CN111294618B - System and method for monitoring data security of broadcast television - Google Patents

System and method for monitoring data security of broadcast television Download PDF

Info

Publication number
CN111294618B
CN111294618B CN202010172262.1A CN202010172262A CN111294618B CN 111294618 B CN111294618 B CN 111294618B CN 202010172262 A CN202010172262 A CN 202010172262A CN 111294618 B CN111294618 B CN 111294618B
Authority
CN
China
Prior art keywords
data
broadcast television
distributed computing
computing unit
intrusion detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010172262.1A
Other languages
Chinese (zh)
Other versions
CN111294618A (en
Inventor
周光普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Xunmei Visual Culture Communication Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010172262.1A priority Critical patent/CN111294618B/en
Publication of CN111294618A publication Critical patent/CN111294618A/en
Application granted granted Critical
Publication of CN111294618B publication Critical patent/CN111294618B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64723Monitoring of network processes or resources, e.g. monitoring of network load

Abstract

The invention discloses a system and a method for monitoring data security of broadcast television, comprising a network node, a network signal detector, a distributed computing unit, an extension system and a host system; the network node is used for receiving the broadcast television network data and is connected with the network signal detector in a unidirectional telecommunication way behind the network node; the network signal detector is used for collecting broadcast television network data and transmitting the broadcast television network data to the distributed computing unit; the distributed computing unit is used for carrying out classification decryption and data interception on the broadcast television network data and carrying out intrusion detection on the classified decrypted data in the extension system, and the distributed computing unit transmits the safety data after the intrusion detection is carried out on the extension system to the host system. The system can realize the self online reconstruction of hardware and enhance the safety performance of the hardware during operation.

Description

System and method for monitoring data security of broadcast television
Technical Field
The invention relates to the technical field of broadcast television data, in particular to a system and a method for monitoring the safety of the broadcast television data.
Background
The broadcast television network technology is continuously updated, and is gradually changed from early SDH network transmission into a transmission form existing in various networks such as an IP network, an ATM switching transmission network, an HFC network and the like, a broadcast television station transmits optical signals through an optical cable or converts the optical signals into electromagnetic signals for wireless transmission, and no matter which data transmission mode is adopted, the broadcast television station is easily interfered or attacked by the outside, and the security of the broadcast television network is influenced.
The purpose of the broadcast television network monitoring is to distinguish the transmission signal types of the broadcast television network, judge whether the transmission signal sources are correct and legal, process some illegal invaded information and ensure the stability of the broadcast television network transmission. The intrusion detection technology is the most direct and effective safety supervision technology in a broadcast television network system, can resist network intrusion and alarm illegal intrusion behaviors, and can effectively improve the safety performance of the broadcast television network by applying the intrusion detection technology. However, more and more asymmetric encryption is not recognized by the monitor in the one-time pad mode.
The honeypot network or the sandbox can effectively monitor the attack behavior, whether the honeypot network simulates an actual working network and the virtual file operation environment of the sandbox needs to occupy a large amount of system resources, the requirements on data transmitted in the broadcast television network and the speed are higher and higher, the computing capability of a computer is simply improved, and the requirements on data security monitoring and broadcast television data transmission cannot be met at the present stage.
Disclosure of Invention
Therefore, in order to overcome the above technical problems, the present invention provides a system and a method for monitoring the security of broadcast television data, which reduces the overhead of system hardware as much as possible on the premise of ensuring the security of broadcast television data, and simultaneously improves the security monitoring and intrusion analysis capabilities of broadcast television data.
In order to achieve the purpose, the invention provides the following technical scheme:
a monitoring system for data security of broadcast television comprises a network node, a network signal detector, a distributed computing unit, an extension system and a host system; the network node is used for receiving the broadcast television network data and is connected with the network signal detector in a unidirectional telecommunication way behind the network node; the network signal detector is used for collecting broadcast television network data and transmitting the broadcast television network data to the distributed computing unit; the distributed computing unit is used for carrying out classification decryption and data interception on the broadcast television network data and carrying out intrusion detection on the classified and decrypted data in the extension system; the branch system collects host parameters and operates the intrusion detection module according to the collected host parameters, the genetic algorithm module outputs configuration available parameters according to the operation result of the intrusion detection module, and the parameter configuration module generates a data stream according to the configuration available parameters output by the genetic algorithm module, wherein the data stream is used for reconfiguring the distributed computing unit; and the distributed computing unit transmits the safety data after the intrusion detection of the extension system to the host system.
Preferably, the network node may be a broadcast television signal receiving host, configured to receive broadcast television signals of various large platforms or applications and convert the broadcast television signals into broadcast television data for transmission and processing.
Preferably, the network signal detector further records and detects broadcast television data of the broadcast television signal receiving host, and identifies the validity of the signal.
Preferably, the extension system comprises a parameter configuration module, a genetic algorithm module and an intrusion detection module; the intrusion detection module is connected with the distributed computing module and used for receiving the broadcast television data transmitted by the distributed computing module, and the intrusion detection module can also receive host parameters transmitted by the host system but does not exchange the broadcast television data with the host system. The intrusion detection module further comprises a honeypot network and sandbox isolation module for carrying out intrusion detection on the television broadcast data and feeding back an intrusion detection result to the genetic algorithm module, and the genetic algorithm module determines whether to reconfigure the distributed computing unit according to the intrusion detection result. If the intrusion detection unit does not find the security threat, the data is fed back to the distributed computing unit, the distributed computing unit transmits the security data to the host system, if the intrusion detection unit finds the data security threat, the distributed computing unit stores the data in an isolated mode and reports the data to the host system, meanwhile, the genetic algorithm module configures the security threat data characteristics to the parameter configuration module to reconfigure the distributed computing unit, and therefore the distributed computing unit screens out the data with the security threat.
Preferably, the host parameters at least include parameters such as operating system audit trail information and system logs, cloud firewall intrusion detection lists, application event logs and other data stored inside the application.
Preferably, the distributed computing unit is implemented by a programmable logic device such as an FPGA, and the parameter configuration module is configured to simulate a configuration timing sequence of the FPGA to configure the FPGA, and the FPGA device is configured in a passive serial manner.
Preferably, the extension system can be implemented by a server or a computer, the genetic algorithm module runs on the extension system, and the genetic algorithm module further can run a trend-oriented compact genetic algorithm to output the characteristics of the network security data into the characteristic data which can be identified and detected.
The invention also discloses a monitoring method for the data security of the broadcast television, which can complete the security monitoring of the broadcast television data by combining the device, and the monitoring method comprises the following steps:
acquiring broadcast television network data from a network node by using a network signal detector, and transmitting the broadcast television network data to a distributed computing unit for processing;
step two, the distributed computing unit carries out classification decryption and data interception on the broadcast television network data;
step three, the distributed computing unit sends the classified and decrypted data to an extension system for intrusion detection, and the intrusion detection operates a honeypot network or sandbox isolation according to host parameters fed back by a host system;
step four, the extension system determines whether to intercept the broadcast television network data in the distributed computing unit according to the intrusion detection result, and if the interception is not needed, the distributed computing unit transmits the broadcast television network data to the host system; if the interception is needed, the broadcast television network data is isolated and stored or deleted and then notified to the host system, meanwhile, the characteristic data of the broadcast television network data with threat is extracted through a genetic algorithm module, and the characteristic data is generated into a data stream reconfiguration distributed computing unit through a parameter configuration module so as to update the intercepted object data.
Preferably, the intrusion detection result is a result obtained by combining an intrusion detection module and a genetic algorithm module, that is, the intrusion detection module outputs the detection result of the broadcast television network data to the genetic algorithm module, the genetic algorithm module compares the fitness value of the detection result with the fitness values of the previous generations according to the safety probability variable value of the detection result, the probability variable value of the previous generations is updated by the bit string obtained by the individual with the highest fitness value until the probability variable values corresponding to all bits of all generations converge to 0 or 1, and if the fitness value converges to 0, the detection result is regarded as no threat to the broadcast television network; and if the intrusion detection result is converged to 1, the detection result is regarded as threatening the broadcast television network, and the characteristic data of the broadcast television network data related to the intrusion detection result is generated into a data stream through a parameter configuration module to reconfigure a distributed computing unit so as to update the interception object data.
Preferably, the network signal detector detects and records broadcast television data of a broadcast television signal receiving host, and identifies the validity of the signal.
Preferably, the classified decryption includes decryption operations of decoding and safely encrypting video data in different formats, mainly hardware decoding; the data interception includes performing isolation and deletion operations on broadcast television network data of a particular format or characteristic.
Preferably, the extension system only reads host parameters from the host system and cannot transmit data to the host system, and the host parameters include parameters such as operating system audit trail information and system logs, cloud firewall intrusion detection lists, application event logs and other data stored in the application.
Compared with the prior art, the invention has the following beneficial effects:
the invention changes the structure of the system according to the change of the network data of the broadcast television by arranging the distributed computing unit and the extension system so as to adapt to the environment of network data security, can realize the self online reconstruction of hardware and enhance the security performance of the hardware during the operation. The invention uses genetic algorithm to screen the safety of the broadcast television network data, and carries out dynamic self-adaptive evaluation on the broadcast television network data according to the characteristics of the broadcast television network data to determine whether to report the broadcast television network data to realize isolation.
Drawings
FIG. 1 is a schematic diagram of a monitoring system for broadcast television data security;
FIG. 2 is a diagram of steps of a method for monitoring broadcast television data security;
FIG. 3 is a diagram of trend-based compact genetic algorithm implementation steps;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a monitoring system for data security of broadcast television includes a network node 1, a network signal detector 2, a distributed computing unit 3, an extension system 4 and a host system 5; the network node 1 is used for receiving broadcast television network data, and is connected with a network signal detector 2 in a unidirectional telecommunication way behind the network node 1; the network signal detector 2 is used for collecting broadcast television network data and transmitting the broadcast television network data to the distributed computing unit 3; the distributed computing unit 3 is used for classifying and decrypting the broadcast television network data and intercepting the data, and carrying out intrusion detection on the classified and decrypted data in the extension system 4; the extension system 4 collects host parameters and operates the intrusion detection module 4-3 according to the collected host parameters, the genetic algorithm module 4-2 outputs configuration available parameters according to the operation result of the intrusion detection module 4-3, the parameter configuration module 4-1 generates a data stream according to the configuration available parameters output by the genetic algorithm module 4-2, and the data stream is used for reconfiguring the distributed computing unit 3; the distributed computing unit 3 transmits the security data after intrusion detection of the extension system 4 to the host system 5.
The network node 1 may be a broadcast television signal receiving host, and is configured to receive broadcast television signals of various large platforms or applications and convert the broadcast television signals into broadcast television data for transmission and processing.
The network signal detector 2 also records and detects the broadcast television data of the broadcast television signal receiving host, and identifies the validity of the signal.
The distributed computing unit 3 can receive the broadcast television network data sent by the network signal detectors 2 in parallel, and can also be connected with a plurality of extension sets to realize multi-path parallel data processing.
The distributed computing unit 3 processes different broadcast television data separately when connected to a plurality of extension sets, and each of the plurality of extension sets 4 is connected to the host system 5.
The extension system 4 comprises a parameter configuration module 4-1, a genetic algorithm module 4-2 and an intrusion detection module 4-3; the intrusion detection module 4-3 is connected with the distributed computing module and used for receiving the broadcast television data transmitted by the distributed computing module, and the intrusion detection module 4-3 can also receive the host parameters transmitted by the host system 5, but does not exchange the broadcast television data with the host system 5. The intrusion detection module 4-3 further comprises a honeypot network and sandbox isolation module for intrusion detection of the television broadcast data and feeding back the intrusion detection result to the genetic algorithm module 4-2, and the genetic algorithm module 4-2 determines whether to reconfigure the distributed computing unit 3 according to the intrusion detection result. If the intrusion detection unit does not find the security threat, the data is fed back to the distributed computing unit 3, the distributed computing unit 3 transmits the security data to the host system 5, if the intrusion detection unit finds the data security threat, the distributed computing unit 3 stores the data in an isolated mode and reports the data to the host system 5, meanwhile, the genetic algorithm module 4-2 configures the security threat data characteristics to the parameter configuration module 4-1 to reconfigure the distributed computing unit 3, so that the distributed computing unit 3 screens out the data with the security threat.
The host parameters at least comprise parameters such as operating system audit trail information and system logs, cloud firewall intrusion detection lists, application program event logs and other data stored in the application program.
The distributed computing unit 3 is realized by adopting a programmable logic device such as an FPGA (field programmable gate array), the parameter configuration module 4-1 is used for simulating the configuration time sequence of the FPGA to configure the FPGA, and the FPGA device is configured in a passive serial mode.
The extension system 4 can be implemented by a server or a computer, the genetic algorithm module 4-2 is operated on the extension system 4, and the genetic algorithm module 4-2 can further operate a trend-oriented compact genetic algorithm to output the characteristics of the network security data as characteristic data which can be identified and detected.
By arranging the distributed computing unit 3 and the extension system 4, the self structure is changed according to the change of the broadcast television network data so as to adapt to the environment of network data security, the hardware can be reconstructed on line, and the security performance of the hardware is enhanced during operation.
The invention also discloses a monitoring method for the data security of the broadcast television, which can complete the security monitoring of the broadcast television data by combining the device, and the monitoring method comprises the following steps with reference to the attached figure 2:
step one, a network signal detector 2 is used for collecting broadcast television network data from a network node 1 and transmitting the broadcast television network data to a distributed computing unit 3 for processing;
step two, the distributed computing unit 3 performs classified decryption and data interception on the broadcast television network data;
step three, the distributed computing unit 3 sends the classified and decrypted data to the extension system 4 for intrusion detection, and the intrusion detection operates a honeypot network or sandbox isolation according to host parameters fed back by the host system 5;
step four, the extension system 4 determines whether to intercept the broadcast television network data in the distributed computing unit 3 according to the intrusion detection result, and if the interception is not needed, the distributed computing unit 3 transmits the broadcast television network data to the host system 5; if the interception is needed, the broadcast television network data is isolated and stored or deleted and then notified to the host system 5, meanwhile, the characteristic data of the broadcast television network data with threat is extracted through the genetic algorithm module 4-2, and the characteristic data is generated through the parameter configuration module 4-1 to reconfigure the distributed computing unit 3 to update the intercepted object data.
Referring to fig. 3, the intrusion detection result in the fourth step is a result obtained by combining the intrusion detection module 4-3 and the genetic algorithm module 4-2, and specifically includes the following steps: step one, comparing fitness values, namely, the intrusion detection module 4-3 outputs the detection result of the output broadcast television network data to the genetic algorithm module 4-2, and the genetic algorithm module 4-2 takes the safety probability variable value of the detection result as the fitness value of the detection result and compares the fitness value with the fitness values of a plurality of previous generations; secondly, updating the probability variable values of a plurality of previous generations by the bit string obtained by the individual with the highest fitness value; thirdly, probability convergence, and carrying out fitness value comparison again until the probability variable values corresponding to all bits of all generations are converged to 0 or 1; step four, executing a convergence result, and if the convergence result is 0, determining that the detection result is regarded as no threat to the broadcast television network; if the intrusion detection result is converged to 1, the detection result is regarded as threatening the broadcast television network, and the characteristic data of the broadcast television network data related to the intrusion detection result is generated by the parameter configuration module 4-1 to reconfigure the distributed computing unit 3 so as to update the interception object data.
The network signal detector 2 detects and records broadcast television data of a broadcast television signal receiving host, and discriminates the legitimacy of the signal.
The classified decryption comprises decryption operations of decoding and safely encrypting video data in different formats, and mainly comprises hardware decoding; the data interception includes performing isolation and deletion operations on broadcast television network data of a particular format or characteristic.
The extension system 4 only reads host parameters from the host system 5, and cannot transmit data to the host system 5, where the host parameters include parameters such as operating system audit trail information and system logs, cloud firewall intrusion detection lists, application event logs, and other data stored inside the application.
The distributed computing unit 3 can be connected with a plurality of network signal detectors 2 and a plurality of extension systems 4 to process the broadcast television network data in parallel, and only one parameter configuration module 4-1 in the plurality of extension systems 4 can receive the characteristic parameters of the broadcast television network data extracted by the plurality of genetic algorithm modules 4-2.
The genetic algorithm is applied to screening of the broadcast television network data safety, and dynamic adaptive evaluation is carried out on the broadcast television network data according to the characteristics of the broadcast television network data so as to determine whether the broadcast television network data is reported to realize isolation.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. A monitoring system for data security of broadcast television is characterized in that: the system comprises a network node, a network signal detector, a distributed computing unit, an extension system and a host system; the network node is used for receiving the broadcast television network data and is connected with the network signal detector in a unidirectional telecommunication way behind the network node; the network signal detector is used for collecting broadcast television network data and transmitting the broadcast television network data to the distributed computing unit; the distributed computing unit is used for carrying out classification decryption and data interception on the broadcast television network data and carrying out intrusion detection on the classified and decrypted data in the extension system; the branch system collects host parameters and operates the intrusion detection module according to the collected host parameters, the genetic algorithm module outputs configuration available parameters according to the operation result of the intrusion detection module, and the parameter configuration module generates a data stream according to the configuration available parameters output by the genetic algorithm module, wherein the data stream is used for reconfiguring the distributed computing unit; the distributed computing unit transmits the safety data after intrusion detection of the extension system to the host system;
the extension system comprises a parameter configuration module, a genetic algorithm module and an intrusion detection module; the intrusion detection module is connected with the distributed computing module and used for receiving the broadcast television data transmitted by the distributed computing module, and the intrusion detection module can also receive host parameters transmitted by the host system but does not exchange the broadcast television data with the host system; the intrusion detection module also comprises a honeypot network and a sandbox isolation module for carrying out intrusion detection on the television broadcast data and feeding back an intrusion detection result to the genetic algorithm module, and the genetic algorithm module determines whether to reconfigure the distributed computing unit according to the intrusion detection result; if the intrusion detection unit does not find the security threat, the data is fed back to the distributed computing unit, the distributed computing unit transmits the security data to the host system, if the intrusion detection unit finds the data security threat, the distributed computing unit stores the data in an isolated mode and reports the data to the host system, meanwhile, the genetic algorithm module configures the security threat data characteristics to the parameter configuration module to reconfigure the distributed computing unit, and therefore the distributed computing unit screens out the data with the security threat.
2. The system for monitoring the data security of the broadcast television as claimed in claim 1, wherein: the network signal detector also records and detects the broadcast television data of the broadcast television signal receiving host and identifies the legality of the signal.
3. The system for monitoring the data security of the broadcast television as claimed in claim 1, wherein: the distributed computing unit is implemented by a programmable logic device.
4. A system for monitoring the security of broadcast television data according to any one of claims 1 to 3, wherein: the genetic algorithm module is a trend-type compact genetic algorithm.
5. A method for implementing a monitoring system for broadcast television data security according to any one of claims 1 to 4, wherein the monitoring method comprises the following steps:
acquiring broadcast television network data from a network node by using a network signal detector, and transmitting the broadcast television network data to a distributed computing unit for processing;
step two, the distributed computing unit carries out classification decryption and data interception on the broadcast television network data;
step three, the distributed computing unit sends the classified and decrypted data to an extension system for intrusion detection, and the intrusion detection operates a honeypot network or sandbox isolation according to host parameters fed back by a host system;
step four, the extension system determines whether to intercept the broadcast television network data in the distributed computing unit according to the intrusion detection result, and if the interception is not needed, the distributed computing unit transmits the broadcast television network data to the host system; if the interception is needed, the broadcast television network data is isolated and stored or deleted and then notified to the host system, meanwhile, the characteristic data of the broadcast television network data with threat is extracted through a genetic algorithm module, and the characteristic data is generated into a data stream reconfiguration distributed computing unit through a parameter configuration module so as to update the intercepted object data.
6. The implementation method of claim 5, wherein: the intrusion detection result is a result obtained by combining an intrusion detection module and a genetic algorithm module, namely the intrusion detection module outputs the detection result of the broadcast television network data to the genetic algorithm module, the genetic algorithm module takes the safety probability variable value of the detection result as the fitness value of the detection result and compares the fitness value with the fitness values of a plurality of previous generations, the probability variable value of the plurality of previous generations is updated by the bit string obtained by the individual with the highest fitness value until the probability variable values corresponding to all bits of all generations converge to 0 or 1, and if the probability variable value converges to 0, the detection result is regarded as no threat to the broadcast television network; and if the intrusion detection result is converged to 1, the detection result is regarded as threatening the broadcast television network, and the characteristic data of the broadcast television network data related to the intrusion detection result is generated into a data stream through a parameter configuration module to reconfigure a distributed computing unit so as to update the interception object data.
7. The implementation method of claim 6, wherein: the classified decryption comprises decryption operations of decoding and safely encrypting video data in different formats; the data interception includes performing isolation and deletion operations on broadcast television network data of a particular format or characteristic.
CN202010172262.1A 2020-03-12 2020-03-12 System and method for monitoring data security of broadcast television Active CN111294618B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010172262.1A CN111294618B (en) 2020-03-12 2020-03-12 System and method for monitoring data security of broadcast television

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010172262.1A CN111294618B (en) 2020-03-12 2020-03-12 System and method for monitoring data security of broadcast television

Publications (2)

Publication Number Publication Date
CN111294618A CN111294618A (en) 2020-06-16
CN111294618B true CN111294618B (en) 2022-04-01

Family

ID=71029617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010172262.1A Active CN111294618B (en) 2020-03-12 2020-03-12 System and method for monitoring data security of broadcast television

Country Status (1)

Country Link
CN (1) CN111294618B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217377A (en) * 2008-01-18 2008-07-09 南京邮电大学 A detecting method of distributed denial of service attacking based on improved sequence scale regulation
EP3038323A1 (en) * 2014-12-26 2016-06-29 Mattias Bergstorm Method and system for adaptive virtual broadcasting of digital content
CN107979606A (en) * 2017-12-08 2018-05-01 电子科技大学 It is a kind of that there is adaptive distributed intelligence decision-making technique

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004040272A (en) * 2002-07-01 2004-02-05 Cosmo:Kk Network camera, remote monitor / control system, and control method employing the same
CN100393046C (en) * 2005-12-06 2008-06-04 南京邮电大学 Analogue biological immunological mechanism invasion detecting method
CN102137297B (en) * 2010-11-30 2013-04-24 广东星海数字家庭产业技术研究院有限公司 Data detection method based on digital set top box
WO2015138513A1 (en) * 2014-03-11 2015-09-17 Vectra Networks, Inc. Detecting network intrusions using layered host scoring
CN106411469B (en) * 2016-09-29 2020-08-07 合肥工业大学 Multicast resource allocation and transmission method based on scalable video in multi-base-station heterogeneous network
CN106899435B (en) * 2017-02-21 2019-10-29 浙江大学城市学院 A kind of complex attack recognition methods towards wireless invasive detection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217377A (en) * 2008-01-18 2008-07-09 南京邮电大学 A detecting method of distributed denial of service attacking based on improved sequence scale regulation
EP3038323A1 (en) * 2014-12-26 2016-06-29 Mattias Bergstorm Method and system for adaptive virtual broadcasting of digital content
CN107979606A (en) * 2017-12-08 2018-05-01 电子科技大学 It is a kind of that there is adaptive distributed intelligence decision-making technique

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《基于神经网络的入侵检测相关技术研究》;谢康;《中国优秀硕士学位论文全文数据库》;20160425;全文 *
智能入侵检测系统在网络中的应用;曾垂刚;《电子制作》;20130315(第05期);全文 *

Also Published As

Publication number Publication date
CN111294618A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
Karatas et al. Deep learning in intrusion detection systems
US11902322B2 (en) Method, apparatus, and system to map network reachability
US20240064168A1 (en) Incorporating software-as-a-service data into a cyber threat defense system
US11038906B1 (en) Network threat validation and monitoring
CN107683597B (en) Network behavior data collection and analysis for anomaly detection
CN107135093B (en) Internet of things intrusion detection method and detection system based on finite automaton
EP4154143A1 (en) Cyber security for instant messaging across platforms
WO2017139489A1 (en) Automated honeypot provisioning system
CN108632269B (en) Distributed denial of service attack detection method based on C4.5 decision tree algorithm
Brahmi et al. Towards a multiagent-based distributed intrusion detection system using data mining approaches
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
Rasool et al. CyberPulse++: A machine learning‐based security framework for detecting link flooding attacks in software defined networks
Sudharsan et al. Edge2guard: Botnet attacks detecting offline models for resource-constrained iot devices
Janabi et al. Convolutional neural network based algorithm for early warning proactive system security in software defined networks
Gebremeskel et al. DDoS attack detection and classification using hybrid model for multicontroller SDN
CN111294618B (en) System and method for monitoring data security of broadcast television
Nguyen et al. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper)
Waagsnes SCADA intrusion detection system test framework
CN111404926B (en) Credible film and television big data platform analysis system and method
Ikhwan et al. Intrusion detection using deep neural network algorithm on the internet of things
KR20200014139A (en) The method of defense against distributed denial-of-service attack on the heterogeneous iot network and the system thereof
Singh et al. Mitigation of Cyber Attacks in SDN-Based IoT Systems Using Machine Learning Techniques
CN115225301A (en) D-S evidence theory-based hybrid intrusion detection method and system
Numan et al. Detection and mitigation of ARP storm attacks using software defined networks
CN110278075B (en) System and method for coordinating security across multi-layer networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221223

Address after: No. 1703-18, building a, Zhengshang navigation Plaza, Haihang road and Lianyun Road, Erqi District, Zhengzhou City, Henan Province, 450000

Patentee after: HENAN XUNMEI VISUAL CULTURE COMMUNICATION CO.,LTD.

Address before: 450000 No.12, building 17, Jianxin East Street, Erqi District, Zhengzhou City, Henan Province

Patentee before: Zhou Guangpu

TR01 Transfer of patent right