CN111581642A - Internet safety protection system - Google Patents
Internet safety protection system Download PDFInfo
- Publication number
- CN111581642A CN111581642A CN202010369492.7A CN202010369492A CN111581642A CN 111581642 A CN111581642 A CN 111581642A CN 202010369492 A CN202010369492 A CN 202010369492A CN 111581642 A CN111581642 A CN 111581642A
- Authority
- CN
- China
- Prior art keywords
- data
- communication
- internet
- protection
- inlet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 77
- 241000700605 Viruses Species 0.000 claims abstract description 37
- 238000012545 processing Methods 0.000 claims abstract description 36
- 238000000605 extraction Methods 0.000 claims abstract description 13
- 230000002265 prevention Effects 0.000 claims abstract description 13
- 238000005516 engineering process Methods 0.000 claims description 27
- 238000011156 evaluation Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 6
- 239000011159 matrix material Substances 0.000 claims description 6
- 238000000034 method Methods 0.000 claims description 5
- 238000012935 Averaging Methods 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000013075 data extraction Methods 0.000 claims description 3
- 238000010606 normalization Methods 0.000 claims description 3
- 238000007781 pre-processing Methods 0.000 claims description 3
- 238000003672 processing method Methods 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 239000000243 solution Substances 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an internet safety protection system which comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way mode, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, and the data access protection end comprises a firewall, an intrusion prevention system and a web application protection. The invention realizes the comprehensive security protection of the Internet, prevents the propagation of viruses, trojans or malicious attack software accompanied by file uploading or downloading, ensures the security of the Internet, and is suitable for the security protection of the Internet under big data.
Description
Technical Field
The invention relates to the field of internet security, in particular to an internet security protection system.
Background
With the continuous development of the internet, the internet has come into various fields in people's lives and works, but the network has a great deal of development in terms of security and reliability.
Along with the development of the internet, various computer viruses, trojans, network attacks and other problems exist, the viruses and the trojans are easy to spread through the internet, and particularly when people upload, download or browse websites, along with the development of big data, the protection of network security does not only need to fight with the internet individually, but also is more suitable for jointly maintaining the security of the internet under the big data of the internet, so that the internet security protection system is provided.
Disclosure of Invention
The present invention is directed to an internet security system, which solves the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an internet safety protection system comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way manner, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, the internet is connected with the data processing, the outlet end of the internet is connected with the inlet end of the virus updating device, the data processing data protection end is connected with the inlet end of the information extraction device and the uploading device, and the data processing inlet, the system comprises an information extraction device, a data comparison device, a virus database, a processor, a feedback circuit, a virus updating device, a management port, a data access protection port and a data access protection port, wherein the information extraction device is connected with the information extraction device, the data comparison device is connected with the data access protection port, the data comparison device is connected with the feedback circuit, the virus database, the virus updating device and the data access protection port, the processor is connected with the data access protection port, the data access protection port is connected with the data access protection port, and the data access protection port is connected with.
As a further scheme of the invention: the data access protection end comprises a firewall, an intrusion prevention system and a web application protection system, and the outlet end of the firewall is connected with the inlet end of the intrusion prevention system.
As a still further scheme of the invention: the entrance end of the firewall is connected with the exit end of the network end.
As a still further scheme of the invention: the exit end of the web application protection system is connected with the entrance end of the local area network.
As a still further scheme of the invention: the management port is bidirectionally connected with a power supply.
As a still further scheme of the invention: the processor is connected with the communication module in a bidirectional mode.
As a still further scheme of the invention: the processor is connected with the management port in a bidirectional mode.
As a still further scheme of the invention: the management port is connected with the communication module in a two-way mode, the communication module is in a wireless communication mode, and the communication module further comprises a wireless communication receiver at the management port.
As a still further scheme of the invention: and the outlet end of the firewall is connected with the inlet end of the intrusion prevention system.
As a still further scheme of the invention: and the outlet end of the intrusion prevention system is connected with the inlet end of the web application protection system.
In order to achieve the above purpose, the invention also provides the following technical scheme:
a method for evaluating communication quality includes the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value range of ξ is between 0.3 and 0.4, and (5) the correlation degree is calculated by the following calculation formula:wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result. Compared with the prior art, the invention has the beneficial effects that: the system is suitable for internet security protection under big data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic diagram of an Internet security system;
fig. 2 is a schematic structural diagram of a data protection terminal in an internet security protection system;
FIG. 3 is a schematic flow chart of a method for evaluating data communication quality in an Internet security protection system;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-2, in an embodiment of the present invention, an internet security protection system includes a network end, a data access protection end, and a local area network end, where an outlet of the network end is connected to an inlet of the data access protection end, an outlet of the data access protection end is connected to an inlet of the local area network end, the network end is connected to the local area network end in a bidirectional manner, the local area network end includes an uploading device, a downloading device, a processor, a management port, a power supply, and a communication module, the network end includes a data protection end, an internet, a data processing device, a virus updating device, and a virus database, the data protection end includes an information extraction device, a data comparison device, and a feedback circuit, the internet is connected to the data processing device in a bidirectional manner, and the internet outlet end includes a virus updating device, the data processing device is used for processing data processing, the data protection end is used for carrying out security monitoring on data processed in data processing, the data processing is bidirectionally connected with the data protection end, the data processing outlet end is connected with the inlet end of the information extraction device and the inlet end of the uploading device, the data processing inlet end is connected with the outlet end of the feedback circuit and the outlet end of the downloading device, the information extraction device is used for extracting information uploaded or downloaded in the data processing, the outlet end of the information extraction device is connected with the inlet end of the data comparison device, the inlet end of the data comparison device is connected with the outlet end of the virus database, the outlet end of the data comparison device is connected with the inlet end of the feedback circuit and the inlet end of the virus database, the data comparison device compares the data information uploaded or downloaded in the information extraction device with the virus data in the virus database and transmits the security of the uploaded or downloaded data to the feedback circuit, processing data, if the data has potential safety hazards such as viruses or trojans, the data processing stores the viruses and the trojans of uploaded or downloaded data into a virus database through a data comparison device, the inlet end of the virus database is connected with the outlet end of a virus updating device, the virus updating outlet end of the virus database is connected with the outlet end of the internet, so that the information of the virus database is updated in real time, the safety of the uploaded or downloaded data is improved, the inlet end of a processor is connected with the outlet end of a downloading device, the outlet end of a feedback circuit, the inlet end of a management port and the outlet end of a data access protection end, the processor transmits the data which needs to be uploaded or downloaded by the management port to the uploading device or the downloading device, receives the safety information of the uploaded or downloaded data transmitted by the feedback circuit, the processor transmits the safety information of the data to the management port, and the management port performs secondary operation selection on the uploaded, the utility model discloses a wireless communication system, including treater exit end connection management port entrance point and communication module entrance point, treater both way junction communication module, management port both way junction communication module, communication module is the wireless communication mode, and communication module still includes the wireless communication receiver of management port department, manages the port both way junction power, and whether the management port can select to think immediately to close the power according to the condition, stops data transmission, prevents the invasion of virus or Trojan.
Example 2
Referring to fig. 1, in an embodiment of the present invention, based on embodiment 1, the data access protection end includes a firewall, an intrusion prevention system, and a web application protection system, where an inlet end of the firewall is connected to an outlet end of a network end, an outlet end of the firewall is connected to an inlet end of the intrusion prevention system, an outlet end of the intrusion prevention system is connected to an inlet end of the web application protection system, an outlet end of the web application protection system is connected to an inlet end of a local network end, the firewall is used for scanning a port, and simultaneously prevents a disguised virus or a trojan horse from entering the local network system to perform real-time access protection, the intrusion prevention system is used for blocking a fixed-feature attack, and the web application protection system is used for controlling blocking parameter tampering, cross-site scripting, SQL injection, and Cookie.
Example 3
In order to achieve the above object, on the basis of the embodiments 1-2, the present invention further provides the following technical solutions:
a method for evaluating communication quality includes the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value of ξ is expressed as a resolution coefficient, and the value range is between 0.3 and 0.4;
(5) and calculating the correlation degree, wherein the calculation formula is as follows:wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result. It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (10)
1. An internet safety protection system comprises a network end, a data access protection end and a local area network end, wherein the outlet end of the network end is connected with the inlet of the data access protection end, the outlet end of the data access protection end is connected with the inlet end of the local area network end, the network end is connected with the local area network end in a two-way manner, the local area network end comprises an uploading device, a downloading device, a processor, a management port, a power supply and a communication module, the network end comprises a data protection end, the internet, a data processing device, a virus updating device and a virus database, the data protection end comprises an information extraction device, a data comparison device and a feedback circuit, the internet is connected with the data processing device in a two-way manner, the outlet end of the internet is connected with the inlet end of the virus updating device, the data processing device is connected with the data protection, the data processing inlet end is connected with a feedback circuit outlet end and a downloading device outlet end, the information extraction device outlet end is connected with a data comparison device inlet end, the data comparison device inlet end is connected with a virus database outlet end, the data comparison device outlet end is connected with a feedback circuit inlet end and a virus database inlet end, the virus database inlet end is connected with a virus updating device outlet end, the virus updating inlet end is connected with an internet outlet end, and the processor inlet end is connected with a downloading device outlet end, a feedback circuit outlet end, a management port inlet end and a data access protection end outlet end.
2. The internet security protection system of claim 1, wherein the data access protection end comprises a firewall, an intrusion prevention system and a web application protection system, and an exit end of the firewall is connected with an entrance end of the intrusion prevention system.
3. The internet security system of claim 2, wherein the ingress port of the firewall is connected to the egress port of the network.
4. The internet security system of claim 2, wherein the web application protection system egress port is connected to the local area network ingress port.
5. The internet security system of claim 1, wherein the management port is bi-directionally coupled to the power source.
6. The internet security system of claim 1, wherein the processor is bi-directionally coupled to the communication module.
7. The internet security system of claim 1, wherein the processor is bi-directionally coupled to the management port.
8. The internet security system of claim 1, wherein the management port is bi-directionally coupled to the communication module, the communication module is a wireless communication module, and the communication module further comprises a wireless communication receiver at the management port.
9. The internet security system of claim 2, wherein the firewall outlet is connected to an intrusion prevention system inlet, and the intrusion prevention system outlet is connected to a web application protection system inlet.
10. An assessment method for communication quality implemented by using the internet security protection system of any one of claims 1 to 9, wherein the assessment method for communication quality comprises the following steps:
(1) communication data extraction, namely extracting communication data sample information from a database which is communicated by an internet security protection system; the technology type of communication in the Internet safety protection system is m, wherein m is more than or equal to 10, i is the serial number of the adopted communication technology, in the communication system, the interference factor of communication is n, n is more than or equal to 10, and k is the serial number of the evaluation communication technology; k is more than or equal to 10, then an evaluation index is constructed, and the type of the communication data is represented by a data set, so that the following steps are provided:
X1=(x11,x12,...,x1n);
X2=(x21,x22,...,x2n);
Xn=(xm1,xm2,...,xmn);
then, the original data communication set is constructed into an original evaluation matrix, which includes:
(2) data processing: preprocessing the obtained original data, and firstly, carrying out denoising treatment, wherein the processing method is any one of initial value processing, averaging processing, interval value processing or normalization processing; the processed matrix is formulated as:
(3) determining a communication technology sequence with optimal quality; selecting an optimal value for each communication technology among a plurality of communication technologies, and formulating as follows: x0=Optimum(xik),i∈θ1,k∈θ2Wherein i ∈ theta1={1,2,...,m},k∈θ2={1,2,...,n},
The best evaluated sequence was constructed as:
X0=(x01,x02,...,x0n);
(4) calculating a correlation coefficient, wherein the calculation formula of the correlation coefficient is as follows:
wherein ΔmaxIs | Xi-X0Maximum of |, ΔminIs | Xi-X0The minimum value of l; deltaoi(k)=|X'ik-X'0kThe value of ξ is expressed as a resolution coefficient, and the value range is between 0.3 and 0.4;
(5) and calculating the correlation degree, wherein the calculation formula is as follows:wherein gamma isoiThe greater the value of (A), the communication technology X is evaluatediAnd optimal communication technology X0The better the correlation, the better the communication technology performance;
(6) and outputting a communication quality analysis result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010369492.7A CN111581642A (en) | 2020-05-03 | 2020-05-03 | Internet safety protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010369492.7A CN111581642A (en) | 2020-05-03 | 2020-05-03 | Internet safety protection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111581642A true CN111581642A (en) | 2020-08-25 |
Family
ID=72111929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010369492.7A Pending CN111581642A (en) | 2020-05-03 | 2020-05-03 | Internet safety protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111581642A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333205A (en) * | 2020-12-22 | 2021-02-05 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080091135A1 (en) * | 2006-10-17 | 2008-04-17 | Ruxandra Draghia-Akli | Electroporation devices and methods of using same for electroporation of cells in mammals |
CN105847291A (en) * | 2016-05-13 | 2016-08-10 | 内蒙古工业大学 | Computer network defense decision system |
CN105847296A (en) * | 2016-05-19 | 2016-08-10 | 拖洪华 | Network security isolation device |
CN205809871U (en) * | 2016-06-15 | 2016-12-14 | 衢州圣荣电子科技有限公司 | A kind of internet security guard system |
CN106899998A (en) * | 2017-03-16 | 2017-06-27 | 北京汇通金财信息科技有限公司 | A kind of network communication method and device |
CN108076030A (en) * | 2016-11-14 | 2018-05-25 | 北京视联动力国际信息技术有限公司 | A kind of visual scheduling system and method for regarding networking |
CN108647854A (en) * | 2018-04-04 | 2018-10-12 | 中国电力科学研究院有限公司 | A kind of method and system of determining electric transmission network running quality |
CN108701265A (en) * | 2016-03-14 | 2018-10-23 | 欧姆龙株式会社 | Learning Service provides device |
CN108809739A (en) * | 2018-08-30 | 2018-11-13 | 中山市厚源电子科技有限公司 | A kind of internet security guard system |
CN110912768A (en) * | 2019-11-01 | 2020-03-24 | 海南大学 | Grey correlation and fuzzy evaluation method and system for multi-path transmission network performance |
-
2020
- 2020-05-03 CN CN202010369492.7A patent/CN111581642A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080091135A1 (en) * | 2006-10-17 | 2008-04-17 | Ruxandra Draghia-Akli | Electroporation devices and methods of using same for electroporation of cells in mammals |
CN108701265A (en) * | 2016-03-14 | 2018-10-23 | 欧姆龙株式会社 | Learning Service provides device |
CN105847291A (en) * | 2016-05-13 | 2016-08-10 | 内蒙古工业大学 | Computer network defense decision system |
CN105847296A (en) * | 2016-05-19 | 2016-08-10 | 拖洪华 | Network security isolation device |
CN205809871U (en) * | 2016-06-15 | 2016-12-14 | 衢州圣荣电子科技有限公司 | A kind of internet security guard system |
CN108076030A (en) * | 2016-11-14 | 2018-05-25 | 北京视联动力国际信息技术有限公司 | A kind of visual scheduling system and method for regarding networking |
CN106899998A (en) * | 2017-03-16 | 2017-06-27 | 北京汇通金财信息科技有限公司 | A kind of network communication method and device |
CN108647854A (en) * | 2018-04-04 | 2018-10-12 | 中国电力科学研究院有限公司 | A kind of method and system of determining electric transmission network running quality |
CN108809739A (en) * | 2018-08-30 | 2018-11-13 | 中山市厚源电子科技有限公司 | A kind of internet security guard system |
CN110912768A (en) * | 2019-11-01 | 2020-03-24 | 海南大学 | Grey correlation and fuzzy evaluation method and system for multi-path transmission network performance |
Non-Patent Citations (1)
Title |
---|
周洋 等: "采用灰色关联分析法的舰艇超短波通信效能评估研究", 《舰船电子工程》, vol. 38, no. 01, 20 January 2018 (2018-01-20), pages 108 - 111 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333205A (en) * | 2020-12-22 | 2021-02-05 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
CN112333205B (en) * | 2020-12-22 | 2022-11-25 | 河北鸿联九五信息产业有限公司 | Network security monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210273957A1 (en) | Cyber security for software-as-a-service factoring risk | |
US20240064168A1 (en) | Incorporating software-as-a-service data into a cyber threat defense system | |
Kambar et al. | A survey on mobile malware detection methods using machine learning | |
US20210360027A1 (en) | Cyber Security for Instant Messaging Across Platforms | |
US20220225101A1 (en) | Ai cybersecurity system monitoring wireless data transmissions | |
US20230012220A1 (en) | Method for determining likely malicious behavior based on abnormal behavior pattern comparison | |
US10277614B2 (en) | Information processing apparatus, method for determining activity and computer-readable medium | |
Bortolameotti et al. | Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting | |
US11223648B2 (en) | Systems and methods for automatically selecting an access control entity to mitigate attack traffic | |
US20160366169A1 (en) | Systems, methods, and media for detecting network anomalies | |
CN106534114A (en) | Big-data-analysis-based anti-malicious attack system | |
KR101250899B1 (en) | Apparatus for detecting and preventing application layer distribute denial of service attack and method | |
Yamada et al. | Intrusion detection for encrypted web accesses | |
Lim et al. | Network anomaly detection system: The state of art of network behaviour analysis | |
Yao et al. | Multi-source alert data understanding for security semantic discovery based on rough set theory | |
CN111581642A (en) | Internet safety protection system | |
Saganowski et al. | DWT‐based anomaly detection method for cyber security of wireless sensor networks | |
Tatarnikova et al. | Botnet attack detection approach in IoT networks | |
US20210409276A1 (en) | Distinguishing network connection requests | |
US20230328081A1 (en) | System and methods for automatic detection of distributed attacks in iot devices using decentralized deep learning | |
Al-Shaher et al. | Protect healthcare system based on intelligent techniques | |
US12015622B2 (en) | Privacy-preserving online botnet classification system utilizing power footprint of IoT connected devices | |
Jiang et al. | Networked Device Identification: A Survey | |
CN115913721A (en) | HTTP malicious communication traffic detection method and system based on layered space-time characteristics | |
CN112437085B (en) | Network attack identification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 344100 group 2, Chengfang village, Dagang Town, Linchuan District, Fuzhou City, Jiangxi Province Applicant after: Fu Guilong Address before: 510275 Zhongshan University, 135 West Xingang Road, Guangdong, Guangzhou Applicant before: Fu Guilong |
|
CB02 | Change of applicant information |