CN112261017A - Server abnormal behavior monitoring and management method oriented to cloud computing environment - Google Patents

Server abnormal behavior monitoring and management method oriented to cloud computing environment Download PDF

Info

Publication number
CN112261017A
CN112261017A CN202011091167.5A CN202011091167A CN112261017A CN 112261017 A CN112261017 A CN 112261017A CN 202011091167 A CN202011091167 A CN 202011091167A CN 112261017 A CN112261017 A CN 112261017A
Authority
CN
China
Prior art keywords
data
cloud computing
server
module
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011091167.5A
Other languages
Chinese (zh)
Inventor
陈鹭菲
石小川
张晶
王榕腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qijia Information Technology Co ltd
Original Assignee
Shanghai Qijia Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qijia Information Technology Co ltd filed Critical Shanghai Qijia Information Technology Co ltd
Priority to CN202011091167.5A priority Critical patent/CN112261017A/en
Publication of CN112261017A publication Critical patent/CN112261017A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A server abnormal behavior monitoring and management method facing a cloud computing environment comprises computing nodes, a management server, BGP and a total data center; the BGP is respectively in communication connection with the management server and the total data center; the total data center comprises a data acquisition system and a data storage system; the normal characteristic database is used for collecting and storing some special characteristics in the cloud computing system under normal conditions, and updating the database according to maintenance and updating of the system; and the abnormal characteristic database is used for collecting and storing the change characteristics inside the cloud computing system when the cloud computing system receives malicious attacks and intrusions, and timely updating and early warning the characteristics which are not stored but have abnormal changes so as to prevent the intrusion. The invention can effectively protect data, prevent leakage, ensure the safety of the data, prevent malicious attack and invasion to the server and protect the normal operation of the cloud computing server.

Description

Server abnormal behavior monitoring and management method oriented to cloud computing environment
Technical Field
The invention relates to the technical field of server detection management, in particular to a server abnormal behavior monitoring management method facing a cloud computing environment.
Background
The internet has emerged since 1960 and is mainly used for plain text e-mail or news cluster services between military parties, large enterprises and the like. The network has become one of the life necessities that people can not leave with the development of web sites and electronic commerce until 1990, which has begun to enter ordinary households. The concept of cloud computing is proposed for the first time in the search engine meeting of 8 months in 2006, and becomes a third revolution of the internet.
In recent years, cloud computing is becoming a strategic focus of development of information technology industries, and information technology enterprises around the world are transformed into cloud computing in disputes. For example, each company needs to perform data informatization, store related operation data, perform product management, personnel management, financial management and the like, and the basic equipment for performing the data management is a computer; the security of the cloud server is very high, but some potential safety hazards or malicious attacks from competitors are not avoided, so the security of the cloud server is also emphasized, and the security protection measures of the cloud server are made, so that the following defects exist;
1. data protection is not enough, and data security protection is not carried out in the whole process of creating, storing, processing, using, sharing, archiving and destroying.
2. And malicious attack behaviors, such as ddos attacks, network viruses and the like. The purpose of such actions is to consume server resources, thereby affecting the normal operation of the server and even causing the network where the server is located to be paralyzed.
3. Malicious intrusion behaviors, which can cause sensitive information of the server to be leaked, and an intruder can wantonly destroy the server as the intruder wants to do; the application provides a server abnormal behavior monitoring and management method facing a cloud computing environment.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides a server abnormal behavior monitoring and management method oriented to a cloud computing environment, which can effectively protect data, prevent leakage, ensure the safety of the data, prevent malicious attack and invasion to a server and protect the normal operation of the cloud computing server.
(II) technical scheme
The invention provides a server abnormal behavior monitoring and management method facing a cloud computing environment, which comprises a computing node, a management server, BGP (border gateway protocol) and a total data center, wherein the computing node is connected with the management server through a network; the BGP is respectively in communication connection with the management server and the total data center; the total data center comprises a data acquisition system and a data storage system;
the computing node is used for computing and processing the distributed data;
the management server is used for processing and analyzing the small programs to obtain results and returning the results to the user;
BGP, routing protocol for connecting independent system on Internet, controlling route transmission and selecting best route;
the total data center is used for storing the internet information and the user information and updating the user information in time;
the data acquisition system comprises a data security module and an intrusion protection module; wherein the content of the first and second substances,
the data security module is used for protecting the security of data in the cloud computing and preventing information leakage and the like;
the intrusion prevention module is used for preventing malicious attacks and intrusion behaviors;
the data storage system comprises a normal characteristic database and an abnormal characteristic database; wherein the content of the first and second substances,
the normal characteristic database is used for collecting and storing some special characteristics in the cloud computing system under normal conditions, and updating the database according to maintenance and updating of the system;
and the abnormal characteristic database is used for collecting and storing the change characteristics inside the cloud computing system when the cloud computing system receives malicious attacks and intrusions, and timely updating and early warning the characteristics which are not stored but have abnormal changes so as to prevent the intrusion.
Preferably, the computing nodes and the management server are provided with a plurality of groups.
Preferably, a firewall is arranged between the BGP and the total data center.
Preferably, the data security module comprises a maintenance module, a detection module, a data retention module and a security access module;
the maintenance module is used for clicking operation and backing up and recovering all data;
the detection module is used for data inspection and perfecting risks existing in the data;
the data retention module is used for prompting whether to delete the data file or not, and if not, the data file is automatically poured into the database;
and the security access module is used for guaranteeing the security of the access of the cloud platform set.
Preferably, the intrusion protection module comprises vulnerability scanning, privacy protection, dynamic service, data encryption, Trojan horse scanning, counterfeit monitoring and content monitoring;
vulnerability scanning, which is used for carrying out vulnerability scanning on the added data to prevent malicious invasion;
the privacy protection is used for protecting user data and preventing data leakage;
the dynamic service is used for providing a dynamic code and identifying the identity of the user;
data encryption, which is used for encrypting data of different levels of a user and increasing the protection degree of different data;
trojan horse scanning, which is used for scanning Trojan horse virus and treating the Trojan horse virus to prevent system poisoning;
counterfeit monitoring for identifying the user and the accuracy of the data;
and monitoring the content, screening the uploaded data, reporting and managing the illegal data and punishing a penalty.
Preferably, the data of the normal feature database and the abnormal feature database are continuously updated according to the upgrade of the system.
Preferably, the total data center is further provided with a warning module for warning when unsafe behaviors such as intrusion occur.
Preferably, the method also comprises a server abnormal behavior monitoring and management method facing the cloud computing environment, and specifically comprises the following steps;
s1, connecting the total data center to the Internet, and collecting and storing the data to be processed;
s2, safety detection is carried out through a data safety module in the data acquisition system, meanwhile, when data are stored, data are firstly checked, and risks existing in the data are perfected; then prompting whether to delete the data file according to the data retention module, automatically pouring the data file into a database if the data file is not deleted, and finally performing click operation and performing backup and recovery on all data; the safety of the access of the cloud platform set is guaranteed; after data security is determined, vulnerability scanning is carried out on added data through vulnerability scanning and Trojan horse scanning to prevent malicious invasion, Trojan horse viruses are scanned and processed to prevent system poisoning, and user identities are identified through dynamic codes through dynamic services; protecting user data, and preventing data leakage; data of different levels are encrypted, and the protection degree of different data is increased; finally, screening the uploaded data, reporting and managing the illegal data and punishing a penalty;
and S3, providing service for the client, decomposing the huge data calculation processing program into countless small programs, and processing and analyzing the small programs by a system consisting of a plurality of servers to obtain results and returning the results to the user.
Compared with the prior art, the technical scheme of the invention has the following beneficial technical effects: the data are effectively protected through a security access module, a detection module and the like in the data security module, leakage is prevented, the security of the data is guaranteed, meanwhile, malicious attacks and intrusions to the server are prevented through Trojan horse scanning, vulnerability scanning, counterfeit monitoring and the like, and the normal operation of the cloud computing server is protected.
Drawings
Fig. 1 is a system block diagram of a server abnormal behavior monitoring and management method for a cloud computing environment according to the present invention.
Fig. 2 is a block diagram of a data center in a server abnormal behavior monitoring management method for a cloud computing environment according to the present invention.
Fig. 3 is a block diagram of a data security module in a server abnormal behavior monitoring and management method for a cloud computing environment according to the present invention.
Fig. 4 is a block diagram of an intrusion prevention module in the server abnormal behavior monitoring and management method for the cloud computing environment according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1 to 4, the server abnormal behavior monitoring and management method for a cloud computing environment according to the present invention includes a computing node, a management server, a BGP, and a total data center; the BGP is respectively in communication connection with the management server and the total data center; the total data center comprises a data acquisition system and a data storage system;
the computing node is used for computing and processing the distributed data;
the management server is used for processing and analyzing the small programs to obtain results and returning the results to the user;
BGP, routing protocol for connecting independent system on Internet, controlling route transmission and selecting best route;
the total data center is used for storing the internet information and the user information and updating the user information in time;
the data acquisition system comprises a data security module and an intrusion protection module; wherein the content of the first and second substances,
the data security module is used for protecting the security of data in the cloud computing and preventing information leakage and the like;
the intrusion prevention module is used for preventing malicious attacks and intrusion behaviors;
the data storage system comprises a normal characteristic database and an abnormal characteristic database; wherein the content of the first and second substances,
the normal characteristic database is used for collecting and storing some special characteristics in the cloud computing system under normal conditions, and updating the database according to maintenance and updating of the system;
and the abnormal characteristic database is used for collecting and storing the change characteristics inside the cloud computing system when the cloud computing system receives malicious attacks and intrusions, and timely updating and early warning the characteristics which are not stored but have abnormal changes so as to prevent the intrusion.
In an alternative embodiment, the compute nodes and the management server are provided in multiple groups.
In an alternative embodiment, a firewall is disposed between the BGP and the overall data center.
In an optional embodiment, the data security module comprises a maintenance module, a detection module, a data retention module and a security access module;
the maintenance module is used for clicking operation and backing up and recovering all data;
the detection module is used for data inspection and perfecting risks existing in the data;
the data retention module is used for prompting whether to delete the data file or not, and if not, the data file is automatically poured into the database;
and the security access module is used for guaranteeing the security of the access of the cloud platform set.
In an optional embodiment, the intrusion prevention module comprises vulnerability scanning, privacy protection, dynamic service, data encryption, Trojan horse scanning, counterfeit monitoring and content monitoring;
vulnerability scanning, which is used for carrying out vulnerability scanning on the added data to prevent malicious invasion;
the privacy protection is used for protecting user data and preventing data leakage;
the dynamic service is used for providing a dynamic code and identifying the identity of the user;
data encryption, which is used for encrypting data of different levels of a user and increasing the protection degree of different data;
trojan horse scanning, which is used for scanning Trojan horse virus and treating the Trojan horse virus to prevent system poisoning;
counterfeit monitoring for identifying the user and the accuracy of the data;
and monitoring the content, screening the uploaded data, reporting and managing the illegal data and punishing a penalty.
In an alternative embodiment, the data of the normal feature database and the abnormal feature database are continuously updated according to the upgrade of the system.
In an optional embodiment, the total data center is further provided with an alarm module for warning when unsafe behaviors such as intrusion occur.
The server abnormal behavior monitoring and management method facing the cloud computing environment comprises the following steps;
s1, connecting the total data center to the Internet, and collecting and storing the data to be processed;
s2, safety detection is carried out through a data safety module in the data acquisition system, meanwhile, when data are stored, data are firstly checked, and risks existing in the data are perfected; then prompting whether to delete the data file according to the data retention module, automatically pouring the data file into a database if the data file is not deleted, and finally performing click operation and performing backup and recovery on all data; the safety of the access of the cloud platform set is guaranteed; after data security is determined, vulnerability scanning is carried out on added data through vulnerability scanning and Trojan horse scanning to prevent malicious invasion, Trojan horse viruses are scanned and processed to prevent system poisoning, and user identities are identified through dynamic codes through dynamic services; protecting user data, and preventing data leakage; data of different levels are encrypted, and the protection degree of different data is increased; finally, screening the uploaded data, reporting and managing the illegal data and punishing a penalty;
and S3, providing service for the client, decomposing the huge data calculation processing program into countless small programs, and processing and analyzing the small programs by a system consisting of a plurality of servers to obtain results and returning the results to the user.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (8)

1. A server abnormal behavior monitoring and management method facing a cloud computing environment is characterized by comprising a computing node, a management server, BGP and a total data center; the BGP is respectively in communication connection with the management server and the total data center; the total data center comprises a data acquisition system and a data storage system;
the computing node is used for computing and processing the distributed data;
the management server is used for processing and analyzing the small programs to obtain results and returning the results to the user;
BGP, routing protocol for connecting independent system on Internet, controlling route transmission and selecting best route;
the total data center is used for storing the internet information and the user information and updating the user information in time;
the data acquisition system comprises a data security module and an intrusion protection module; wherein the content of the first and second substances,
the data security module is used for protecting the security of data in the cloud computing and preventing information leakage and the like;
the intrusion prevention module is used for preventing malicious attacks and intrusion behaviors;
the data storage system comprises a normal characteristic database and an abnormal characteristic database; wherein the content of the first and second substances,
the normal characteristic database is used for collecting and storing some special characteristics in the cloud computing system under normal conditions, and updating the database according to maintenance and updating of the system;
and the abnormal characteristic database is used for collecting and storing the change characteristics inside the cloud computing system when the cloud computing system receives malicious attacks and intrusions, and timely updating and early warning the characteristics which are not stored but have abnormal changes so as to prevent the intrusion.
2. The method for monitoring and managing the abnormal behavior of the server in the cloud computing environment according to claim 1, wherein a plurality of groups of the computing nodes and the management server are provided.
3. The method for monitoring and managing abnormal behaviors of the server in the cloud computing environment according to claim 1, wherein a firewall is arranged between the BGP and the total data center.
4. The cloud computing environment-oriented server abnormal behavior monitoring and management method as claimed in claim 1, wherein the data security module comprises a maintenance module, a detection module, a data retention module and a security access module;
the maintenance module is used for clicking operation and backing up and recovering all data;
the detection module is used for data inspection and perfecting risks existing in the data;
the data retention module is used for prompting whether to delete the data file or not, and if not, the data file is automatically poured into the database;
and the security access module is used for guaranteeing the security of the access of the cloud platform set.
5. The cloud computing environment-oriented server abnormal behavior monitoring and management method as claimed in claim 1, wherein the intrusion prevention module comprises vulnerability scanning, privacy protection, dynamic service, data encryption, trojan scanning, counterfeit monitoring and content monitoring;
vulnerability scanning, which is used for carrying out vulnerability scanning on the added data to prevent malicious invasion;
the privacy protection is used for protecting user data and preventing data leakage;
the dynamic service is used for providing a dynamic code and identifying the identity of the user;
data encryption, which is used for encrypting data of different levels of a user and increasing the protection degree of different data;
trojan horse scanning, which is used for scanning Trojan horse virus and treating the Trojan horse virus to prevent system poisoning;
counterfeit monitoring for identifying the user and the accuracy of the data;
and monitoring the content, screening the uploaded data, reporting and managing the illegal data and punishing a penalty.
6. The method for monitoring and managing the abnormal behavior of the server in the cloud computing environment as claimed in claim 1, wherein the data of the normal feature database and the abnormal feature database are continuously updated according to the upgrade of the system.
7. The cloud computing environment-oriented server abnormal behavior monitoring and management method according to claim 1, wherein the total data center is further provided with a warning module for warning when unsafe behaviors such as intrusion occur.
8. The method for monitoring and managing the abnormal server behaviors facing the cloud computing environment according to any one of claims 1 to 7, further comprising a method for monitoring and managing the abnormal server behaviors facing the cloud computing environment, specifically comprising the following steps;
s1, connecting the total data center to the Internet, and collecting and storing the data to be processed;
s2, safety detection is carried out through a data safety module in the data acquisition system, meanwhile, when data are stored, data are firstly checked, and risks existing in the data are perfected; then prompting whether to delete the data file according to the data retention module, automatically pouring the data file into a database if the data file is not deleted, and finally performing click operation and performing backup and recovery on all data; the safety of the access of the cloud platform set is guaranteed; after data security is determined, vulnerability scanning is carried out on added data through vulnerability scanning and Trojan horse scanning to prevent malicious invasion, Trojan horse viruses are scanned and processed to prevent system poisoning, and user identities are identified through dynamic codes through dynamic services; protecting user data, and preventing data leakage; data of different levels are encrypted, and the protection degree of different data is increased; finally, screening the uploaded data, reporting and managing the illegal data and punishing a penalty;
and S3, providing service for the client, decomposing the huge data calculation processing program into countless small programs, and processing and analyzing the small programs by a system consisting of a plurality of servers to obtain results and returning the results to the user.
CN202011091167.5A 2020-10-13 2020-10-13 Server abnormal behavior monitoring and management method oriented to cloud computing environment Withdrawn CN112261017A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011091167.5A CN112261017A (en) 2020-10-13 2020-10-13 Server abnormal behavior monitoring and management method oriented to cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011091167.5A CN112261017A (en) 2020-10-13 2020-10-13 Server abnormal behavior monitoring and management method oriented to cloud computing environment

Publications (1)

Publication Number Publication Date
CN112261017A true CN112261017A (en) 2021-01-22

Family

ID=74242085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011091167.5A Withdrawn CN112261017A (en) 2020-10-13 2020-10-13 Server abnormal behavior monitoring and management method oriented to cloud computing environment

Country Status (1)

Country Link
CN (1) CN112261017A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118018326A (en) * 2024-04-08 2024-05-10 深圳众投互联信息技术有限公司 Data security encryption method and system based on distributed storage
CN118018326B (en) * 2024-04-08 2024-06-07 深圳众投互联信息技术有限公司 Data security encryption method and system based on distributed storage

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118018326A (en) * 2024-04-08 2024-05-10 深圳众投互联信息技术有限公司 Data security encryption method and system based on distributed storage
CN118018326B (en) * 2024-04-08 2024-06-07 深圳众投互联信息技术有限公司 Data security encryption method and system based on distributed storage

Similar Documents

Publication Publication Date Title
Ahmed et al. Scada systems: Challenges for forensic investigators
Tien et al. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
Tahboub et al. Data leakage/loss prevention systems (DLP)
US20140172495A1 (en) System and method for automated brand protection
Thuraisingham et al. Data mining for security applications
Ramaki et al. A survey of IT early warning systems: architectures, challenges, and solutions
Boranbayev et al. The modern state and the further development prospects of information security in the Republic of Kazakhstan
CN108369541A (en) The system and method for threat risk score for security threat
CN111614639A (en) Network security analysis method based on boundary theory
Kizza System intrusion detection and prevention
CN113411297A (en) Situation awareness defense method and system based on attribute access control
Wang et al. Catching the wily hacker: A multilayer deception system
Onyshchenko et al. The Mechanism of Information Security of the National Economy in Cyberspace
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
Wang et al. Research of electric power information security protection on cloud security
Santos et al. IT/OT convergence in industry 4.0: risks and analisy of the problems
Jena et al. A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment
Ahmim et al. Taxonomy of supervised machine learning for intrusion detection systems
CN112261017A (en) Server abnormal behavior monitoring and management method oriented to cloud computing environment
Efe et al. It security trends for e-government threats
CN114205166A (en) Virus protection system
Schmüser et al. " Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine
Daukeyev IoT Devices Integration and Protection in available Infrastructure of a University computer Network
Lamaazi Cyber Security for Edge/Fog Computing Applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210122

WW01 Invention patent application withdrawn after publication