324348A (en) | 2019-07-08 | 2019-07-08 | A kind of information security of computer network monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110324348A true CN110324348A (en) | 2019-10-11 |
Family
ID=68123086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910609844.9A Pending CN110324348A (en) | 2019-07-08 | 2019-07-08 | A kind of information security of computer network monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110324348A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110888062A (en) * | 2019-12-24 | 2020-03-17 | 深圳供电局有限公司 | Network security management system and method of storage battery online monitoring device |
CN110990900A (en) * | 2019-12-24 | 2020-04-10 | 南通理工学院 | Computer network intelligent monitoring system |
CN111506852A (en) * | 2020-04-20 | 2020-08-07 | 承德石油高等专科学校 | Intelligent web page data monitoring device and method |
CN111756766A (en) * | 2020-07-01 | 2020-10-09 | 天津理工大学 | Network information safety protection system |
CN112887288A (en) * | 2021-01-19 | 2021-06-01 | 青岛简屿传媒有限公司 | Internet-based E-commerce platform intrusion detection front-end computer scanning system |
CN113518003A (en) * | 2021-05-31 | 2021-10-19 | 广州市侏罗纪科技有限公司 | Computer network operation management system |
CN115242455A (en) * | 2022-06-27 | 2022-10-25 | 山西西电信息技术研究院有限公司 | Social network instant message safety monitoring system and method based on cloud computing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441365A (en) * | 2002-02-28 | 2003-09-10 | 北京中电网安科技有限公司 | Safeguard system and method for large and medium-sized inner network |
CN205644559U (en) * | 2016-05-10 | 2016-10-12 | 赵宏 | Computer network safety control |
CN106778364A (en) * | 2016-11-22 | 2017-05-31 | 陈曦 | A kind of network security controller of computer |
CN107040517A (en) * | 2017-02-22 | 2017-08-11 | 南京邮电大学 | A kind of cognitive intrusion detection method towards cloud computing environment |
CN108234525A (en) * | 2018-03-30 | 2018-06-29 | 阜阳职业技术学院 | A kind of information leakage preventing theft protection management system in computer network security |
-
2019
- 2019-07-08 CN CN201910609844.9A patent/CN110324348A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1441365A (en) * | 2002-02-28 | 2003-09-10 | 北京中电网安科技有限公司 | Safeguard system and method for large and medium-sized inner network |
CN205644559U (en) * | 2016-05-10 | 2016-10-12 | 赵宏 | Computer network safety control |
CN106778364A (en) * | 2016-11-22 | 2017-05-31 | 陈曦 | A kind of network security controller of computer |
CN107040517A (en) * | 2017-02-22 | 2017-08-11 | 南京邮电大学 | A kind of cognitive intrusion detection method towards cloud computing environment |
CN108234525A (en) * | 2018-03-30 | 2018-06-29 | 阜阳职业技术学院 | A kind of information leakage preventing theft protection management system in computer network security |
Non-Patent Citations (2)
Title |
---|
刘群峰: "网络安全监控系统的设计与实现", 《科技资讯》 * |
祁宏伟: "计算机网络安全中入侵检测系统的设计", 《电子技术与软件工程》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110888062A (en) * | 2019-12-24 | 2020-03-17 | 深圳供电局有限公司 | Network security management system and method of storage battery online monitoring device |
CN110990900A (en) * | 2019-12-24 | 2020-04-10 | 南通理工学院 | Computer network intelligent monitoring system |
CN111506852A (en) * | 2020-04-20 | 2020-08-07 | 承德石油高等专科学校 | Intelligent web page data monitoring device and method |
CN111756766A (en) * | 2020-07-01 | 2020-10-09 | 天津理工大学 | Network information safety protection system |
CN112887288A (en) * | 2021-01-19 | 2021-06-01 | 青岛简屿传媒有限公司 | Internet-based E-commerce platform intrusion detection front-end computer scanning system |
CN112887288B (en) * | 2021-01-19 | 2022-09-13 | 重庆葵海数字科技有限公司 | Internet-based E-commerce platform intrusion detection front-end computer scanning system |
CN113518003A (en) * | 2021-05-31 | 2021-10-19 | 广州市侏罗纪科技有限公司 | Computer network operation management system |
CN115242455A (en) * | 2022-06-27 | 2022-10-25 | 山西西电信息技术研究院有限公司 | Social network instant message safety monitoring system and method based on cloud computing |
CN115242455B (en) * | 2022-06-27 | 2023-08-18 | 山西西电信息技术研究院有限公司 | Social network instant information safety monitoring system and method based on cloud computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324348A (en) | A kind of information security of computer network monitoring system | |
CN111404909B (en) | Safety detection system and method based on log analysis | |
CN108833185B (en) | Network attack route restoration method and system | |
US9961047B2 (en) | Network security management | |
CN103905459A (en) | Cloud-based intelligent security defense system and defense method | |
KR101692982B1 (en) | Automatic access control system of detecting threat using log analysis and automatic feature learning | |
Goldstein et al. | Enhancing Security Event Management Systems with Unsupervised Anomaly Detection. | |
CN113282474A (en) | User behavior monitoring method, system, equipment and medium based on bastion machine | |
CN110716973A (en) | Big data based security event reporting platform and method | |
KR100846835B1 (en) | Method and apparatus for Security Event Correlation Analysis based on Context Language | |
CN112667875A (en) | Data acquisition method, data analysis method, data acquisition device, data analysis device, equipment and storage medium | |
CN116074075A (en) | Security event association behavior analysis method, system and equipment based on association rule | |
CN110149303B (en) | Party-school network security early warning method and early warning system | |
Skendžić et al. | Management and monitoring security events in a business organization-siem system | |
CN114338171A (en) | Black product attack detection method and device | |
CN113132370A (en) | Universal integrated safety pipe center system | |
Ebrahimi et al. | Automatic attack scenario discovering based on a new alert correlation method | |
CN105739408A (en) | Business monitoring method used for power scheduling system and business monitoring system | |
CN110912753B (en) | Cloud security event real-time detection system and method based on machine learning | |
CN111049853A (en) | Security authentication system based on computer network | |
CN112887288B (en) | Internet-based E-commerce platform intrusion detection front-end computer scanning system | |
CN112839029B (en) | Botnet activity degree analysis method and system | |
CN113360907A (en) | Hacker intrusion prevention method based on IDES and NIDES | |
CN113381881A (en) | Method and device for monitoring alarm processing of host | |
Kawakani et al. | Discovering attackers past behavior to generate online hyper-alerts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |
|
RJ01 | Rejection of invention patent application after publication |