CN110990900B - Computer network intelligent monitoring system - Google Patents

Computer network intelligent monitoring system Download PDF

Info

Publication number
CN110990900B
CN110990900B CN201911352126.4A CN201911352126A CN110990900B CN 110990900 B CN110990900 B CN 110990900B CN 201911352126 A CN201911352126 A CN 201911352126A CN 110990900 B CN110990900 B CN 110990900B
Authority
CN
China
Prior art keywords
module
data
training set
communication
cpu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911352126.4A
Other languages
Chinese (zh)
Other versions
CN110990900A (en
Inventor
张海飞
钱兰美
吴芳
雷丽婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Institute of Technology
Original Assignee
Nantong Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong Institute of Technology filed Critical Nantong Institute of Technology
Priority to CN201911352126.4A priority Critical patent/CN110990900B/en
Publication of CN110990900A publication Critical patent/CN110990900A/en
Application granted granted Critical
Publication of CN110990900B publication Critical patent/CN110990900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention relates to the technical field of monitoring systems, and discloses a computer network intelligent monitoring system, which comprises: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module; the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module. According to the invention, the training set database is set, and the data is continuously updated through the state updating module so as to adapt to the latest protection state, thereby increasing the protection effect; by arranging the encryption module, the internal data characteristics of the training set data module are prevented from being changed by others, and the safety of the training set data module is further improved; the data sent by the communication module is pre-warned through the abnormal pre-warning module, virtual data is sent through the pseudo-command sending module, attack access is confused, and safety of real data is protected.

Description

Computer network intelligent monitoring system
Technical Field
The invention relates to the field of monitoring systems, in particular to an intelligent computer network monitoring system.
Background
The computer network is a computer system which connects a plurality of computers with different geographic positions and external devices thereof and has independent functions through communication lines, realizes resource sharing and information transmission under the management and coordination of a network operation system, network management software and a network communication protocol, is expected to protect and control the access, the reading and writing and other operations of local network information from the aspects of network operation and manager, avoids the threats of 'trapdoor', virus, illegal access, refusal of service, illegal occupation and illegal control of network resources and the like, prevents and defends the attack of network hackers, is expected to filter and prevent illegal, harmful or domestic confidential information from blocking, avoids the leakage of confidential information, avoids the harm to society and causes huge loss to China.
With the rapid development of computer technology, while the processing capacity of computer systems is improved, the connection capacity of the systems is also improved continuously, but while the connection capacity information and the circulation capacity are improved, the security problem based on network connection is also increasingly outstanding, and the overall network security is mainly expressed in the following aspects: the physical security of the network, the security of the network topology structure, the security of the network system, the security of the application system, the security of the network management and the like, so that the computer security problem is to be prevented as the fireproof and anti-theft problem of each household, and the threat is already present when you cannot even think that you can also become targets, and once the threat happens, the threat is often worry about, and great loss is caused.
In order to solve the above problems, a computer network intelligent monitoring system is provided in the present application.
Disclosure of Invention
Object of the invention
In order to solve the technical problems in the background technology, the invention provides a computer network intelligent monitoring system, which is adapted to the latest protection state by setting a training set database and continuously updating data through a state updating module so as to further increase the protection effect; by arranging the encryption module, the internal data characteristics of the training set data module are prevented from being changed by others, and the safety of the training set data module is further improved; the data sent by the communication module is pre-warned through the abnormal pre-warning module, virtual data is sent through the pseudo-command sending module, attack access is confused, and safety of real data is protected.
(II) technical scheme
In order to solve the above problems, the present invention provides a computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
Preferably, the training set data module comprises a threat data module and a safety data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
Preferably, the encryption module comprises a password module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
Preferably, the alarm module is selected as an audible and visual alarm for reminding a user of dangerous early warning.
Preferably, the USB module transmission is selected to be 3.0 transmission technology.
Preferably, the CPU module is in communication connection with the storage module and is used for sending data information to the storage module and storing the data information.
Preferably, the alarm module is a remote networking alarm module.
The technical scheme of the invention has the following beneficial technical effects:
the network data is input through the communication module, is primarily protected through the firewall, enters the CPU module of the computer for processing and analysis, the abnormal early warning module extracts the data processed in the CPU module and sends the data to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to the false command sending module, the false command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end, so that the loss of the data in the storage module is avoided, and the effect of self protection is achieved; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, the internal data of the training set data module is increased through the USB module, intrusion protection is improved, and the best protection state is achieved.
Drawings
Fig. 1 is a schematic structural diagram of a computer network intelligent monitoring system according to the present invention.
Fig. 2 is a schematic structural diagram of a training set data module in the computer network intelligent monitoring system according to the present invention.
Fig. 3 is a schematic structural diagram of an encryption module in the computer network intelligent monitoring system according to the present invention.
Detailed Description
The objects, technical solutions and advantages of the present invention will become more apparent by the following detailed description of the present invention with reference to the accompanying drawings. It should be understood that the description is only illustrative and is not intended to limit the scope of the invention. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the present invention.
As shown in fig. 1-3, the computer network intelligent monitoring system provided by the present invention includes: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module.
In an alternative embodiment, the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
In an alternative embodiment, the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for verifying the fingerprint and inputting the fingerprint, and plays a role in safety certification by verifying fingerprint information and password information and has a safety protection effect on the modification training set data module.
In an alternative embodiment, the alarm module is selected as an audible and visual alarm for reminding a user of dangerous early warning, so as to timely remind the user of network intrusion.
In an alternative embodiment, the USB module transmission is selected to be a 3.0 transmission technology, which further increases the data transmission speed and reduces the update time.
In an alternative embodiment, the CPU module is communicatively coupled to the memory module for sending data information to the memory module and storing the data information.
In an alternative embodiment, the alarm module is a remote networking alarm module, so as to inform the police office in time and realize timely alarm.
In the invention, network data is input through a communication module, is primarily protected through a firewall, enters a CPU module of a computer for processing and analysis, an abnormal early warning module extracts data processed in the CPU module and sends the data to a training set data module for comparison, if harm exists, the CPU module sends an action instruction to an alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to a pseudo-command sending module, the pseudo-command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid the loss of the data in a storage module, thereby achieving the effect of self protection; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, the internal data of the training set data module is increased through the USB module, intrusion protection is improved, and the best protection state is achieved.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explanation of the principles of the present invention and are in no way limiting of the invention. Accordingly, any modification, equivalent replacement, improvement, etc. made without departing from the spirit and scope of the present invention should be included in the scope of the present invention. Furthermore, the appended claims are intended to cover all such changes and modifications that fall within the scope and boundary of the appended claims, or equivalents of such scope and boundary.

Claims (7)

1. A computer network intelligent monitoring system, comprising: the system comprises a CPU module, a communication module, a state updating module, an alarm module, an abnormality early warning module, an encryption module, a training set database, a firewall, a fake command sending module, a storage module and a USB module;
the communication module is used for communicating the computer with the outside; the firewall is in communication connection with the communication module and is used for carrying out preliminary detection on data entering through the communication module and predicting risk; the CPU module is in communication connection with the firewall and is used for processing the data transmitted by the communication module; the abnormal early warning module is in communication connection with the CPU module and is used for analyzing the data characteristics; the abnormal early warning module is in communication connection with the training set data module and is used for sending the data characteristics to the training set data module for comparison; the pseudo-command sending module is in communication connection with the CPU module and is used for sending virtual data to the CPU module so as to be transmitted to the access IP end through the communication module;
the USB module is used for inputting data; the USB module is in communication connection with the encryption module and is used for verifying data input of the encryption module; the state updating module is in communication connection with the encryption module and is used for receiving input data; the state updating module is in communication connection with the training set data module and is used for updating the internal data characteristics of the training set data module; the CPU module is in communication connection with the alarm module and is used for sending an action instruction to the alarm module;
the network data is input through the communication module, is primarily protected through the firewall, enters the CPU module of the computer for processing and analysis, the abnormal early warning module extracts the data processed in the CPU module and sends the data to the training set data module for comparison, if harm exists, the CPU module sends an action instruction to the alarm module, the alarm module responds to remind a user of network intrusion, meanwhile, the CPU module sends the action instruction to the false command sending module, the false command sending module sends virtual data to the communication module, and the communication module sends the virtual data to an IP (Internet protocol) of an intrusion end so as to avoid loss of the data in the storage module; the encryption module is verified through the USB module, so that danger caused by the fact that other people change the internal data of the training set data module through serial modification is avoided, and the internal data of the training set data module is increased through the USB module, so that intrusion protection is improved.
2. The computer network intelligent monitoring system of claim 1, wherein the training set data module comprises a threat data module and a security data module; the threat data module is used for storing dangerous data characteristics, and the safety data module is used for storing safety data characteristics.
3. The computer network intelligent monitoring system of claim 1, wherein the encryption module comprises a cryptographic module and a fingerprint module; the password module is used for inputting and inputting passwords; the fingerprint module is used for fingerprint verification and fingerprint input.
4. The computer network intelligent monitoring system of claim 1, wherein the alarm module is selected as an audible and visual alarm for alerting a user to a hazard warning.
5. The computer network intelligent monitoring system of claim 1, wherein the USB module transmission is selected from the 3.0 transmission technology.
6. The intelligent monitoring system of computer network according to claim 1, wherein the CPU module is communicatively coupled to the memory module for transmitting data information to the memory module and storing the data information.
7. The computer network intelligent monitoring system of claim 1, wherein the alarm module is a remote networking alarm module.
CN201911352126.4A 2019-12-24 2019-12-24 Computer network intelligent monitoring system Active CN110990900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911352126.4A CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911352126.4A CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Publications (2)

Publication Number Publication Date
CN110990900A CN110990900A (en) 2020-04-10
CN110990900B true CN110990900B (en) 2023-07-04

Family

ID=70075159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911352126.4A Active CN110990900B (en) 2019-12-24 2019-12-24 Computer network intelligent monitoring system

Country Status (1)

Country Link
CN (1) CN110990900B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429987A (en) * 2015-11-25 2016-03-23 西安科技大学 Security system for computer network
CN105471875A (en) * 2015-11-25 2016-04-06 西安科技大学 Computer network monitoring system
CN108632276B (en) * 2018-05-07 2020-10-23 襄阳市尚贤信息科技有限公司 Computer network information safety system
CN110324348A (en) * 2019-07-08 2019-10-11 陈浩 A kind of information security of computer network monitoring system

Also Published As

Publication number Publication date
CN110990900A (en) 2020-04-10

Similar Documents

Publication Publication Date Title
KR101737726B1 (en) Rootkit detection by using hardware resources to detect inconsistencies in network traffic
KR101977731B1 (en) Apparatus and method for detecting anomaly in a controller system
CN111274583A (en) Big data computer network safety protection device and control method thereof
CN101667232B (en) Terminal credible security system and method based on credible computing
CA3021285C (en) Methods and systems for network security
CN104917776A (en) Industrial control network safety protection equipment and industrial control network safety protection method
CN112149090A (en) Computer network safety protection system based on data cloud
CN109344609A (en) A kind of TCU module, TCU system and guard method
CN106559399A (en) A kind of the Internet mobile terminal synthesis managing and control system
CN113132318A (en) Active defense method and system for information safety of power distribution automation system master station
CN113411297A (en) Situation awareness defense method and system based on attribute access control
CN106982204A (en) Credible and secure platform
CN115314286A (en) Safety guarantee system
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
CN113382076A (en) Internet of things terminal security threat analysis method and protection method
CN110990900B (en) Computer network intelligent monitoring system
KR101265474B1 (en) Security service providing method for mobile virtualization service
CN104735043A (en) Method for preventing suspicious data package from attacking PLC via industrial Ethernet
CN115398430A (en) Malicious intrusion detection method, device, system, computing device, medium, and program
Gu et al. IoT security and new trends of solutions
KR101237376B1 (en) Integrated security control System and Method for Smartphones
CN108768996A (en) A kind of detection guard system of SQL injection attack
CN105791233A (en) Anti-virus scanning method and device
EP3018878B1 (en) Firewall based prevention of the malicious information flows in smart home
Mysore Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant