CN110990900A - Computer network intelligent monitoring system - Google Patents

Computer network intelligent monitoring system Download PDF

Info

Publication number
CN110990900A
CN110990900A CN201911352126.4A CN201911352126A CN110990900A CN 110990900 A CN110990900 A CN 110990900A CN 201911352126 A CN201911352126 A CN 201911352126A CN 110990900 A CN110990900 A CN 110990900A
Authority
CN
China
Prior art keywords
module
data
communication
training set
communication connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911352126.4A
Other languages
Chinese (zh)
Other versions
CN110990900B (en
Inventor
张海飞
钱兰美
吴芳
雷丽婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANTONG INSTITUTE OF TECHNOLOGY
Original Assignee
NANTONG INSTITUTE OF TECHNOLOGY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANTONG INSTITUTE OF TECHNOLOGY filed Critical NANTONG INSTITUTE OF TECHNOLOGY
Priority to CN201911352126.4A priority Critical patent/CN110990900B/en
Publication of CN110990900A publication Critical patent/CN110990900A/en
Application granted granted Critical
Publication of CN110990900B publication Critical patent/CN110990900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of monitoring systems, and discloses a computer network intelligent monitoring system, which comprises: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module; the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module. The invention is suitable for the latest protection state by setting the training set database and continuously updating data through the state updating module, thereby increasing the protection effect; by arranging the encryption module, other people are prevented from changing the internal data characteristics of the training set data module, and the safety of the training set data module is improved; the data sent by the communication module is early warned through the abnormity early warning module, and the virtual data is sent through the fake command sending module, so that the attack access is puzzled, and the safety of the real data is protected.

Description

Computer network intelligent monitoring system
Technical Field
The invention relates to the field of monitoring systems, in particular to an intelligent monitoring system of a computer network.
Background
The computer network is a computer system which connects a plurality of computers with independent functions and external devices thereof with different geographic positions through communication lines, realizes resource sharing and information transmission under the management and coordination of a network operation system, network management software and a network communication protocol, is hopeful to protect and control the operations of accessing, reading and writing and the like of local network information from the perspective of network operation and managers, avoids the threats of 'trapdoor', virus, illegal access, denial of service, illegal occupation of network resources, illegal control and the like, prevents and defends the attack of network hackers, and is hopeful to filter and prevent the blockage of illegal, harmful or domestic confidential information from leaking, avoids the harm to the society and huge loss to the domestic.
With the rapid development of computer technology, while the processing capacity of a computer system is improved, the connection capacity of the system is continuously improved, but while the connection capacity information and the circulation capacity are improved, the security problem based on network connection is increasingly prominent, and the overall network security is mainly expressed in the following aspects: the computer security problem should be the same as the fire and theft prevention problem of each household, so that even if you cannot think that you can also become a target, the threat already appears, and once the computer security problem occurs, the measures are often too late, and great loss is caused.
In order to solve the above problems, the present application provides an intelligent monitoring system for computer network.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an intelligent monitoring system of a computer network, which is suitable for the latest protection state by setting a training set database and continuously updating data through a state updating module so as to increase the protection effect; by arranging the encryption module, other people are prevented from changing the internal data characteristics of the training set data module, and the safety of the training set data module is improved; the data sent by the communication module is early warned through the abnormity early warning module, and the virtual data is sent through the fake command sending module, so that the attack access is puzzled, and the safety of the real data is protected.
(II) technical scheme
In order to solve the above problems, the present invention provides an intelligent monitoring system for computer network, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
Preferably, the training set data module comprises a threat data module and a safety data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
Preferably, the encryption module comprises a password module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
Preferably, the alarm module is selected as an audible and visual alarm for reminding a user of danger early warning.
Preferably, the USB module transmission is selected as 3.0 transmission technology.
Preferably, the CPU module is in communication connection with the storage module, and is configured to send and store data information to the storage module.
Preferably, the alarm module is a remote networking alarm module.
The technical scheme of the invention has the following beneficial technical effects:
network data is input through the communication module, is subjected to preliminary protection through a firewall and enters a CPU (central processing unit) module of a computer for processing and analysis, the data processed in the CPU module is extracted by the abnormity early warning module and is sent to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends an action instruction to the fake instruction sending module, the fake instruction sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in the storage module, so that the self-protection effect is achieved; verify the cryptographic module through the USB module to avoid other people to cause danger through the inside data of cluster change training set data module, increase training set data module inside data through the USB module, in order to improve the intrusion protection, accomplish best protection state.
Drawings
Fig. 1 is a schematic structural diagram of an intelligent computer network monitoring system according to the present invention.
Fig. 2 is a schematic structural diagram of a training set data module in the computer network intelligent monitoring system according to the present invention.
Fig. 3 is a schematic structural diagram of an encryption module in the computer network intelligent monitoring system according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the present invention provides an intelligent monitoring system for computer network, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
In an alternative embodiment, the threat data module and the safety data module are contained in the training set data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
In an alternative embodiment, the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input, plays a role in safety certification by verifying fingerprint information and password information, and plays a role in safety protection in modifying the training set data module.
In an optional embodiment, the alarm module is selected as an audible and visual alarm for reminding a user of danger early warning and further reminding the user of network intrusion in time.
In an optional embodiment, the USB module transmission is selected as a 3.0 transmission technology, which further improves the data transmission speed and reduces the update time.
In an optional embodiment, the CPU module is communicatively connected to the storage module, and is configured to send and store data information to the storage module.
In an optional embodiment, the alarm module is a remote networking alarm module, so that an alarm is timely notified to a police station, and timely alarm is achieved.
In the invention, network data is input through a communication module, is primarily protected through a firewall and enters a CPU module of a computer for processing and analysis, an abnormity early warning module extracts the data processed in the CPU module and sends the data to a training set data module for comparison, if the data is damaged, the CPU module sends an action instruction to an alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to a fake instruction sending module, the fake instruction sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in a storage module, thereby achieving the effect of self-protection; verify the cryptographic module through the USB module to avoid other people to cause danger through the inside data of cluster change training set data module, increase training set data module inside data through the USB module, in order to improve the intrusion protection, accomplish best protection state.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (7)

1. A computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
2. The computer network intelligent monitoring system of claim 1, wherein the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
3. The computer network intelligent monitoring system of claim 1, wherein the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
4. The computer network intelligent monitoring system of claim 1, wherein the alarm module is selected as an audible and visual alarm for reminding a user of a danger early warning.
5. The intelligent computer network monitoring system of claim 1, wherein the USB module transmission is selected as 3.0 transmission technology.
6. The computer network intelligent monitoring system of claim 1, wherein the CPU module is communicatively connected to the storage module for sending and storing data information to the storage module.
7. The computer network intelligent monitoring system of claim 1, wherein the alarm module is a remote networking alarm module.
CN201911352126.4A 2019-12-24 2019-12-24 Computer network intelligent monitoring system Active CN110990900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911352126.4A CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911352126.4A CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Publications (2)

Publication Number Publication Date
CN110990900A true CN110990900A (en) 2020-04-10
CN110990900B CN110990900B (en) 2023-07-04

Family

ID=70075159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911352126.4A Active CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Country Status (1)

Country Link
CN (1) CN110990900B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429987A (en) * 2015-11-25 2016-03-23 西安科技大学 Security system for computer network
CN105471875A (en) * 2015-11-25 2016-04-06 西安科技大学 Computer network monitoring system
CN108632276A (en) * 2018-05-07 2018-10-09 襄阳市尚贤信息科技有限公司 A kind of information security of computer network system
CN110324348A (en) * 2019-07-08 2019-10-11 陈浩 A kind of information security of computer network monitoring system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429987A (en) * 2015-11-25 2016-03-23 西安科技大学 Security system for computer network
CN105471875A (en) * 2015-11-25 2016-04-06 西安科技大学 Computer network monitoring system
CN108632276A (en) * 2018-05-07 2018-10-09 襄阳市尚贤信息科技有限公司 A kind of information security of computer network system
CN110324348A (en) * 2019-07-08 2019-10-11 陈浩 A kind of information security of computer network monitoring system

Also Published As

Publication number Publication date
CN110990900B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
Touqeer et al. Smart home security: challenges, issues and solutions at different IoT layers
KR101634295B1 (en) System and method for providing authentication service for iot security
US20180359272A1 (en) Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
CN111274583A (en) Big data computer network safety protection device and control method thereof
Ghorbani et al. Security challenges in internet of things: survey
CN112149090A (en) Computer network safety protection system based on data cloud
CN115150208B (en) Zero-trust-based Internet of things terminal secure access method and system
KR102433928B1 (en) System for Managing Cyber Security of Autonomous Ship
CN106559399A (en) A kind of the Internet mobile terminal synthesis managing and control system
CN113382076A (en) Internet of things terminal security threat analysis method and protection method
CN106982204A (en) Credible and secure platform
Rekik et al. A cyber-physical threat analysis for microgrids
CN113411297A (en) Situation awareness defense method and system based on attribute access control
Choudhary et al. A study of threats, vulnerabilities and countermeasures: An iot perspective
Magare et al. Security and privacy issues in smart city: Threats and their countermeasures
CN110022319A (en) Attack security isolation method, device, computer equipment and the storage equipment of data
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
Altayaran et al. Security threats of application programming interface (API's) in internet of things (IoT) communications
CN105791233A (en) Anti-virus scanning method and device
Zlatanov Computer security and mobile security challenges
Mysore Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience
CN110990900B (en) Computer network intelligent monitoring system
Mahlous Threat model and risk management for a smart home iot system
Gu et al. IoT security and new trends of solutions
CN108768996A (en) A kind of detection guard system of SQL injection attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant