CN111935070A - Data security exchange system and method based on automatic arrangement - Google Patents
Data security exchange system and method based on automatic arrangement Download PDFInfo
- Publication number
- CN111935070A CN111935070A CN202010558534.1A CN202010558534A CN111935070A CN 111935070 A CN111935070 A CN 111935070A CN 202010558534 A CN202010558534 A CN 202010558534A CN 111935070 A CN111935070 A CN 111935070A
- Authority
- CN
- China
- Prior art keywords
- parameters
- task
- protocol
- module
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000001514 detection method Methods 0.000 claims abstract description 29
- 238000000605 extraction Methods 0.000 claims abstract description 13
- 238000002347 injection Methods 0.000 claims description 6
- 239000007924 injection Substances 0.000 claims description 6
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 abstract description 6
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 231100000279 safety data Toxicity 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data security exchange system based on automatic arrangement, and the method based on the system is as follows: extracting input parameters from the service URL through a parameter extraction module and constructing the input parameters into parameters in a JSON format; extracting a protocol configuration table through a protocol configuration management module according to the parameters of the JSON format; building a script task table through a task control module according to the protocol configuration table and the parameters of the JSON format; transmitting the script task table to a task scheduling module and carrying out safety detection according to the script task table; and judging whether all the items in the safety detection pass, if so, allowing the intranet access request of the service URL, and otherwise, refusing the intranet access request of the service URL. The invention distinguishes the corresponding safe operation sequence of the next step according to the protocol of the data packet, so that 2 modules work in a coordinated mode in one system, and the operation and maintenance pressure of enterprise users is reduced.
Description
Technical Field
The invention belongs to the field of data exchange, and particularly relates to a data security exchange system and method based on automatic arrangement.
Background
In the actual application scene, the protocols are often mixed for use, which not only causes great trouble to the safe operation and maintenance, but also causes the system to have low efficiency and affects the data exchange performance.
Disclosure of Invention
Aiming at the defects in the prior art, the data security exchange system and method based on automatic arrangement provided by the invention solve the problems in the prior art.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a data security exchange system based on automatic arrangement comprises a task control module, a parameter extraction module, a protocol configuration management module and a task scheduling module, wherein the parameter extraction module, the protocol configuration management module and the task scheduling module are connected with the task control module;
the parameter extraction module is used for extracting input parameters in the service URL and constructing the input parameters into parameters in a JSON format; the task control module is used for forming a script task table according to protocol configuration and JSON format parameters; the protocol configuration management module is used for extracting configuration information corresponding to the protocol parameters according to the protocol parameters in the JSON format parameters; the database is used for pre-storing configuration information; and the task scheduling module is used for playing a script task table and carrying out security item detection.
The invention has the beneficial effects that: a system for exchanging data between networks with different security levels is provided, which ensures the security of high security network during data exchange.
A data security exchange method based on an automatically arranged data security exchange system comprises the following steps:
s1, extracting input parameters from the service URL through a parameter extraction module, constructing the input parameters into parameters in a JSON format, and transmitting the parameters in the JSON format to a task control module and a protocol configuration management module;
s2, extracting a protocol configuration table through a protocol configuration management module according to the parameters of the JSON format;
s3, constructing a script task table through a task control module according to the protocol configuration table and the parameters of the JSON format;
s4, transmitting the script task list to a task scheduling module and carrying out safety detection according to the script task list;
and S5, judging whether all items in the safety detection pass, if so, allowing the intranet access request of the service URL, and otherwise, rejecting the intranet access request of the service URL.
Further, the parameters input in step S1 include a protocol parameter protocol, a session value Token, a request parameter request, an SQL injection check parameter, an XML attack check parameter, and an attack type parameter.
Further, the step S2 specifically includes: and extracting protocol parameters from the input parameters, and acquiring a protocol configuration table corresponding to the protocol parameters from the database through a protocol configuration management module.
Further, the data format in the protocol configuration table is: { serial number, mode type, parameter Key }.
Further, the step S3 includes the following sub-steps:
s3.1, standardizing sub-modules used for safety detection in the task scheduling module to a module factory;
s3.2, extracting a safety subtask parameter from the JSON format parameter through a task control module according to the task parameter Key of each piece of data in the protocol configuration;
s3.3, constructing a calling function of the safety detection sub-module according to the task type corresponding to the safety sub-task parameter;
and S3.4, sequencing the calling functions according to the sequence relation of the serial numbers to obtain a script task table.
Further, the security detection in step S4 includes SQL injection detection, XML detection, Web attack detection, and token detection.
The invention has the beneficial effects that:
the safety data transmission method based on arrangement can distinguish the safety operation sequence corresponding to the next step according to the protocol of the data packet, so that 2 modules work in a coordinated mode in one system, safety operation and maintenance personnel only need to maintain one system, safety analysts only need to process one system, and operation and maintenance pressure of enterprise users is relieved.
Drawings
Fig. 1 is a block diagram of a data security exchange system based on automatic layout according to the present invention.
Fig. 2 is a flow chart of a data security exchange method based on an automatically arranged data security exchange system according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, a data security exchange system based on automatic arrangement includes a task control module, and a parameter extraction module, a protocol configuration management module and a task scheduling module connected to the task control module, where the protocol configuration management module is connected to the parameter extraction module and a database respectively;
the parameter extraction module is used for extracting input parameters in the service URL and constructing the input parameters into parameters in a JSON format; the task control module is used for forming a script task table according to protocol configuration and JSON format parameters; the protocol configuration management module is used for extracting configuration information corresponding to the protocol parameters according to the protocol parameters in the JSON format parameters; the database is used for pre-storing configuration information; and the task scheduling module is used for playing a script task table and carrying out security item detection.
The invention has the beneficial effects that: a system for exchanging data between networks with different security levels is provided, which ensures the security of high security network during data exchange.
As shown in fig. 2, a data security exchange method based on an automatically arranged data security exchange system includes:
s1, extracting input parameters from the service URL through a parameter extraction module, constructing the input parameters into parameters in a JSON format, and transmitting the parameters in the JSON format to a task control module and a protocol configuration management module;
s2, extracting a protocol configuration table through a protocol configuration management module according to the parameters of the JSON format;
s3, constructing a script task table through a task control module according to the protocol configuration table and the parameters of the JSON format;
s4, transmitting the script task list to a task scheduling module and carrying out safety detection according to the script task list;
and S5, judging whether all items in the safety detection pass, if so, allowing the intranet access request of the service URL, and otherwise, rejecting the intranet access request of the service URL.
The input parameters in the step S1 include protocol parameters protocol, session values Token, request parameters request, SQL injection check parameters, XML attack check parameters, and attack type parameters.
The step S2 is specifically: and extracting protocol parameters from the input parameters, and acquiring a protocol configuration table corresponding to the protocol parameters from the database through a protocol configuration management module.
The data format in the protocol configuration table is as follows: { serial number, mode type, parameter Key }.
The step S3 includes the following sub-steps:
s3.1, standardizing sub-modules used for safety detection in the task scheduling module to a module factory;
s3.2, extracting a safety subtask parameter from the JSON format parameter through a task control module according to the task parameter Key of each piece of data in the protocol configuration;
s3.3, constructing a calling function of the safety detection sub-module according to the task type corresponding to the safety sub-task parameter;
and S3.4, sequencing the calling functions according to the sequence relation of the serial numbers to obtain a script task table.
The security detection in step S4 includes SQL injection detection, XML detection, Web attack detection, and token detection.
In this embodiment, all modules for security inspection are normalized into task modules and put into a module factory; a module factory can construct a task module instance according to a module type (modetype of configuration information), and input parameters are extracted from input json parameters by using parameters key in a configuration information table; the task module constructs and finishes the sequential execution in the script task list. Each task module contains a run () function that returns a json string { result, info }.
And each safety detection has a corresponding safety detection submodule.
In this embodiment, the process of detecting the sql attack is as follows: adding a record { webservice, sqltype, sqlkey,2} to a database protocol table on a protocol configuration management interface, wherein the record represents that the webservice needs to detect an sql attack; wherein 2 represents the order of play of the tasks; the sqltype represents a task of an sqltype type when a script is used for constructing a task; the sqlkey is used for extracting task parameters, the webservice represents a protocol type, and all tasks of the same type are added into the script according to sequence numbers. And adding an sqltype task module and adding the sqltype task module into a task factory. Web url adds a sqlkey type parameter
The invention has the beneficial effects that:
the safety data transmission method based on arrangement can distinguish the safety operation sequence corresponding to the next step according to the protocol of the data packet, so that 2 modules work in a coordinated mode in one system, safety operation and maintenance personnel only need to maintain one system, safety analysts only need to process one system, and operation and maintenance pressure of enterprise users is relieved.
Claims (7)
1. A data security exchange system based on automatic arrangement is characterized by comprising a task control module, a parameter extraction module, a protocol configuration management module and a task scheduling module, wherein the parameter extraction module, the protocol configuration management module and the task scheduling module are connected with the task control module;
the parameter extraction module is used for extracting input parameters in the service URL and constructing the input parameters into parameters in a JSON format; the task control module is used for forming a script task table according to protocol configuration and JSON format parameters; the protocol configuration management module is used for extracting configuration information corresponding to the protocol parameters according to the protocol parameters in the JSON format parameters; the database is used for pre-storing configuration information; and the task scheduling module is used for playing a script task table and carrying out security item detection.
2. A data security exchange method based on the data security exchange system of claim 1, comprising:
s1, extracting input parameters from the service URL through a parameter extraction module, constructing the input parameters into parameters in a JSON format, and transmitting the parameters in the JSON format to a task control module and a protocol configuration management module;
s2, extracting a protocol configuration table through a protocol configuration management module according to the parameters of the JSON format;
s3, constructing a script task table through a task control module according to the protocol configuration table and the parameters of the JSON format;
s4, transmitting the script task list to a task scheduling module and carrying out safety detection according to the script task list;
and S5, judging whether all items in the safety detection pass, if so, allowing the intranet access request of the service URL, and otherwise, rejecting the intranet access request of the service URL.
3. The method for data security exchange based on automatic orchestration according to claim 2, wherein the input parameters in step S1 include protocol parameters protocol, session value Token, request parameter request, SQL injection check parameter, XML attack check parameter, and attack type parameter.
4. The method for data secure exchange based on automatic orchestration according to claim 3, wherein the step S2 specifically comprises: and extracting protocol parameters from the input parameters, and acquiring a protocol configuration table corresponding to the protocol parameters from the database through a protocol configuration management module.
5. The method for data security exchange based on automatic layout according to claim 4, wherein the data format in the protocol configuration table is: { serial number, mode type, parameter Key }.
6. The method for data secure exchange based on automatic orchestration according to claim 5, wherein the step S3 comprises the following sub-steps:
s3.1, standardizing sub-modules used for safety detection in the task scheduling module to a module factory;
s3.2, extracting a safety subtask parameter from the JSON format parameter through a task control module according to the task parameter Key of each piece of data in the protocol configuration;
s3.3, constructing a calling function of the safety detection sub-module according to the task type corresponding to the safety sub-task parameter;
and S3.4, sequencing the calling functions according to the sequence relation of the serial numbers to obtain a script task table.
7. The method for data security exchange based on automatic orchestration according to claim 6, wherein the security check in step S4 comprises SQL injection check, XML check, Web attack check, and token check.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010558534.1A CN111935070B (en) | 2020-06-18 | 2020-06-18 | Data security exchange system and method based on automatic arrangement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010558534.1A CN111935070B (en) | 2020-06-18 | 2020-06-18 | Data security exchange system and method based on automatic arrangement |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111935070A true CN111935070A (en) | 2020-11-13 |
CN111935070B CN111935070B (en) | 2023-04-11 |
Family
ID=73317843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010558534.1A Active CN111935070B (en) | 2020-06-18 | 2020-06-18 | Data security exchange system and method based on automatic arrangement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111935070B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581803A (en) * | 2004-05-20 | 2005-02-16 | 中国科学院软件研究所 | Safety platform for network data exchange |
CN102158482A (en) * | 2011-03-10 | 2011-08-17 | 易程(苏州)软件股份有限公司 | JSON (JavaScript Object Notation) data protocol based passenger transport information communication method and system |
CN103166933A (en) * | 2011-12-15 | 2013-06-19 | 北京天行网安信息技术有限责任公司 | System and method for data safe exchange |
WO2013092661A1 (en) * | 2011-12-22 | 2013-06-27 | Thibaud Arnault | Method, system and computer program product for providing composite web application |
CN104994122A (en) * | 2015-05-12 | 2015-10-21 | 深圳市微阳信息技术有限公司 | Business communication method and system based on JSON data protocol |
CN105553871A (en) * | 2015-12-15 | 2016-05-04 | 厦门贝启科技有限公司 | Method and system for remotely managing equipment parameters |
CN107566526A (en) * | 2017-10-13 | 2018-01-09 | 北京安控科技股份有限公司 | A kind of device based on Web configuration RTU parameters |
US20180232427A1 (en) * | 2017-02-13 | 2018-08-16 | Raytheon Company | Data structure endian conversion system |
CN109450730A (en) * | 2018-11-09 | 2019-03-08 | 中电科仪器仪表有限公司 | A kind of dynamic application layer protocol test method based on standard data interchange format |
CN109842583A (en) * | 2017-11-24 | 2019-06-04 | 航天信息股份有限公司 | A kind of invoice issuing method and system based on JSON data protocol |
CN111163074A (en) * | 2019-12-25 | 2020-05-15 | 腾讯云计算(北京)有限责任公司 | Gateway service control method and device |
-
2020
- 2020-06-18 CN CN202010558534.1A patent/CN111935070B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581803A (en) * | 2004-05-20 | 2005-02-16 | 中国科学院软件研究所 | Safety platform for network data exchange |
CN102158482A (en) * | 2011-03-10 | 2011-08-17 | 易程(苏州)软件股份有限公司 | JSON (JavaScript Object Notation) data protocol based passenger transport information communication method and system |
CN103166933A (en) * | 2011-12-15 | 2013-06-19 | 北京天行网安信息技术有限责任公司 | System and method for data safe exchange |
WO2013092661A1 (en) * | 2011-12-22 | 2013-06-27 | Thibaud Arnault | Method, system and computer program product for providing composite web application |
US20140344403A1 (en) * | 2011-12-22 | 2014-11-20 | Thibaud Arnault | Method, system and computer program product for providing composite web application |
CN104994122A (en) * | 2015-05-12 | 2015-10-21 | 深圳市微阳信息技术有限公司 | Business communication method and system based on JSON data protocol |
CN105553871A (en) * | 2015-12-15 | 2016-05-04 | 厦门贝启科技有限公司 | Method and system for remotely managing equipment parameters |
US20180232427A1 (en) * | 2017-02-13 | 2018-08-16 | Raytheon Company | Data structure endian conversion system |
CN107566526A (en) * | 2017-10-13 | 2018-01-09 | 北京安控科技股份有限公司 | A kind of device based on Web configuration RTU parameters |
CN109842583A (en) * | 2017-11-24 | 2019-06-04 | 航天信息股份有限公司 | A kind of invoice issuing method and system based on JSON data protocol |
CN109450730A (en) * | 2018-11-09 | 2019-03-08 | 中电科仪器仪表有限公司 | A kind of dynamic application layer protocol test method based on standard data interchange format |
CN111163074A (en) * | 2019-12-25 | 2020-05-15 | 腾讯云计算(北京)有限责任公司 | Gateway service control method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111935070B (en) | 2023-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111752799B (en) | Service link tracking method, device, equipment and storage medium | |
Mori et al. | Remote monitoring and maintenance system for CNC machine tools | |
CN112468472A (en) | Security policy self-feedback method based on security log association analysis | |
CN112905261B (en) | Application program interface API (application program interface) control method and device and electronic equipment | |
CN101009004A (en) | Warming device and warming method | |
CN109639756A (en) | A kind of terminal network incidence relation is shown and equipment accesses real-time monitoring system | |
CN110943851B (en) | Alarm processing method and device based on micro-service and electronic equipment | |
CN114785613A (en) | Method and system for processing safety alarm event based on automatic arrangement | |
CN110442582B (en) | Scene detection method, device, equipment and medium | |
CN114143015A (en) | Abnormal access behavior detection method and electronic device | |
CN118054845B (en) | Distributed optical network terminal fault monitoring method and system | |
CN113411209B (en) | A distributed cryptographic service full-link detection system and method | |
CN106897185B (en) | Method and device for outputting abnormity | |
CN111935070B (en) | Data security exchange system and method based on automatic arrangement | |
CN113918954A (en) | Automated vulnerability scanning integration method, device, equipment and storage medium | |
CN114363026B (en) | Industrial control network intelligent control management method and system based on white list | |
CN114826788B (en) | Equipment management and control system based on information security | |
CN117640134A (en) | System and method for expanding three-party authentication protocol based on industrial Internet platform | |
CN112380090B (en) | A comprehensive self-healing method and system based on data center alarm events | |
CN115664789A (en) | Industrial firewall security assessment system and method | |
CN100536413C (en) | Method for real-time monitoring remote embedded system | |
CN116962072B (en) | Automatic operation and maintenance method for secondary safety protection equipment of power dispatching data network | |
CN107066538B (en) | Data statistics method and device | |
CN117910969B (en) | Policy project collaborative office-based flow information management method and system | |
Žitnik et al. | Operations Wisdom Logging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |