CN112258054A - Network asset compliance analysis method based on flow perception - Google Patents

Network asset compliance analysis method based on flow perception Download PDF

Info

Publication number
CN112258054A
CN112258054A CN202011158939.2A CN202011158939A CN112258054A CN 112258054 A CN112258054 A CN 112258054A CN 202011158939 A CN202011158939 A CN 202011158939A CN 112258054 A CN112258054 A CN 112258054A
Authority
CN
China
Prior art keywords
asset
network
compliance
allowed
assets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011158939.2A
Other languages
Chinese (zh)
Inventor
刘家祥
黄建福
石小川
肖清林
张晶
陈瑜靓
赵昆杨
黄靓
陈鹭菲
王榕腾
杜鑫
杨国林
刘健养
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Useear Information Technology Co ltd
Original Assignee
Fujian Qidian Space Time Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Qidian Space Time Digital Technology Co ltd filed Critical Fujian Qidian Space Time Digital Technology Co ltd
Priority to CN202011158939.2A priority Critical patent/CN112258054A/en
Publication of CN112258054A publication Critical patent/CN112258054A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A network asset compliance analysis method based on flow perception comprises the following steps: s1, identifying the network assets; s2, establishing an asset information base; s3, establishing an allowed asset type library; s4, comparing the asset information base with the allowed asset type base, and issuing a comparison result analysis report; s5, when the asset information base is not in the allowed asset type base, generating a network asset compliance warning task; and S6, the monitoring personnel modify the corresponding network assets according to the network asset compliance warning task. According to the invention, through comparing the asset information base with the allowed asset type base, the on-line network assets which are not in compliance can be found in time, the network asset compliance warning task is generated, so that a manager can be reminded to rapidly process the network assets which are not in compliance, the network asset compliance can be rapidly and accurately analyzed and monitored, and the use normative and the safety of the network assets are improved.

Description

Network asset compliance analysis method based on flow perception
Technical Field
The invention relates to the technical field of network assets, in particular to a network asset compliance analysis method based on flow perception.
Background
In the era of mobile internet and cloud computing, business drive and technical development lead to the increasing of IT architecture and scale of enterprises, the association and complexity between systems are also rapidly increased, and more various systems and devices are accessed to an intranet or provide services for the internet. The increase of exposed surfaces of the IT assets and the dynamic change of the IT assets blur the boundary of the traditional financial enterprise network and enlarge the battlefield of the security defense of the financial enterprise network. If a manager of a system in an enterprise cannot master the internet asset condition of the manager, and lacks timely and effective data support, the safety management work is delayed, and the comprehensive dynamic safety defense work is difficult to establish for the enterprise.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides a network asset compliance analysis method based on flow perception, which can find out on-line network assets which are not in compliance in time by comparing an asset information base with an allowed asset type base, generate a network asset compliance warning task so as to remind a manager to quickly process the network assets which are not in compliance, wherein the processing mode comprises the steps of contacting a network asset owner to change types, neglecting the processing or establishing a network asset white list, the network asset identification frequency is set by the manager according to the needs, the identification efficiency is high, the network asset compliance can be quickly and accurately analyzed and monitored, the network assets in a region are ensured to be in compliance, and the use normalization and the safety of the network assets are improved.
(II) technical scheme
The invention provides a network asset compliance analysis method based on flow perception, which comprises the following steps:
s1, identifying the network assets;
s2, establishing an asset information base;
s3, establishing an allowed asset type library;
s4, comparing the asset information base with the allowed asset type base, and issuing a comparison result analysis report; when all items of the network asset information are in the allowed asset type library, a certain network asset compliance is said;
s5, when the asset information base is not in the allowed asset type base, generating a network asset compliance warning task;
and S6, the monitoring personnel modify the corresponding network assets according to the network asset compliance warning task, and after the compliance of the network assets with the allowed asset type library is ensured, the network asset compliance warning task is manually eliminated.
Preferably, in step S1, the network assets are divided into areas, the total area is divided into a plurality of sub-areas, the division is preferably divided according to functional units such as departments and departments, and the sub-areas are numbered in sequence by using arabic numbers, and each sub-area is provided with a plurality of sets of asset collecting devices including a patch server, a VPN, and a traffic analyzing device to identify the network assets of each sub-area.
Preferably, the method for identifying the network asset by the traffic analysis device includes active traffic detection and passive traffic detection, the active traffic detection is a scanning technology based on the IPv4 protocol, the passive traffic detection deploys a traffic mirror through a bypass, and when there are two-layer broadcast communication and three-layer IP communication messages of a surviving IP asset in the mirror network traffic, a detection rule for asset identification can be triggered through analysis of the two-layer protocol and the three-layer protocol, so as to identify the network asset.
Preferably, in step S2, the asset information base is represented by a topological structure diagram, which sequentially includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, a network asset basic information layer and a network asset detailed information layer, each specific network asset corresponds to a set of three-dimensional coordinate values (a, B, C), where a represents a sub-area number, B represents a network classification number in the sub-area, and C represents a specific network asset; devices in the network need to identify the device manufacturer by means of identification based on a MAC address, which is a 48-bit MAC address comprising two parts: the 24 bits organize a unique identifier and the remaining 24 bits are factory assigned codes, the first 24 OUI can identify the device manufacturer, thereby identifying "ubiquitous terminal network devices" such as printers, Wi-Fi routers, video devices, IP phones, etc. in the network.
Preferably, in step S3, the allowed asset type library is represented by a topological structure diagram, the topological structure diagram sequentially includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, and a network asset allowed type, the allowed asset type library has a modifiable and expandable property, the allowed asset type corresponds to a set of three-dimensional coordinate values (D, E, F), D represents a sub-area number, E represents a network asset classification number, F represents a form in which a certain type of network asset is allowed to appear, where D and E are fixed items, and F can have various settings.
Preferably, in step S4, the three-dimensional coordinate values (a, B, C) of the asset information base are compared with the three-dimensional coordinate values (D, E, F) of the allowable asset type base, where a corresponds to D, B corresponds to E, and C corresponds to F, and if a and D are matched and B and E are matched, if C is one of the set values of F, it indicates that the asset of C is compliant, otherwise, if C is not one of the set values of F, it indicates that the asset of C is not compliant.
Preferably, in step S5, when specific asset information is not in the set allowed asset type library, second active traffic detection and passive traffic detection are started, the second detection only needs to be concentrated in a sub-area, and when the network asset information analyzed by the second active traffic detection is still not in the set allowed asset type library, a network asset compliance warning task is generated; and the operation terminal is provided with a display screen and an operation panel, the network asset compliance warning task is displayed on the display screen and comprises asset identification date, asset identification content, an asset comparison result, specific items of asset non-compliance, an asset non-compliance processing result and an asset non-compliance handler, wherein two columns of the asset non-compliance processing result and the asset non-compliance handler need to be manually filled in by a confirmation person through the operation panel.
Preferably, the operation terminal is a mobile phone or a notebook computer.
Preferably, in step S6, a historical task list is generated, and all manually cleaned network asset compliance warning tasks are archived in the historical task list in descending date order.
The technical scheme of the invention has the following beneficial technical effects: the method has the advantages that through comparison between the asset information base and the allowed asset type base, online network assets which are not in compliance can be found in time, a network asset compliance warning task is generated, a manager can be reminded of rapidly processing the network assets which are not in compliance, the processing mode comprises the steps of contacting a network asset owner to change types, neglecting processing or building a network asset white list, the network asset identification frequency is set automatically according to the needs of the manager, the identification efficiency is high, the network asset compliance can be analyzed and monitored rapidly and accurately, the network assets in the area are guaranteed to be in compliance, and the use normativity and the safety of the network assets are improved.
Drawings
Fig. 1 is a flowchart of a network asset compliance analysis method based on traffic awareness according to the present invention.
Fig. 2 is a view of a topology structure of an asset information base in the method for analyzing the network asset compliance based on traffic awareness according to the present invention.
Fig. 3 is a table diagram illustrating a network asset compliance warning task in the network asset compliance analysis method based on traffic awareness according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the method for analyzing the network asset compliance based on traffic awareness provided by the present invention includes the following steps:
s1, identifying the network assets;
s2, establishing an asset information base;
s3, establishing an allowed asset type library;
s4, comparing the asset information base with the allowed asset type base, and issuing a comparison result analysis report; when all items of the network asset information are in the allowed asset type library, a certain network asset compliance is said;
s5, when the asset information base is not in the allowed asset type base, generating a network asset compliance warning task;
and S6, the monitoring personnel modify the corresponding network assets according to the network asset compliance warning task, and after the compliance of the network assets with the allowed asset type library is ensured, the network asset compliance warning task is manually eliminated.
According to the invention, through comparing the asset information base with the allowable asset type base, the on-line network assets which are not in compliance can be found in time, the network asset compliance warning task is generated, so that a manager can be reminded to rapidly process the network assets which are not in compliance, the processing mode comprises the steps of contacting the network asset owner to change the type, neglecting the processing or establishing a network asset white list, the network asset identification frequency is automatically set according to the needs of the manager, the identification efficiency is high, the network asset compliance can be rapidly and accurately analyzed and monitored, the network assets in the area are ensured to be in compliance, and the use normalization and the safety of the network assets are improved.
In an optional embodiment, in step S1, the network assets are divided into areas, the total area is divided into a plurality of sub-areas, the division is preferably performed according to functional units such as departments and departments, and the sub-areas are ordered and numbered by using arabic numbers, each sub-area is provided with a plurality of sets of asset collection devices including a patch server, a VPN, and a traffic analysis device to identify the network assets of each sub-area; the network assets are classified through regional division, and classified arrangement and rapid query comparison of information after asset identification are facilitated.
In an optional embodiment, the method for identifying the network asset by the traffic analysis device includes active traffic detection and passive traffic detection, the active traffic detection is based on a scanning technology of an IPv4 protocol, the passive traffic detection deploys a traffic mirror through a bypass, and when there is a two-layer broadcast communication and a three-layer IP communication packet of a live IP asset in the mirrored network traffic, a detection rule for asset identification can be triggered through analysis of the two-layer protocol and the three-layer protocol, so as to identify the network asset; the active flow detection carries out asset identification on the whole network in a scanning mode, but the possibility of report omission exists because the active flow detection is influenced by the network and other factors, and the comprehensiveness and the accuracy of network asset identification are improved by combining with the passive flow detection.
In an optional embodiment, in the step S2, the asset information base is represented by a topological structure diagram, where the topological structure diagram includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, a network asset basic information layer and a network asset detailed information layer, and each specific network asset corresponds to a set of three-dimensional coordinate values (a, B, C), where a represents a sub-area number, B represents a network classification number in the sub-area, and C represents a specific network asset; devices in the network need to identify the device manufacturer by means of identification based on a MAC address, which is a 48-bit MAC address comprising two parts: the 24 bits organize a unique identifier and the remaining 24 bits are a manufacturer assigned code, the first 24 bits OUI can identify the device manufacturer, thereby identifying "ubiquitous terminal network devices" such as printers, Wi-Fi routers, video devices, IP phones, etc. in the network; the structure of the topological structure diagram is clear, and the three-dimensional coordinate value numbering is carried out on the specific network assets, so that the related information of the corresponding network assets can be conveniently and quickly searched.
In an alternative embodiment, in step S3, the asset type library is represented by a topological structure diagram, where the topological structure diagram includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, and a network asset allowable type, the asset type library is allowed to have a modifiable and expandable property, the asset type is allowed to correspond to a set of three-dimensional coordinate values (D, E, F), D represents a sub-area number, E represents a network asset classification number, F represents a form in which a certain type of network asset is allowed to appear, where D and E are fixed items, and F can have multiple settings; the topology structure diagram of the allowed asset type library is similar to the topology structure diagram of the asset information library, so that the online network asset information and the allowed asset type library are conveniently compared one by one, and the network asset compliance is conveniently and accurately analyzed.
In an alternative embodiment, in step S4, the three-dimensional coordinate values (a, B, C) of the asset information base are compared with the three-dimensional coordinate values (D, E, F) of the allowable asset type base, where a corresponds to D, B corresponds to E, and C corresponds to F, and if a and D are matched and B and E are matched, if C is one of the set values of F, it indicates that C is in compliance, otherwise, if C is not one of the set values of F, it indicates that C is not in compliance; by comparing each item of content of the two groups of three-dimensional coordinate values one by one, the comparison efficiency is high, and the comparison result is accurate.
In an optional embodiment, in step S5, when a specific item of asset information is not in the set allowed asset type library, a second active traffic detection and passive traffic detection is started, where the second detection only needs to be concentrated in a sub-area, and when the network asset information analyzed by the second active traffic detection is still not in the set allowed asset type library, a network asset compliance warning task is generated; the method comprises the following steps that a network asset compliance warning task is displayed on a display screen and comprises asset identification date, asset identification content, an asset comparison result, specific items of asset non-compliance, an asset non-compliance processing result and an asset non-compliance handler, wherein two columns of the asset non-compliance processing result and the asset non-compliance handler need to be manually filled in by a confirming person through the operation panel; through setting up the network asset information acquisition analysis of the second time, prevent that single detection result from deviating, improved the degree of accuracy, set up operation terminal simultaneously, on network asset compliance warning task sent operation terminal, warning effect is better, and the administrator of being convenient for in time handles the network asset that does not comply, improves the security that network asset used.
In an optional embodiment, the operation terminal is preferably a mobile phone or a notebook computer; the use portability is improved, and a manager can check the information at any time and any place.
In an alternative embodiment, in step S6, a historical task list is generated, and all manually cleaned network asset compliance warning tasks are archived in the historical task list in descending date order; the method is convenient for later-stage query, improves the traceability of operation, and is clear at a glance and quicker in search by arranging the dates in a descending order mode.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (9)

1. A network asset compliance analysis method based on flow perception is characterized by comprising the following steps:
s1, identifying the network assets;
s2, establishing an asset information base;
s3, establishing an allowed asset type library;
s4, comparing the asset information base with the allowed asset type base, and issuing a comparison result analysis report; when all items of the network asset information are in the allowed asset type library, a certain network asset compliance is said;
s5, when the asset information base is not in the allowed asset type base, generating a network asset compliance warning task;
and S6, the monitoring personnel modify the corresponding network assets according to the network asset compliance warning task, and after the compliance of the network assets with the allowed asset type library is ensured, the network asset compliance warning task is manually eliminated.
2. The method for analyzing the compliance of the network assets based on the traffic awareness as claimed in claim 1, wherein in the step S1, the network assets are divided into regions, the total region is divided into a plurality of sub-regions, preferably, the sub-regions are divided according to functional units such as departments and departments, and are numbered by ranking with arabic numbers, and each sub-region is provided with a plurality of groups of asset collecting devices including a patch server, a VPN, and a traffic analyzing device to identify the network assets of each sub-network portion.
3. The method for analyzing the compliance of the network assets based on the traffic awareness as claimed in claim 2, wherein the manner of identifying the network assets by the traffic analyzing device includes active traffic detection and passive traffic detection, the active traffic detection is a scanning technique based on the IPv4 protocol, the passive traffic detection deploys traffic mirror images through a bypass, when there are two-layer broadcast communication and three-layer IP communication messages of the alive IP assets in the mirrored network traffic, the detection rule of the asset identification can be triggered through the analysis of the two-layer protocol and the three-layer protocol, so as to identify the network assets.
4. The method according to claim 1, wherein in step S2, the asset information base is represented by a topological structure diagram, which includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, a network asset basic information layer and a network asset detailed information layer, and each specific network asset corresponds to a set of three-dimensional coordinate values (a, B, C), where a represents a sub-area number, B represents a network classification number in a sub-area, and C represents a specific network asset; devices in the network need to identify the device manufacturer by means of identification based on a MAC address, which is a 48-bit MAC address comprising two parts: the 24 bits organize a unique identifier and the remaining 24 bits are factory assigned codes, the first 24 OUI can identify the device manufacturer, thereby identifying "ubiquitous terminal network devices" such as printers, Wi-Fi routers, video devices, IP phones, etc. in the network.
5. The method for analyzing the compliance of the network assets based on the traffic awareness as claimed in claim 1, wherein in step S3, the asset type library is allowed to be represented by a topological structure diagram, the topological structure diagram includes, from top to bottom, a total area layer, a sub-area layer, a network asset classification layer, and a network asset allowable type, the asset type library is allowed to have a modifiable and expandable property, the asset type is allowed to correspond to a set of three-dimensional coordinate values (D, E, F), D represents a sub-area number, E represents a network asset classification number, F represents a form in which a certain type of network assets are allowed to appear, wherein D and E are fixed items, and F can be set in various ways.
6. The method according to claim 1, wherein in step S4, the three-dimensional coordinate values (a, B, C) of the asset information base are compared with the three-dimensional coordinate values (D, E, F) of the allowed asset type base in a manner that each item is compared one by one, a corresponds to D, B corresponds to E, and C corresponds to F, and if a and D are matched and B and E are matched, if C is one of the set values of F, it indicates that C is in asset compliance, otherwise, if C is not one of the set values of F, it indicates that C is in asset compliance.
7. The method for analyzing network asset compliance based on traffic awareness according to claim 1, wherein in step S5, when a specific item of asset information is not in the set allowed asset type library, a second active traffic detection and passive traffic detection is started, the second detection only needs to be concentrated in a sub-area, and when the network asset information analyzed by the second active traffic detection is still not in the set allowed asset type library, a network asset compliance warning task is generated; and the operation terminal is provided with a display screen and an operation panel, the network asset compliance warning task is displayed on the display screen and comprises asset identification date, asset identification content, an asset comparison result, specific items of asset non-compliance, an asset non-compliance processing result and an asset non-compliance handler, wherein two columns of the asset non-compliance processing result and the asset non-compliance handler need to be manually filled in by a confirmation person through the operation panel.
8. The traffic-aware-based network asset compliance analysis method according to claim 7, wherein the operation terminal is preferably a mobile phone or a laptop.
9. The traffic-aware-based network asset compliance analysis method according to claim 1, wherein in step S6, a historical task list is generated, and all manually cleared network asset compliance warning tasks are archived in the historical task list in descending date order.
CN202011158939.2A 2020-10-26 2020-10-26 Network asset compliance analysis method based on flow perception Pending CN112258054A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011158939.2A CN112258054A (en) 2020-10-26 2020-10-26 Network asset compliance analysis method based on flow perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011158939.2A CN112258054A (en) 2020-10-26 2020-10-26 Network asset compliance analysis method based on flow perception

Publications (1)

Publication Number Publication Date
CN112258054A true CN112258054A (en) 2021-01-22

Family

ID=74261609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011158939.2A Pending CN112258054A (en) 2020-10-26 2020-10-26 Network asset compliance analysis method based on flow perception

Country Status (1)

Country Link
CN (1) CN112258054A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905042A (en) * 2021-10-18 2022-01-07 杭州安恒信息技术股份有限公司 FTP server positioning method, device, equipment and storage medium
CN115408701A (en) * 2022-08-30 2022-11-29 周康发 Artificial intelligence and big data combined data asset vulnerability analysis method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075564A1 (en) * 2011-06-01 2014-03-13 Anurag Singla Network asset information management
CN110113345A (en) * 2019-05-13 2019-08-09 四川长虹电器股份有限公司 A method of the assets based on Internet of Things flow are found automatically
CN110868425A (en) * 2019-11-27 2020-03-06 上海三零卫士信息安全有限公司 Industrial control information safety monitoring system adopting black and white list for analysis
CN110958262A (en) * 2019-12-15 2020-04-03 国网山东省电力公司电力科学研究院 Ubiquitous Internet of things safety protection gateway system, method and deployment architecture in power industry

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075564A1 (en) * 2011-06-01 2014-03-13 Anurag Singla Network asset information management
CN110113345A (en) * 2019-05-13 2019-08-09 四川长虹电器股份有限公司 A method of the assets based on Internet of Things flow are found automatically
CN110868425A (en) * 2019-11-27 2020-03-06 上海三零卫士信息安全有限公司 Industrial control information safety monitoring system adopting black and white list for analysis
CN110958262A (en) * 2019-12-15 2020-04-03 国网山东省电力公司电力科学研究院 Ubiquitous Internet of things safety protection gateway system, method and deployment architecture in power industry

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905042A (en) * 2021-10-18 2022-01-07 杭州安恒信息技术股份有限公司 FTP server positioning method, device, equipment and storage medium
CN115408701A (en) * 2022-08-30 2022-11-29 周康发 Artificial intelligence and big data combined data asset vulnerability analysis method and system

Similar Documents

Publication Publication Date Title
CN108200123B (en) Internet of things industrial cloud monitoring system based on safety inspection equipment
US8051298B1 (en) Integrated fingerprinting in configuration audit and management
CN107958337A (en) A kind of information resources visualize mobile management system
CN110809010B (en) Threat information processing method, device, electronic equipment and medium
JP2002330177A (en) Security management server and host sever operating in linkage with the security management server
CN112258054A (en) Network asset compliance analysis method based on flow perception
CN104836701A (en) Order monitoring method and monitoring apparatus
CN107168845B (en) Fault positioning method and device
CN101464894A (en) Data query method and system
Shi et al. Visual analytics of anomalous user behaviors: A survey
CN113055252B (en) Method, device, equipment and storage medium for detecting newly added service host
CN112950238A (en) Big data-based customer relationship management and service intelligent tracking system and method
CN112182625A (en) Data sharing system for smart city
CN114978614A (en) IP asset rapid scanning processing system
US7664756B1 (en) Configuration management database implementation with end-to-end cross-checking system and method
CN108234431A (en) A kind of backstage logs in behavioral value method and detection service device
CN111897898B (en) Configuration method and device for equipment position of Internet of things and computer equipment
CN111177281B (en) Access control method, device, equipment and storage medium
US20200250250A1 (en) Computer-implemented method and apparatus for determining a relevance of a node in a network
CN107801050A (en) For the method, apparatus and server handled video monitoring data
CN111049853A (en) Security authentication system based on computer network
CN116049254A (en) Data asset statistics method based on database
KR20030042135A (en) System and Method for collecting Internet bulletin
CN116340442A (en) Network space map generation method, device, equipment and storage medium
CN113553588A (en) Terminal software management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220906

Address after: 361000 units 1702 and 1703, No. 59, Chengyi North Street, phase III, software park, Xiamen, Fujian

Applicant after: XIAMEN USEEAR INFORMATION TECHNOLOGY Co.,Ltd.

Address before: Unit 1701, 59 Chengyi North Street, phase III, software park, Xiamen City, Fujian Province, 361000

Applicant before: FUJIAN QIDIAN SPACE-TIME DIGITAL TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20210122

RJ01 Rejection of invention patent application after publication