CN110324348A - A kind of information security of computer network monitoring system - Google Patents

A kind of information security of computer network monitoring system Download PDF

Info

Publication number
CN110324348A
CN110324348A CN201910609844.9A CN201910609844A CN110324348A CN 110324348 A CN110324348 A CN 110324348A CN 201910609844 A CN201910609844 A CN 201910609844A CN 110324348 A CN110324348 A CN 110324348A
Authority
CN
China
Prior art keywords
network
module
computer
monitoring
monitoring modular
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910609844.9A
Other languages
Chinese (zh)
Inventor
陈浩
王琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910609844.9A priority Critical patent/CN110324348A/en
Publication of CN110324348A publication Critical patent/CN110324348A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of information security of computer network to monitor system, including main control module, it is connected to the network monitoring modular, local computer screen operator monitoring modular, strange computer monitoring modular, intrusion detection module, automatically cut off network module, it is detached from monitoring server range reminding module, alarm module and network firewall, the main control module respectively with network connection monitoring modular, local computer screen operator monitoring modular, strange computer monitoring modular, intrusion detection module, automatically cut off network module, it is detached from monitoring server range reminding module, alarm module, network firewall connection.Information security of computer network of the invention monitors system, and design rationally, improves the safety and confidentiality of data;Can be according to monitoring result by automatically cutting off network module, once discovery has illegal invasion, then cutting network connection immediately, ensures the safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.

Description

A kind of information security of computer network monitoring system
Technical field
The invention belongs to field of computer technology, are related to a kind of information security of computer network monitoring system.
Background technique
Now with the rapid development of information technology, application of the computer networking technology in life is very extensive, respectively Large enterprises are also all step by step being managed enterprise using computer technology.Although something which increases enterprises The efficiency of management, the management cost of enterprise has been saved, but some problems also occur with it, than if any many illegal Molecule utilizes computer networking technology transmitted virus on network, has seriously threatened the safety and stability of network, or intrusion enterprise The management system of industry steals internal business information, brings huge loss to enterprise.Existing information can not be solved to net safely The problem of network data signature, not can guarantee the safety of data transmission in signature process;If existing information access encounters non- When method is invaded, it not can be carried out and automatically cut off network, information has had leaked when user discovers.
Computer information technology incorporates the every aspect of Chinese work, life, computer virus, hacker attacks already Etc. network information securitys event the also therefore extensive attention by Chinese that takes place frequently, in order to reduce computer network peace The occurrence probability of total event is badly in need of a kind of information security of computer network monitoring system in the prior art.
Summary of the invention
The purpose of the present invention is to provide a kind of information security of computer network to monitor system.
Itself the specific technical proposal is:
A kind of information security of computer network monitoring system, including front end processor, multimedia server, video/audio host, phone Remote alarm interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring server, Web service Device, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen operator monitor mould Block, intrusion detection module, automatically cuts off network module, is detached from monitoring server range prompting mould strange computer monitoring modular Block, alarm module and network firewall, the main control module respectively with network connection monitoring modular, local computer screen operator Monitoring modular, intrusion detection module, automatically cuts off network module, is detached from monitoring server range strange computer monitoring modular Reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction, Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network The case where safety monitoring, monitors the information automatically and issues alarm at once.
Further, the intrusion detection module includes data source acquisition submodule, data and processing submodule, feature extraction Submodule, neural metwork training submodule and neural network detection sub-module, system respond submodule.
Further, the screen of user's local computer in the net and operation include all on subscriber computer screen The operating process of behavior and user's keyboard, mouse.
It further, further include data encryption module.
Further, further include security information statistical analysis module, for intercepting bottom-layer network data, analyze network flow feelings Condition simultaneously exports Statistical Analysis Report.
It further, further include user management module, for being managed to system user information and system host information.
The utility model has the advantages that
Information security of computer network of the invention monitors system, and design rationally, improves the safety and confidentiality of data;It is logical Cross automatically cut off network module can according to monitoring result, once discovery have illegal invasion, then immediately cutting network connection, ensure The safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.
Detailed description of the invention
Fig. 1 is the schematic diagram of information security of computer network monitoring system of the present invention;
Fig. 2 is the schematic diagram of intrusion detection module.
Specific embodiment
Technical solution of the present invention is described in more detail combined with specific embodiments below.
Referring to Fig.1, a kind of information security of computer network monitoring system, including front end processor, multimedia server, video/ Audio host, telephone call interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring clothes Business device, Web server, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen Curtain operation monitoring modular, intrusion detection module, automatically cuts off network module, is detached from server prison strange computer monitoring modular Range reminding module, alarm module and network firewall are surveyed, the main control module is counted with network connection monitoring modular, locally respectively Calculation machine screen operator monitoring modular, intrusion detection module, automatically cuts off network module, is detached from clothes strange computer monitoring modular Business device monitoring range reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction, Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network The case where safety monitoring, monitors the information automatically and issues alarm at once.
As shown in Fig. 2, the intrusion detection module includes data source acquisition submodule, data and processing submodule, feature Extracting sub-module, neural metwork training submodule and neural network detection sub-module, system respond submodule.
The screen of user's local computer in the net and operation include all behaviors on subscriber computer screen and The operating process of user's keyboard, mouse.
It further include data encryption module.
It further include security information statistical analysis module, for intercepting bottom-layer network data, analysis network traffic conditions are simultaneously defeated Statistical Analysis Report out.
It further include user management module, for being managed to system user information and system host information.
Information security of computer network monitoring system of the invention in the specific application process, improves the safety of data And confidentiality;Net once discovery has illegal invasion, then can be cut off according to monitoring result immediately by automatically cutting off network module Network connection, ensures the safety of information.System of the invention has the characteristics that confidentiality is high, is suitble to promote and apply.
The foregoing is only a preferred embodiment of the present invention, the scope of protection of the present invention is not limited to this, it is any ripe Know those skilled in the art within the technical scope of the present disclosure, the letter for the technical solution that can be become apparent to Altered or equivalence replacement are fallen within the protection scope of the present invention.

Claims (6)

1. a kind of information security of computer network monitors system, which is characterized in that including front end processor, multimedia server, video/ Audio host, telephone call interface, monitor terminal, remote interface, remote monitoring terminal, USB monitor client, USB monitoring clothes Business device, Web server, database server, combined aural and visual alarm, main control module, network connection monitoring modular, local computer screen Curtain operation monitoring modular, intrusion detection module, automatically cuts off network module, is detached from server prison strange computer monitoring modular Range reminding module, alarm module and network firewall are surveyed, the main control module is counted with network connection monitoring modular, locally respectively Calculation machine screen operator monitoring modular, intrusion detection module, automatically cuts off network module, is detached from clothes strange computer monitoring modular Business device monitoring range reminding module, alarm module, network firewall connection;
Network connection of the network connection monitoring modular for all computers in real time monitoring network, discovery and control are illegal Network connection;
The local computer screen operator monitoring modular is used for the instruction according to network supervision person, to user's local computing in netting The screen of machine and operation carry out real-time monitoring;
The strange computer monitoring modular is used to monitor the computer not within the scope of current monitor, if detected unregistered The computer of registration records its information and sounds an alarm;
The intrusion detection module is led to for the data information of several key points in computer network to be collected and analyzed Analysis result is crossed to be judged with the presence or absence of the sign of total object or violation network security behavior in network;
The network module that automatically cuts off is used for according to monitoring result, once discovery has illegal invasion, main control module issues instruction, Then cutting network connection immediately;
The computer that monitoring server range reminding module is detached from for user in real-time monitoring net occurs departing from network The case where safety monitoring, monitors the information automatically and issues alarm at once.
2. information security of computer network according to claim 1 monitors system, which is characterized in that the intrusion detection mould Block includes data source acquisition submodule, data and processing submodule, feature extraction submodule, neural metwork training submodule and mind Submodule is responded through network detection sub-module, system.
3. information security of computer network according to claim 1 monitors system, which is characterized in that the user in the net The screen of local computer and operation include the operation of all behaviors and user's keyboard, mouse on subscriber computer screen Journey.
4. information security of computer network according to claim 1 monitors system, which is characterized in that further include data encryption Module.
5. information security of computer network according to claim 1 monitors system, which is characterized in that further include security information Statistical analysis module, for intercepting bottom-layer network data, analyzing network traffic conditions and exporting Statistical Analysis Report.
6. information security of computer network according to claim 1 monitors system, which is characterized in that further include user management Module, for being managed to system user information and system host information.
CN201910609844.9A 2019-07-08 2019-07-08 A kind of information security of computer network monitoring system Pending CN110324348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910609844.9A CN110324348A (en) 2019-07-08 2019-07-08 A kind of information security of computer network monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910609844.9A CN110324348A (en) 2019-07-08 2019-07-08 A kind of information security of computer network monitoring system

Publications (1)

Publication Number Publication Date
CN110324348A true CN110324348A (en) 2019-10-11

Family

ID=68123086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910609844.9A Pending CN110324348A (en) 2019-07-08 2019-07-08 A kind of information security of computer network monitoring system

Country Status (1)

Country Link
CN (1) CN110324348A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888062A (en) * 2019-12-24 2020-03-17 深圳供电局有限公司 Network security management system and method of storage battery online monitoring device
CN110990900A (en) * 2019-12-24 2020-04-10 南通理工学院 Computer network intelligent monitoring system
CN111506852A (en) * 2020-04-20 2020-08-07 承德石油高等专科学校 Intelligent web page data monitoring device and method
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system
CN112887288A (en) * 2021-01-19 2021-06-01 青岛简屿传媒有限公司 Internet-based E-commerce platform intrusion detection front-end computer scanning system
CN113518003A (en) * 2021-05-31 2021-10-19 广州市侏罗纪科技有限公司 Computer network operation management system
CN115242455A (en) * 2022-06-27 2022-10-25 山西西电信息技术研究院有限公司 Social network instant message safety monitoring system and method based on cloud computing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441365A (en) * 2002-02-28 2003-09-10 北京中电网安科技有限公司 Safeguard system and method for large and medium-sized inner network
CN205644559U (en) * 2016-05-10 2016-10-12 赵宏 Computer network safety control
CN106778364A (en) * 2016-11-22 2017-05-31 陈曦 A kind of network security controller of computer
CN107040517A (en) * 2017-02-22 2017-08-11 南京邮电大学 A kind of cognitive intrusion detection method towards cloud computing environment
CN108234525A (en) * 2018-03-30 2018-06-29 阜阳职业技术学院 A kind of information leakage preventing theft protection management system in computer network security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1441365A (en) * 2002-02-28 2003-09-10 北京中电网安科技有限公司 Safeguard system and method for large and medium-sized inner network
CN205644559U (en) * 2016-05-10 2016-10-12 赵宏 Computer network safety control
CN106778364A (en) * 2016-11-22 2017-05-31 陈曦 A kind of network security controller of computer
CN107040517A (en) * 2017-02-22 2017-08-11 南京邮电大学 A kind of cognitive intrusion detection method towards cloud computing environment
CN108234525A (en) * 2018-03-30 2018-06-29 阜阳职业技术学院 A kind of information leakage preventing theft protection management system in computer network security

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘群峰: "网络安全监控系统的设计与实现", 《科技资讯》 *
祁宏伟: "计算机网络安全中入侵检测系统的设计", 《电子技术与软件工程》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888062A (en) * 2019-12-24 2020-03-17 深圳供电局有限公司 Network security management system and method of storage battery online monitoring device
CN110990900A (en) * 2019-12-24 2020-04-10 南通理工学院 Computer network intelligent monitoring system
CN111506852A (en) * 2020-04-20 2020-08-07 承德石油高等专科学校 Intelligent web page data monitoring device and method
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system
CN112887288A (en) * 2021-01-19 2021-06-01 青岛简屿传媒有限公司 Internet-based E-commerce platform intrusion detection front-end computer scanning system
CN112887288B (en) * 2021-01-19 2022-09-13 重庆葵海数字科技有限公司 Internet-based E-commerce platform intrusion detection front-end computer scanning system
CN113518003A (en) * 2021-05-31 2021-10-19 广州市侏罗纪科技有限公司 Computer network operation management system
CN115242455A (en) * 2022-06-27 2022-10-25 山西西电信息技术研究院有限公司 Social network instant message safety monitoring system and method based on cloud computing
CN115242455B (en) * 2022-06-27 2023-08-18 山西西电信息技术研究院有限公司 Social network instant information safety monitoring system and method based on cloud computing

Similar Documents

Publication Publication Date Title
CN110324348A (en) A kind of information security of computer network monitoring system
CN111404909B (en) Safety detection system and method based on log analysis
CN108833185B (en) Network attack route restoration method and system
US9961047B2 (en) Network security management
CN103905459A (en) Cloud-based intelligent security defense system and defense method
KR101692982B1 (en) Automatic access control system of detecting threat using log analysis and automatic feature learning
Goldstein et al. Enhancing Security Event Management Systems with Unsupervised Anomaly Detection.
CN113282474A (en) User behavior monitoring method, system, equipment and medium based on bastion machine
CN110716973A (en) Big data based security event reporting platform and method
KR100846835B1 (en) Method and apparatus for Security Event Correlation Analysis based on Context Language
CN112667875A (en) Data acquisition method, data analysis method, data acquisition device, data analysis device, equipment and storage medium
CN116074075A (en) Security event association behavior analysis method, system and equipment based on association rule
CN110149303B (en) Party-school network security early warning method and early warning system
Skendžić et al. Management and monitoring security events in a business organization-siem system
CN114338171A (en) Black product attack detection method and device
CN113132370A (en) Universal integrated safety pipe center system
Ebrahimi et al. Automatic attack scenario discovering based on a new alert correlation method
CN105739408A (en) Business monitoring method used for power scheduling system and business monitoring system
CN110912753B (en) Cloud security event real-time detection system and method based on machine learning
CN111049853A (en) Security authentication system based on computer network
CN112887288B (en) Internet-based E-commerce platform intrusion detection front-end computer scanning system
CN112839029B (en) Botnet activity degree analysis method and system
CN113360907A (en) Hacker intrusion prevention method based on IDES and NIDES
CN113381881A (en) Method and device for monitoring alarm processing of host
Kawakani et al. Discovering attackers past behavior to generate online hyper-alerts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011

RJ01 Rejection of invention patent application after publication