CN112153075B - Safety monitoring system for computer wireless communication - Google Patents

Safety monitoring system for computer wireless communication Download PDF

Info

Publication number
CN112153075B
CN112153075B CN202011086231.0A CN202011086231A CN112153075B CN 112153075 B CN112153075 B CN 112153075B CN 202011086231 A CN202011086231 A CN 202011086231A CN 112153075 B CN112153075 B CN 112153075B
Authority
CN
China
Prior art keywords
module
network
computer terminal
monitoring module
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011086231.0A
Other languages
Chinese (zh)
Other versions
CN112153075A (en
Inventor
傅仕琛
陈铮
杨威
黄秋瑜
张壬寅
曾子建
张坤三
傅昱
范琳芳
黄凤珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Fujian Electric Power Co Ltd
Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd
Original Assignee
State Grid Fujian Electric Power Co Ltd
Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Fujian Electric Power Co Ltd, Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd filed Critical State Grid Fujian Electric Power Co Ltd
Priority to CN202011086231.0A priority Critical patent/CN112153075B/en
Publication of CN112153075A publication Critical patent/CN112153075A/en
Application granted granted Critical
Publication of CN112153075B publication Critical patent/CN112153075B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a safety monitoring system for computer wireless communication, which comprises a computer terminal, a signal transmission module, a safety monitoring module, a firewall and a router, wherein the computer terminal is used for generating an operation command and transmitting the operation command to the signal transmission module, the signal transmission module is used for transmitting the operation command generated by the computer terminal to the safety monitoring module, the safety monitoring module is used for identifying and blocking sensitive vocabulary and domain names which are required to be connected by the computer terminal, and can also be used for judging, monitoring and clearing login information input by the computer terminal. The invention can limit the website accessed by the local network, the searched information or the network use time, and can safely monitor the webpage login.

Description

Safety monitoring system for computer wireless communication
Technical Field
The invention relates to the technical field of network monitoring systems, in particular to a safety monitoring system for computer wireless communication.
Background
Network security is relative, on one hand, hardware, software and data in the system are protected, the system is not damaged, changed and leaked due to accidental or malicious reasons, the system can continuously and reliably run normally, network service is not interrupted, and on the other hand, the local network is protected by a certain security, and dangerous websites or domain names cannot be accessed, so that the aim of network security is achieved.
The active protection of the local network is widely applied to places such as schools, companies and the like, so that the safety of the local network can be protected, and students or staff can learn and work more intensively. However, in practical applications, we find that there is still a certain disadvantage in the conventional network security monitoring system related to active protection, and this network security monitoring system has a great limitation, and only can detect and monitor the problem of network hardware access, but cannot limit the website accessed in the local network, the searched information, or the time of network use.
Disclosure of Invention
In view of the above, the present invention is to provide a security monitoring system for wireless communication of a computer, which can limit the access of a local network to a website, the information searched for, or the time used by the network, and can perform security monitoring on the login of a web page.
The invention is realized by adopting the following scheme: a security monitoring system for computer wireless communication comprises a plurality of computer terminals, a signal transmission module, a security monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and is used for transmitting the operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module is used for identifying, blocking and clearing the operation instruction of the computer terminal; each computer terminal is also connected with the router and used for connecting with a network through the router; the firewall module is also connected with a network through a router; the firewall module is connected with the security monitoring module and used for blocking unsafe network factors of the computer terminal.
Further, the operation instructions comprise web page login, network searching, software downloading, resource downloading, game downloading and online payment operation.
Further, the security monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judging module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
Further, the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal, and specifically comprises the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network time of the computer terminal is within the specified time, if not, the network blocking module blocks the network access of the computer terminal, and alarms through the alarm module, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether the operation instruction of the computer terminal contains sensitive words according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, the network blocking module blocks the network access of the computer terminal and alarms through the alarm module, and if the operation instruction does not contain the sensitive words, the operation instruction is transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether the operation instruction of the computer terminal contains dangerous domain names according to various dangerous domain names stored in the domain name database, if the dangerous domain names are contained, the network access of the computer terminal is blocked by the network blocking module, the alarm module alarms, and if the dangerous domain names are not contained, the data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if the request data is not login operation, the request data is directly transmitted to the Internet through a firewall, if the request data is not login operation, the login information monitoring module judges whether login information is legal, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, if the login information is legal, the request data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is further connected with a data clearing module, and the data clearing module is used for clearing monitoring information in the login information monitoring module.
Compared with the prior art, the invention has the following beneficial effects:
(1) The invention can limit the website accessed by the local network, the searched information or the network use time, and can safely monitor the webpage login.
(2) The invention can limit the network utilization time of the computer terminal through the time management module, the network utilization is smooth in the specified time, and the network can be blocked by the network blocking module when the network is not utilized in the specified time, so that the user is prevented from being addicted to the network.
(3) The invention can identify the sensitive words of the information searched by the user through the sensitive information monitoring module and the sensitive information database, if the sensitive words are contained, the network access of the computer terminal is blocked through the network blocking module, and the alarm module alarms, if the sensitive words are not contained, the network is unblocked, and the network safety is ensured.
(4) The invention can judge whether the request data of the computer terminal contains dangerous domain names through the domain name monitoring module and the domain name database, if the request data contains dangerous domain names, the network access of the computer terminal is blocked through the network blocking module, and the alarm module alarms, if the request data does not contain dangerous domain names, the network is unblocked, the local network can be prevented from accessing some dangerous domain names, and the safety of the local network is further ensured.
(5) The login judging module can judge whether the request data of the computer terminal is login operation or not, and the data clearing module can clear the monitoring information in the login information monitoring module, so that the safety of the data is ensured, and the login information residue is prevented.
Drawings
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the invention.
Fig. 2 is a schematic diagram of a security monitoring module according to an embodiment of the invention.
Fig. 3 is a schematic diagram of time determination according to an embodiment of the invention.
FIG. 4 is a schematic diagram of a judgment of a sensitive word according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of dangerous domain name judgment according to an embodiment of the present invention.
Fig. 6 is a schematic diagram illustrating login information determination according to an embodiment of the present invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples.
It should be noted that the following detailed description is illustrative and is intended to provide further explanation of the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments in accordance with the present application. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
As shown in fig. 1, the security monitoring system for wireless communication of a computer according to this embodiment includes a plurality of computer terminals, a signal transmission module, a security monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and is used for transmitting the operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module is used for identifying, blocking and clearing the operation instruction of the computer terminal; each computer terminal is also connected with the router and used for connecting with a network through the router; the firewall module is also connected with a network through a router; the firewall module is connected with the security monitoring module and used for blocking unsafe network factors of the computer terminal.
In this embodiment, the operation instructions include web page login, web search, software download, resource download, game download, and online payment operation.
As shown in fig. 2, in this embodiment, the security monitoring module includes a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module, and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
As shown in fig. 3 to 6, in this embodiment, the identifying, blocking and clearing the operation instruction of the computer terminal by the security monitoring module specifically includes the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network time of the computer terminal is within the specified time, if not, the network blocking module blocks the network access of the computer terminal, and alarms through the alarm module, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether the operation instruction of the computer terminal contains sensitive words according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, the network blocking module blocks the network access of the computer terminal and alarms through the alarm module, and if the operation instruction does not contain the sensitive words, the operation instruction is transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether the operation instruction of the computer terminal contains dangerous domain names according to various dangerous domain names stored in the domain name database, if the dangerous domain names are contained, the network access of the computer terminal is blocked by the network blocking module, the alarm module alarms, and if the dangerous domain names are not contained, the data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if the request data is not login operation, the request data is directly transmitted to the Internet through a firewall, if the request data is not login operation, the login information monitoring module judges whether login information is legal, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, if the login information is legal, the request data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is further connected with a data clearing module, the data clearing module is used for clearing monitoring information in the login information monitoring module, and the monitoring information comprises all information in the login information monitoring module, so that the safety of the computer terminal is further ensured.
Preferably, in this embodiment, a legal webpage and a legal login user name may be set in the login information monitoring module, and the login information monitoring module may determine that the login information monitoring module is legal only when the legal login user name is used to login the legal webpage.
Preferably, in the present embodiment: the firewall is used for generating a protection barrier to block unsafe network factors of the computer terminal;
the router is used for connecting the network of the computer terminal to the Internet;
the security monitoring module is used for identifying and blocking sensitive vocabulary and domain names of the computer terminal requesting networking and judging, monitoring and clearing login information input by the computer terminal;
the safety monitoring module comprises a network blocking module and an alarm module, wherein the network blocking module is used for blocking a network access of the computer terminal, and the alarm module comprises an alarm lamp and a buzzer and is used for generating an alarm when the safety monitoring module detects abnormality.
The safety monitoring module further comprises a time management module, and the output end of the time management module is connected with a sensitive information monitoring module and a network blocking module in a signal mode. The time management module comprises a control panel and a processor, wherein the control panel can be used for setting time, the network can be used within the set time, and the network can be blocked by the network blocking module beyond the time limit.
The output end signal of the sensitive information monitoring module is connected with a domain name monitoring module and a network blocking module, and the output end signal of the domain name monitoring module is connected with a login judging module and a network blocking module. The output end signal of the login judging module is connected with a login information monitoring module, and the output end signal of the login information monitoring module is connected with a network blocking module and a firewall. The input end signal of the sensitive information monitoring module is connected with a sensitive information database, the input end signal of the domain name monitoring module is connected with a domain name database, various sensitive words, sensitive names or other sensitive information are stored in the sensitive information database, and various dangerous domain names are stored in the domain name database. The input end signal of the login information monitoring module is connected with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module, so that the safety of data is ensured, and login information residues are prevented.
Preferably, in this embodiment, the sensitive information in the computer terminal request data can be monitored through the sensitive information database and the sensitive information monitoring module, so as to prevent the computer terminal from searching for some sensitive information, and the domain name in the computer terminal request data can be monitored through the domain name database and the domain name monitoring module, so that the computer terminal is prevented from accessing some dangerous domain names, and the security of the computer terminal network is ensured.
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (1)

1. A security monitoring system for wireless communication of a computer, characterized by: the system comprises a plurality of computer terminals, a signal transmission module, a security monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and is used for transmitting the operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module is used for identifying, blocking and clearing the operation instruction of the computer terminal; each computer terminal is also connected with the router and used for connecting with a network through the router; the firewall module is also connected with a network through a router; the firewall module is connected with the security monitoring module and used for blocking unsafe network factors of the computer terminal;
the operation instructions comprise webpage login, network searching, software downloading, resource downloading, game downloading and online payment operation;
the safety monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judging module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judging module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module;
the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal, and specifically comprises the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network time of the computer terminal is within the specified time, if not, the network blocking module blocks the network access of the computer terminal, and alarms through the alarm module, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether the operation instruction of the computer terminal contains sensitive words according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, the network blocking module blocks the network access of the computer terminal and alarms through the alarm module, and if the operation instruction does not contain the sensitive words, the operation instruction is transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether the operation instruction of the computer terminal contains dangerous domain names according to various dangerous domain names stored in the domain name database, if the dangerous domain names are contained, the network blocking module blocks the network access of the computer terminal, the alarm module alarms, and if the dangerous domain names are not contained, the data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if the request data is not login operation, the request data is directly transmitted to the Internet through a firewall, if the request data is not login operation, the login information monitoring module judges whether login information is legal, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module and is alarmed through the alarm module, if the login information is legal, the request data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, and the data clearing module is used for clearing monitoring information in the login information monitoring module.
CN202011086231.0A 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication Active CN112153075B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011086231.0A CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011086231.0A CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Publications (2)

Publication Number Publication Date
CN112153075A CN112153075A (en) 2020-12-29
CN112153075B true CN112153075B (en) 2023-05-05

Family

ID=73953001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011086231.0A Active CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Country Status (1)

Country Link
CN (1) CN112153075B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647425A (en) * 2012-04-20 2012-08-22 汉柏科技有限公司 Method and system for realizing anti-trojan function of firewall
CN103491108B (en) * 2013-10-15 2016-08-24 浙江中控研究院有限公司 A kind of industrial control network security protection method and system
CN104821943A (en) * 2015-04-27 2015-08-05 西北工业大学 Method for enhancing security of access of Linux hosts to network system
US10419467B2 (en) * 2016-05-06 2019-09-17 SecuLore Solutions, LLC System, method, and apparatus for data loss prevention
CN108931968B (en) * 2018-07-25 2021-07-20 安徽三实信息技术服务有限公司 Network security protection system applied to industrial control system and protection method thereof
CN109450945A (en) * 2018-12-26 2019-03-08 成都西维数码科技有限公司 A kind of web page access method for safety monitoring based on SNI

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform

Also Published As

Publication number Publication date
CN112153075A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
EP3136277B1 (en) Illicit activity sensing network system and illicit activity sensing method
CN102301373B (en) Health-based Access To Network Resources
US7941857B2 (en) Data network and method for checking nodes of a data network
KR101042246B1 (en) USB connector and intrusion prevention system using the same
US20220217169A1 (en) Malware detection at endpoint devices
US8161526B2 (en) Protecting sensitive information on a publicly accessed data processing system
US20170353434A1 (en) Methods for detection of reflected cross site scripting attacks
KR20080044145A (en) Anomaly detection system and method of web application attacks using web log correlation
US10904272B2 (en) Consumer threat intelligence service
CN113518077A (en) Malicious web crawler detection method, device, equipment and storage medium
CN100550017C (en) The system and method that is used for secure full-text indexing
US6973580B1 (en) System and method for alerting computer users of digital security intrusions
KR101996471B1 (en) Network Securing Device and Securing method Using The Same
US20190238544A1 (en) Tracking and whitelisting third-party domains
CN111614624A (en) Risk detection method, device, system and storage medium
CN105260660A (en) Monitoring method, device and system of intelligent terminal payment environment
EP1455500A1 (en) Methods and devices relating to distributed computing environments
US9230105B1 (en) Detecting malicious tampering of web forms
KR100916324B1 (en) The method, apparatus and system for managing malicious code spreading site using fire wall
CN112153075B (en) Safety monitoring system for computer wireless communication
Ogunniye et al. A survey on understanding and representing privacy requirements in the Internet-of-Things
Lin et al. Autonomic security management for IoT smart spaces
CN111931236A (en) Data communication monitoring method, system and computer readable storage medium
CN100358281C (en) Intrusion detection method and system
CN115987637A (en) Webshell file detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant