CN110990900B - Computer network intelligent monitoring system - Google Patents
Computer network intelligent monitoring system Download PDFInfo
- Publication number
- CN110990900B CN110990900B CN201911352126.4A CN201911352126A CN110990900B CN 110990900 B CN110990900 B CN 110990900B CN 201911352126 A CN201911352126 A CN 201911352126A CN 110990900 B CN110990900 B CN 110990900B
- Authority
- CN
- China
- Prior art keywords
- module
- data
- training set
- communication
- cpu
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Abstract
The invention relates to the technical field of monitoring systems, and discloses a computer network intelligent monitoring system, which comprises: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module; the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module. According to the invention, the training set database is set, and the data is continuously updated through the state updating module so as to adapt to the latest protection state, thereby increasing the protection effect; by arranging the encryption module, the internal data characteristics of the training set data module are prevented from being changed by others, and the safety of the training set data module is further improved; the data sent by the communication module is pre-warned through the abnormal pre-warning module, virtual data is sent through the pseudo-command sending module, attack access is confused, and safety of real data is protected.
Description
Technical Field
The invention relates to the field of monitoring systems, in particular to an intelligent computer network monitoring system.
Background
The computer network is a computer system which connects a plurality of computers with different geographic positions and external devices thereof and has independent functions through communication lines, realizes resource sharing and information transmission under the management and coordination of a network operation system, network management software and a network communication protocol, is expected to protect and control the access, the reading and writing and other operations of local network information from the aspects of network operation and manager, avoids the threats of 'trapdoor', virus, illegal access, refusal of service, illegal occupation and illegal control of network resources and the like, prevents and defends the attack of network hackers, is expected to filter and prevent illegal, harmful or domestic confidential information from blocking, avoids the leakage of confidential information, avoids the harm to society and causes huge loss to China.
With the rapid development of computer technology, while the processing capacity of computer systems is improved, the connection capacity of the systems is also improved continuously, but while the connection capacity information and the circulation capacity are improved, the security problem based on network connection is also increasingly outstanding, and the overall network security is mainly expressed in the following aspects: the physical security of the network, the security of the network topology structure, the security of the network system, the security of the application system, the security of the network management and the like, so that the computer security problem is to be prevented as the fireproof and anti-theft problem of each household, and the threat is already present when you cannot even think that you can also become targets, and once the threat happens, the threat is often worry about, and great loss is caused.
In order to solve the above problems, a computer network intelligent monitoring system is provided in the present application.
Disclosure of Invention
Object of the invention
In order to solve the technical problems in the background technology, the invention provides a computer network intelligent monitoring system, which is adapted to the latest protection state by setting a training set database and continuously updating data through a state updating module so as to further increase the protection effect; by arranging the encryption module, the internal data characteristics of the training set data module are prevented from being changed by others, and the safety of the training set data module is further improved; the data sent by the communication module is pre-warned through the abnormal pre-warning module, virtual data is sent through the pseudo-command sending module, attack access is confused, and safety of real data is protected.
(II) technical scheme
In order to solve the above problems, the present invention provides a computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
Preferably, the training set data module comprises a threat data module and a safety data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
Preferably, the encryption module comprises a password module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
Preferably, the alarm module is selected as an audible and visual alarm for reminding a user of dangerous early warning.
Preferably, the USB module transmission is selected to be 3.0 transmission technology.
Preferably, the CPU module is in communication connection with the storage module and is used for sending data information to the storage module and storing the data information.
Preferably, the alarm module is a remote networking alarm module.
The technical scheme of the invention has the following beneficial technical effects:
the network data is input through the communication module, is primarily protected through the firewall, enters the CPU module of the computer for processing and analysis, the abnormal early warning module extracts the data processed in the CPU module and sends the data to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to the false command sending module, the false command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end, so that the loss of the data in the storage module is avoided, and the effect of self protection is achieved; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, the internal data of the training set data module is increased through the USB module, intrusion protection is improved, and the best protection state is achieved.
Drawings
Fig. 1 is a schematic structural diagram of a computer network intelligent monitoring system according to the present invention.
Fig. 2 is a schematic structural diagram of a training set data module in the computer network intelligent monitoring system according to the present invention.
Fig. 3 is a schematic structural diagram of an encryption module in the computer network intelligent monitoring system according to the present invention.
Detailed Description
The objects, technical solutions and advantages of the present invention will become more apparent by the following detailed description of the present invention with reference to the accompanying drawings. It should be understood that the description is only illustrative and is not intended to limit the scope of the invention. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the present invention.
As shown in fig. 1-3, the computer network intelligent monitoring system provided by the present invention includes: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
In an alternative embodiment, the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
In an alternative embodiment, the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for verifying the fingerprint and inputting the fingerprint, and plays a role in safety certification by verifying fingerprint information and password information and has a safety protection effect on the modification training set data module.
In an alternative embodiment, the alarm module is selected as an audible and visual alarm for reminding a user of dangerous early warning, so as to timely remind the user of network intrusion.
In an alternative embodiment, the USB module transmission is selected to be a 3.0 transmission technology, which further increases the data transmission speed and reduces the update time.
In an alternative embodiment, the CPU module is communicatively coupled to the memory module for sending data information to the memory module and storing the data information.
In an alternative embodiment, the alarm module is a remote networking alarm module, so as to inform the police office in time and realize timely alarm.
In the invention, network data is input through a communication module, is primarily protected through a firewall, enters a CPU module of a computer for processing and analysis, an abnormal early warning module extracts data processed in the CPU module and sends the data to a training set data module for comparison, if harm exists, the CPU module sends an action instruction to an alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to a pseudo-command sending module, the pseudo-command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in a storage module, thereby achieving the effect of self protection; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, the internal data of the training set data module is increased through the USB module, intrusion protection is improved, and the best protection state is achieved.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explanation of the principles of the present invention and are in no way limiting of the invention. Accordingly, any modification, equivalent replacement, improvement, etc. made without departing from the spirit and scope of the present invention should be included in the scope of the present invention. Furthermore, the appended claims are intended to cover all such changes and modifications that fall within the scope and boundary of the appended claims, or equivalents of such scope and boundary.
Claims (7)
1. A computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module;
the network data is input through the communication module, is primarily protected through the firewall, enters the CPU module of the computer for processing and analysis, the abnormal early warning module extracts the data processed in the CPU module and sends the data to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to the false command sending module, the false command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid loss of the data in the storage module; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, and the internal data of the training set data module is increased through the USB module, so that intrusion protection is improved.
2. The computer network intelligent monitoring system of claim 1, wherein the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
3. The computer network intelligent monitoring system of claim 1, wherein the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
4. The computer network intelligent monitoring system of claim 1, wherein the alarm module is selected as an audible and visual alarm for alerting a user to a hazard warning.
5. The computer network intelligent monitoring system of claim 1, wherein the USB module transmission is selected from the 3.0 transmission technology.
6. The intelligent monitoring system of computer network according to claim 1, wherein the CPU module is communicatively coupled to the memory module for transmitting data information to the memory module and storing the data information.
7. The computer network intelligent monitoring system of claim 1, wherein the alarm module is a remote networking alarm module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911352126.4A CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911352126.4A CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110990900A CN110990900A (en) | 2020-04-10 |
CN110990900B true CN110990900B (en) | 2023-07-04 |
Family
ID=70075159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911352126.4A Active CN110990900B (en) | 2019-12-24 | 2019-12-24 | Computer network intelligent monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110990900B (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429987A (en) * | 2015-11-25 | 2016-03-23 | 西安科技大学 | Security system for computer network |
CN105471875A (en) * | 2015-11-25 | 2016-04-06 | 西安科技大学 | Computer network monitoring system |
CN108632276B (en) * | 2018-05-07 | 2020-10-23 | 襄阳市尚贤信息科技有限公司 | Computer network information safety system |
CN110324348A (en) * | 2019-07-08 | 2019-10-11 | 陈浩 | A kind of information security of computer network monitoring system |
-
2019
- 2019-12-24 CN CN201911352126.4A patent/CN110990900B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110990900A (en) | 2020-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101737726B1 (en) | Rootkit detection by using hardware resources to detect inconsistencies in network traffic | |
KR101977731B1 (en) | Apparatus and method for detecting anomaly in a controller system | |
CN111274583A (en) | Big data computer network safety protection device and control method thereof | |
CN101667232B (en) | Terminal credible security system and method based on credible computing | |
CA3021285C (en) | Methods and systems for network security | |
CN104917776A (en) | Industrial control network safety protection equipment and industrial control network safety protection method | |
CN112149090A (en) | Computer network safety protection system based on data cloud | |
CN109344609A (en) | A kind of TCU module, TCU system and guard method | |
CN106559399A (en) | A kind of the Internet mobile terminal synthesis managing and control system | |
CN113132318A (en) | Active defense method and system for information safety of power distribution automation system master station | |
CN113411297A (en) | Situation awareness defense method and system based on attribute access control | |
CN106982204A (en) | Credible and secure platform | |
CN115314286A (en) | Safety guarantee system | |
CN113660222A (en) | Situation awareness defense method and system based on mandatory access control | |
CN113382076A (en) | Internet of things terminal security threat analysis method and protection method | |
CN110990900B (en) | Computer network intelligent monitoring system | |
KR101265474B1 (en) | Security service providing method for mobile virtualization service | |
CN104735043A (en) | Method for preventing suspicious data package from attacking PLC via industrial Ethernet | |
CN115398430A (en) | Malicious intrusion detection method, device, system, computing device, medium, and program | |
Gu et al. | IoT security and new trends of solutions | |
KR101237376B1 (en) | Integrated security control System and Method for Smartphones | |
CN108768996A (en) | A kind of detection guard system of SQL injection attack | |
CN105791233A (en) | Anti-virus scanning method and device | |
EP3018878B1 (en) | Firewall based prevention of the malicious information flows in smart home | |
Mysore | Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |