CN110990900A - Computer network intelligent monitoring system - Google Patents
Computer network intelligent monitoring system Download PDFInfo
- Publication number
- CN110990900A CN110990900A CN201911352126.4A CN201911352126A CN110990900A CN 110990900 A CN110990900 A CN 110990900A CN 201911352126 A CN201911352126 A CN 201911352126A CN 110990900 A CN110990900 A CN 110990900A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- communication
- training set
- communication connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 64
- 238000012549 training Methods 0.000 claims abstract description 33
- 230000005540 biological transmission Effects 0.000 claims description 8
- 231100000279 safety data Toxicity 0.000 claims description 8
- 230000009471 action Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 238000005516 engineering process Methods 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims description 3
- 230000006855 networking Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000000007 visual effect Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of monitoring systems, and discloses a computer network intelligent monitoring system, which comprises: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module; the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module. The invention is suitable for the latest protection state by setting the training set database and continuously updating data through the state updating module, thereby increasing the protection effect; by arranging the encryption module, other people are prevented from changing the internal data characteristics of the training set data module, and the safety of the training set data module is improved; the data sent by the communication module is early warned through the abnormity early warning module, and the virtual data is sent through the fake command sending module, so that the attack access is puzzled, and the safety of the real data is protected.
Description
Technical Field
The invention relates to the field of monitoring systems, in particular to an intelligent monitoring system of a computer network.
Background
The computer network is a computer system which connects a plurality of computers with independent functions and external devices thereof with different geographic positions through communication lines, realizes resource sharing and information transmission under the management and coordination of a network operation system, network management software and a network communication protocol, is hopeful to protect and control the operations of accessing, reading and writing and the like of local network information from the perspective of network operation and managers, avoids the threats of 'trapdoor', virus, illegal access, denial of service, illegal occupation of network resources, illegal control and the like, prevents and defends the attack of network hackers, and is hopeful to filter and prevent the blockage of illegal, harmful or domestic confidential information from leaking, avoids the harm to the society and huge loss to the domestic.
With the rapid development of computer technology, while the processing capacity of a computer system is improved, the connection capacity of the system is continuously improved, but while the connection capacity information and the circulation capacity are improved, the security problem based on network connection is increasingly prominent, and the overall network security is mainly expressed in the following aspects: the computer security problem should be the same as the fire and theft prevention problem of each household, so that even if you cannot think that you can also become a target, the threat already appears, and once the computer security problem occurs, the measures are often too late, and great loss is caused.
In order to solve the above problems, the present application provides an intelligent monitoring system for computer network.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an intelligent monitoring system of a computer network, which is suitable for the latest protection state by setting a training set database and continuously updating data through a state updating module so as to increase the protection effect; by arranging the encryption module, other people are prevented from changing the internal data characteristics of the training set data module, and the safety of the training set data module is improved; the data sent by the communication module is early warned through the abnormity early warning module, and the virtual data is sent through the fake command sending module, so that the attack access is puzzled, and the safety of the real data is protected.
(II) technical scheme
In order to solve the above problems, the present invention provides an intelligent monitoring system for computer network, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
Preferably, the training set data module comprises a threat data module and a safety data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
Preferably, the encryption module comprises a password module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
Preferably, the alarm module is selected as an audible and visual alarm for reminding a user of danger early warning.
Preferably, the USB module transmission is selected as 3.0 transmission technology.
Preferably, the CPU module is in communication connection with the storage module, and is configured to send and store data information to the storage module.
Preferably, the alarm module is a remote networking alarm module.
The technical scheme of the invention has the following beneficial technical effects:
network data is input through the communication module, is subjected to preliminary protection through a firewall and enters a CPU (central processing unit) module of a computer for processing and analysis, the data processed in the CPU module is extracted by the abnormity early warning module and is sent to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends an action instruction to the fake instruction sending module, the fake instruction sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in the storage module, so that the self-protection effect is achieved; verify the cryptographic module through the USB module to avoid other people to cause danger through the inside data of cluster change training set data module, increase training set data module inside data through the USB module, in order to improve the intrusion protection, accomplish best protection state.
Drawings
Fig. 1 is a schematic structural diagram of an intelligent computer network monitoring system according to the present invention.
Fig. 2 is a schematic structural diagram of a training set data module in the computer network intelligent monitoring system according to the present invention.
Fig. 3 is a schematic structural diagram of an encryption module in the computer network intelligent monitoring system according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the present invention provides an intelligent monitoring system for computer network, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
In an alternative embodiment, the threat data module and the safety data module are contained in the training set data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
In an alternative embodiment, the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input, plays a role in safety certification by verifying fingerprint information and password information, and plays a role in safety protection in modifying the training set data module.
In an optional embodiment, the alarm module is selected as an audible and visual alarm for reminding a user of danger early warning and further reminding the user of network intrusion in time.
In an optional embodiment, the USB module transmission is selected as a 3.0 transmission technology, which further improves the data transmission speed and reduces the update time.
In an optional embodiment, the CPU module is communicatively connected to the storage module, and is configured to send and store data information to the storage module.
In an optional embodiment, the alarm module is a remote networking alarm module, so that an alarm is timely notified to a police station, and timely alarm is achieved.
In the invention, network data is input through a communication module, is primarily protected through a firewall and enters a CPU module of a computer for processing and analysis, an abnormity early warning module extracts the data processed in the CPU module and sends the data to a training set data module for comparison, if the data is damaged, the CPU module sends an action instruction to an alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to a fake instruction sending module, the fake instruction sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in a storage module, thereby achieving the effect of self-protection; verify the cryptographic module through the USB module to avoid other people to cause danger through the inside data of cluster change training set data module, increase training set data module inside data through the USB module, in order to improve the intrusion protection, accomplish best protection state.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.
Claims (7)
1. A computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormity early warning module, an encryption module, a training set database, a firewall, a pseudo-command sending module, a storage module and a USB module;
the communication module is used for the communication between the computer and the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and estimating risks; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormity early warning module is in communication connection with the CPU module and is used for analyzing data characteristics; the abnormity early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the interior of the training set data module for comparison; the fake command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
2. The computer network intelligent monitoring system of claim 1, wherein the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
3. The computer network intelligent monitoring system of claim 1, wherein the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
4. The computer network intelligent monitoring system of claim 1, wherein the alarm module is selected as an audible and visual alarm for reminding a user of a danger early warning.
5. The intelligent computer network monitoring system of claim 1, wherein the USB module transmission is selected as 3.0 transmission technology.
6. The computer network intelligent monitoring system of claim 1, wherein the CPU module is communicatively connected to the storage module for sending and storing data information to the storage module.
7. The computer network intelligent monitoring system of claim 1, wherein the alarm module is a remote networking alarm module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911352126.4A CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911352126.4A CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110990900A true CN110990900A (en) | 2020-04-10 |
CN110990900B CN110990900B (en) | 2023-07-04 |
Family
ID=70075159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911352126.4A Active CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110990900B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429987A (en) * | 2015-11-25 | 2016-03-23 | 西安科技大学 | Security system for computer network |
CN105471875A (en) * | 2015-11-25 | 2016-04-06 | 西安科技大学 | Computer network monitoring system |
CN108632276A (en) * | 2018-05-07 | 2018-10-09 | 襄阳市尚贤信息科技有限公司 | A kind of information security of computer network system |
CN110324348A (en) * | 2019-07-08 | 2019-10-11 | 陈浩 | A kind of information security of computer network monitoring system |
-
2019
- 2019-12-24 CN CN201911352126.4A patent/CN110990900B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429987A (en) * | 2015-11-25 | 2016-03-23 | 西安科技大学 | Security system for computer network |
CN105471875A (en) * | 2015-11-25 | 2016-04-06 | 西安科技大学 | Computer network monitoring system |
CN108632276A (en) * | 2018-05-07 | 2018-10-09 | 襄阳市尚贤信息科技有限公司 | A kind of information security of computer network system |
CN110324348A (en) * | 2019-07-08 | 2019-10-11 | 陈浩 | A kind of information security of computer network monitoring system |
Also Published As
Publication number | Publication date |
---|---|
CN110990900B (en) | 2023-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Touqeer et al. | Smart home security: challenges, issues and solutions at different IoT layers | |
KR101634295B1 (en) | System and method for providing authentication service for iot security | |
US20180359272A1 (en) | Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management | |
CN111274583A (en) | Big data computer network safety protection device and control method thereof | |
Ghorbani et al. | Security challenges in internet of things: survey | |
CN112149090A (en) | Computer network safety protection system based on data cloud | |
CN115150208B (en) | Zero-trust-based Internet of things terminal secure access method and system | |
KR102433928B1 (en) | System for Managing Cyber Security of Autonomous Ship | |
CN106559399A (en) | A kind of the Internet mobile terminal synthesis managing and control system | |
CN113382076A (en) | Internet of things terminal security threat analysis method and protection method | |
CN106982204A (en) | Credible and secure platform | |
Rekik et al. | A cyber-physical threat analysis for microgrids | |
CN113411297A (en) | Situation awareness defense method and system based on attribute access control | |
Choudhary et al. | A study of threats, vulnerabilities and countermeasures: An iot perspective | |
Magare et al. | Security and privacy issues in smart city: Threats and their countermeasures | |
CN110022319A (en) | Attack security isolation method, device, computer equipment and the storage equipment of data | |
CN113660222A (en) | Situation awareness defense method and system based on mandatory access control | |
Altayaran et al. | Security threats of application programming interface (API's) in internet of things (IoT) communications | |
CN105791233A (en) | Anti-virus scanning method and device | |
Zlatanov | Computer security and mobile security challenges | |
Mysore | Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience | |
CN110990900B (en) | Computer network intelligent monitoring system | |
Mahlous | Threat model and risk management for a smart home iot system | |
Gu et al. | IoT security and new trends of solutions | |
CN108768996A (en) | A kind of detection guard system of SQL injection attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |