CN112464235A - Computer network safety control system and control method - Google Patents

Computer network safety control system and control method Download PDF

Info

Publication number
CN112464235A
CN112464235A CN202011349433.XA CN202011349433A CN112464235A CN 112464235 A CN112464235 A CN 112464235A CN 202011349433 A CN202011349433 A CN 202011349433A CN 112464235 A CN112464235 A CN 112464235A
Authority
CN
China
Prior art keywords
virus
module
data
program
family
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011349433.XA
Other languages
Chinese (zh)
Inventor
杜刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xijing University
Original Assignee
Xijing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xijing University filed Critical Xijing University
Priority to CN202011349433.XA priority Critical patent/CN112464235A/en
Publication of CN112464235A publication Critical patent/CN112464235A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention belongs to the technical field of computers, and discloses a computer network security control system and a control method, wherein the computer network security control system comprises: the system comprises a virus evidence obtaining module, a data processing module, a data analysis module, a central control module, a virus judgment module, a storage module, an abnormality detection module, an abnormality information acquisition module, an event reconstruction module, a comparison module, a network defense module, a data encryption module, an identity verification module and a decryption module. According to the invention, the virus judgment result, namely the information of the existing virus, is obtained through the evidence obtaining, processing and analysis of the virus, so that the network event can be conveniently restored; detecting network abnormality, determining information of viruses causing the network abnormality and performing targeted defense; the network defense is carried out, meanwhile, the internal information of the computer is encrypted, and the encrypted information is decrypted by verifying the identity information, so that the internal data of the computer can be protected, and the real-time protection of the computer is realized.

Description

Computer network safety control system and control method
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a computer network security control system and a control method.
Background
At present: with the advance of technology, computers are an indispensable part of people's lives, and with the increase of utilization rate, the frequency of attacks on computer networks is gradually increasing, and the computers connected to the networks are often subjected to operation commands and programs from the networks, or receive network data containing viruses, or suffer from illegal intrusion, so that the system is interfered, and even the system is broken down. The main stream mode of computer network attack is to transmit the external database to the protection host to destroy the system of the protection host, and then to attack the protection host by destroying the hardware device of the protection host. However, currently, there is no method for performing system analysis on viruses and implementing virus defense, and effective protection on computer network security cannot be implemented.
Through the above analysis, the problems and defects of the prior art are as follows: at present, a method for carrying out system analysis on viruses and realizing virus defense is unavailable, and effective protection on computer network safety cannot be realized.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a computer network security control system and a control method.
The present invention is achieved as described above, and a computer network security control system includes:
the system comprises a virus evidence obtaining module, a data processing module, a data analysis module, a central control module, a virus judgment module, a storage module, an abnormality detection module, an abnormality information acquisition module, an event reconstruction module, a comparison module, a network defense module, a data encryption module, an identity verification module and a decryption module;
the virus forensics module is connected with the central control module and is used for acquiring virus information through a virus forensics program;
the data processing module is connected with the central control module and used for processing the acquired virus data through a data processing program;
the data analysis module is connected with the central control module and is used for analyzing the processed virus data through a data analysis program;
the central control module is connected with the virus evidence obtaining module, the data processing module, the data analysis module, the virus judgment module, the storage module, the abnormality detection module, the abnormality information acquisition module, the event reconstruction module, the comparison module, the network defense module, the data encryption module, the identity verification module and the decryption module and is used for controlling the normal operation of each module through the main control computer;
the virus judging module is connected with the central control module and used for judging viruses according to the virus data analysis result through a virus judging program to obtain virus malicious behaviors;
the storage module is connected with the central control module and used for storing the virus judgment result through the memory;
the abnormality detection module is connected with the central control module and is used for detecting network safety abnormality through an abnormality detection program;
the abnormal information acquisition module is connected with the central control module and is used for acquiring abnormal information through an abnormal information acquisition program;
the event reconstruction module is connected with the central control module and is used for reconstructing the virus event according to the virus judgment result through an event reconstruction program;
the comparison module is connected with the central control module and is used for comparing the abnormal information with the reconstructed virus event through a comparison program to obtain a virus comparison result;
the network defense module is connected with the central control module and is used for performing network defense according to the virus comparison result through a network defense program;
the data encryption module is connected with the central control module and is used for encrypting the internal data of the computer through a data encryption program;
the identity authentication module is connected with the central control module and is used for carrying out user identity authentication through an identity authentication program;
and the decryption module is connected with the central control module and is used for decrypting the encrypted data after the authentication passes through the decryption program.
Another object of the present invention is to provide a computer network security control method, including the steps of:
acquiring virus information by using a virus forensics program through a virus forensics module; processing the acquired virus data by a data processing program through a data processing module; analyzing the processed virus data by using a data analysis program through a data analysis module;
when the data analysis program analyzes the virus data, the data analysis program specifically comprises:
storing the processed virus data as a data set, and acquiring a first data characteristic of the data set and a second data characteristic preset in a virus library, wherein the first data characteristic comprises a first number of first sub-characteristics, and the second data characteristic comprises a second number of second sub-characteristics;
judging whether the ratio of the first quantity to the second quantity meets a preset ratio or not;
determining that the similarity of the two data features to be identified is not greater than a preset threshold value under the condition that the ratio of the first quantity to the second quantity does not accord with a preset ratio;
under the condition that the ratio of the first quantity to the second quantity accords with a preset ratio, calculating the similarity of the first data to be identified and the second data to be identified, and judging whether the similarity is greater than a preset threshold value or not;
step two, the processing results of each module are sorted through a central control module, the sorted data are transmitted to another module for further processing, and a main control computer is used for controlling each controlled module to normally operate;
thirdly, judging the virus by a virus judging module according to the virus data analysis result by using a virus judging program to obtain virus malicious behaviors; storing the virus judgment result by using a memory through a storage module;
fourthly, detecting network security abnormity by utilizing an abnormity detection program through an abnormity detection module; acquiring abnormal information by using an abnormal information acquisition program through an abnormal information acquisition module;
reconstructing the virus event according to the virus judgment result by using an event reconstruction program through an event reconstruction module; comparing the abnormal information with the reconstructed virus event by using a comparison program through a comparison module to obtain a virus comparison result; performing network defense by using a network defense program through a network defense module according to the virus comparison result;
the network defense includes: grading the danger degree of the data, wherein the danger degree is divided into slight danger, moderate danger and severe danger, antivirus software is started for the slight danger and the moderate danger for searching and killing, when the antivirus software is started for searching and killing for the severe danger, file access and network connection are terminated firstly, a danger prompt box is skipped out, whether the network connection is closed or not is manually selected for carrying out network breaking processing and damaging suspicious files, and a virus database records detected virus data for improving the detection success rate and the accuracy rate of a detection program and reducing the detection error of the detection program;
step six, encrypting the internal data of the computer by using a data encryption program through a data encryption module; carrying out user identity authentication by an identity authentication module by using an identity authentication program; and decrypting the encrypted data after the authentication is passed by using a decryption program through the decryption module.
Further, in the first step, the obtaining of the virus information by the virus forensics module using the virus forensics program includes: and acquiring the known viruses and the information of the viruses from the database.
Further, in the third step, the determining the virus by the virus determining module using the virus determining program according to the virus data analysis result to obtain the malicious behavior of the virus includes:
(1) searching and obtaining virus information from a preset virus analysis website according to a preset annotation of a virus classification keyword;
(2) acquiring characteristic parameters in the virus information;
(3) and according to the characteristic parameters, carrying out qualitative analysis on the virus malicious behaviors.
Further, in the fourth step, the detecting the network security abnormality by the abnormality detecting module using the abnormality detecting program includes: by means of an application program interface tracker; or an antivirus software trap mode; or a login trap mode of electronic banking and games; or a file and registry monitoring mode; or in a network environment.
Further, in the fifth step, the comparing module compares the abnormal information with the reconstructed virus event by using the comparison program to obtain a virus comparison result, and the method includes:
(1) obtaining a virus family set, wherein the virus family set comprises at least one virus family; constructing a corresponding family model for each virus family to obtain a family model set corresponding to the virus family set;
(2) acquiring newly increased viruses, and acquiring a target virus family according to the newly increased viruses;
(3) extracting a first virus family model corresponding to the target virus family from the family model set;
(4) acquiring a logic relationship between the newly added virus and each family member in the target virus family, and adding the newly added virus to the first virus family model according to the logic relationship to obtain a second virus family model;
(5) generating an analysis result of the newly added virus according to the second virus family model;
(6) and comparing the analysis result of the newly added virus with the reconstructed virus event to obtain a virus comparison result.
Further, in step (1), the constructing a corresponding family model for each virus family includes: acquiring a logical relationship among all family members of the virus family, wherein the family members comprise virus files and association domains; constructing a virus family directed graph according to the logical relationship among all family members; traversing the virus family directed graph to obtain at least one target set to be merged, wherein elements in the target set to be merged have the same topology; and clustering each element in each target set to be merged, and merging according to clustering results to obtain a virus family model corresponding to the virus family directed graph.
Further, the clustering each element in each target set to be merged and merging according to the clustering result to obtain a virus family model corresponding to the virus family directed graph includes:
judging whether elements in each target set to be merged are similar, and clustering according to the judgment result to obtain a clustering result; merging the elements which are clustered into one class in the clustering result into a comprehensive node so as to obtain a virus family model topology corresponding to the virus family directed graph; and sequencing the family members included in each comprehensive node according to the generation sequence of the family members to obtain a virus family model.
Further, in the sixth step, the encrypting internal data of the computer by the data encryption module using the data encryption program includes:
(1) receiving a data encryption request;
(2) selecting a key and a key label for identifying the key in a preset mode;
(3) encrypting the data carried by the encryption request by using the secret key;
(4) and outputting the encrypted data and the key label to finish encryption.
Further, in step (2), the key is obtained from a key pool of a key sequence generated for performing a quantum key distribution operation.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the invention, the virus judgment result, namely the information of the existing virus, is obtained through the evidence obtaining, processing and analysis of the virus, so that the network event can be conveniently restored; detecting network abnormality, comparing the abnormal information with known virus information, determining information of the virus causing the network abnormality and performing targeted defense; the network defense is carried out, meanwhile, the internal information of the computer is encrypted, and the encrypted information is decrypted by verifying the identity information, so that the internal data of the computer can be protected, and the real-time protection of the computer is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of a computer network security control method according to an embodiment of the present invention.
Fig. 2 is a flowchart of an embodiment of the present invention for determining a virus by a virus determination module according to a virus data analysis result by using a virus determination program to obtain a virus malicious behavior.
Fig. 3 is a flowchart for comparing the abnormal information with the reconstructed virus event by using the comparison module to obtain a virus comparison result according to the embodiment of the present invention.
Fig. 4 is a flowchart of encrypting internal data of a computer by a data encryption module using a data encryption program according to an embodiment of the present invention.
Fig. 5 is a flowchart of a method for analyzing virus data by a data analysis program according to an embodiment of the present invention.
Fig. 6 is a block diagram of a computer network security control system according to an embodiment of the present invention;
in fig. 1: 1. a virus forensics module; 2. a data processing module; 3. a data analysis module; 4. a central control module; 5. a virus determination module; 6. a storage module; 7. an anomaly detection module; 8. an abnormal information acquisition module; 9. an event reconstruction module; 10. a comparison module; 11. a network defense module; 12. a data encryption module; 13. an identity verification module; 14. and a decryption module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a computer network security control system and a control method thereof, which will be described in detail with reference to the accompanying drawings.
As shown in fig. 1, the computer network security control method provided by the embodiment of the present invention includes the following steps:
s101, acquiring virus information by using a virus forensics program through a virus forensics module; processing the acquired virus data by a data processing program through a data processing module; analyzing the processed virus data by using a data analysis program through a data analysis module;
s102, the processing results of each module are sorted through a central control module, the sorted data are transmitted to another module for further processing, and a main control computer is used for controlling each controlled module to normally operate;
s103, virus judgment is carried out by a virus judgment module according to the virus data analysis result by using a virus judgment program, and virus malicious behaviors are obtained; storing the virus judgment result by using a memory through a storage module;
s104, detecting network security abnormity by using an abnormity detection program through an abnormity detection module; acquiring abnormal information by using an abnormal information acquisition program through an abnormal information acquisition module;
s105, utilizing an event reconstruction program to reconstruct the virus event according to the virus judgment result through an event reconstruction module; comparing the abnormal information with the reconstructed virus event by using a comparison program through a comparison module to obtain a virus comparison result; performing network defense by using a network defense program through a network defense module according to the virus comparison result;
s106, encrypting the internal data of the computer by using a data encryption program through a data encryption module; carrying out user identity authentication by an identity authentication module by using an identity authentication program; and decrypting the encrypted data after the authentication is passed by using a decryption program through the decryption module.
In step S101 in the embodiment of the present invention, acquiring virus information by using a virus forensics program through a virus forensics module includes: and acquiring the known viruses and the information of the viruses from the database.
As shown in fig. 2, in step S103 in the embodiment of the present invention, the virus determining module performs virus determination according to the virus data analysis result by using a virus determining program, so as to obtain a virus malicious behavior, including:
s201, searching and obtaining virus information from a preset virus analysis website according to a preset annotation of a virus classification keyword;
s202, acquiring characteristic parameters in the virus information;
and S203, according to the characteristic parameters, carrying out qualitative analysis on the virus malicious behaviors.
In step S104, the detecting network security abnormality by the abnormality detecting module using the abnormality detecting program according to the embodiment of the present invention includes: by means of an application program interface tracker; or an antivirus software trap mode; or a login trap mode of electronic banking and games; or a file and registry monitoring mode; or in a network environment.
As shown in fig. 3, in step S105 in the embodiment of the present invention, the comparing module performs comparison between the abnormal information and the reconstructed virus event by using the comparison program, so as to obtain a virus comparison result, where the comparing module includes:
s301, acquiring a virus family set, wherein the virus family set comprises at least one virus family; constructing a corresponding family model for each virus family to obtain a family model set corresponding to the virus family set;
s302, acquiring newly added viruses, and acquiring a target virus family according to the newly added viruses;
s303, extracting a first virus family model corresponding to the target virus family from the family model set;
s304, acquiring a logical relationship between the newly added virus and each family member in the target virus family, and adding the newly added virus to the first virus family model according to the logical relationship to obtain a second virus family model;
s305, generating an analysis result of the newly added virus according to the second virus family model;
s306, comparing the analysis result of the newly added virus with the reconstructed virus event to obtain a virus comparison result.
In step S301 in the embodiment of the present invention, the constructing a corresponding family model for each virus family includes: acquiring a logical relationship among all family members of the virus family, wherein the family members comprise virus files and association domains; constructing a virus family directed graph according to the logical relationship among all family members; traversing the virus family directed graph to obtain at least one target set to be merged, wherein elements in the target set to be merged have the same topology; and clustering each element in each target set to be merged, and merging according to clustering results to obtain a virus family model corresponding to the virus family directed graph.
In step S105 in the embodiment of the present invention, the network defense includes: the method comprises the steps of grading the danger degree of data, wherein the danger degree of the data is divided into slight danger, moderate danger and severe danger, enabling antivirus software to check and kill the slight danger and the moderate danger, when the antivirus software is enabled to check and kill the severe danger, stopping file access and network connection, jumping out of a danger prompt box, manually selecting whether to close the network connection to conduct network breaking processing and damage suspicious files, and recording detected virus data by a virus database to improve the detection success rate and the accuracy of a detection program and reduce the detection error of the detection program.
The embodiment of the present invention provides a method for clustering elements in each target set to be merged and merging the elements according to a clustering result to obtain a virus family model corresponding to a virus family digraph, including:
judging whether elements in each target set to be merged are similar, and clustering according to the judgment result to obtain a clustering result; merging the elements which are clustered into one class in the clustering result into a comprehensive node so as to obtain a virus family model topology corresponding to the virus family directed graph; and sequencing the family members included in each comprehensive node according to the generation sequence of the family members to obtain a virus family model.
As shown in fig. 4, in step S106, the encrypting the internal data of the computer by the data encryption module using the data encryption program according to the embodiment of the present invention includes:
s401, receiving a data encryption request;
s402, selecting a secret key and a secret key label for identifying the secret key in a preset mode;
s403, encrypting the data carried by the encryption request by using the key;
s404, outputting the encrypted data and the key label to finish encryption.
In step S402, the key provided by the embodiment of the present invention is obtained from the key pool of the key sequence generated by executing the quantum key distribution operation.
As shown in fig. 5, when the data analysis program in the embodiment of the present invention analyzes virus data, the data analysis program specifically includes:
s501, storing the processed virus data into a data set, and acquiring first data characteristics of the data set and second data characteristics preset in a virus library, wherein the first data characteristics comprise first sub-characteristics with a first quantity, and the second data characteristics comprise second sub-characteristics with a second quantity;
s502, judging whether the ratio of the first quantity to the second quantity meets a preset ratio or not;
s503, determining that the similarity of the two data features to be identified is not greater than a preset threshold value under the condition that the ratio of the first number to the second number does not accord with a preset ratio;
s504, under the condition that the ratio of the first quantity to the second quantity accords with a preset ratio, calculating the similarity between the first data to be identified and the second data to be identified, and judging whether the similarity is larger than a preset threshold value or not;
as shown in fig. 6, the computer network security control system provided in the embodiment of the present invention includes:
the system comprises a virus evidence obtaining module 1, a data processing module 2, a data analysis module 3, a central control module 4, a virus judgment module 5, a storage module 6, an abnormality detection module 7, an abnormal information acquisition module 8, an event reconstruction module 9, a comparison module 10, a network defense module 11, a data encryption module 12, an identity verification module 13 and a decryption module 14;
the virus evidence obtaining module 1 is connected with the central control module 4 and is used for obtaining virus information through a virus evidence obtaining program;
the data processing module 2 is connected with the central control module 4 and is used for processing the acquired virus data through a data processing program;
the data analysis module 3 is connected with the central control module 4 and is used for analyzing the processed virus data through a data analysis program;
the central control module 4 is connected with the virus evidence obtaining module 1, the data processing module 2, the data analysis module 3, the virus judgment module 5, the storage module 6, the abnormality detection module 7, the abnormal information acquisition module 8, the event reconstruction module 9, the comparison module 10, the network defense module 11, the data encryption module 12, the identity verification module 13 and the decryption module 14, and is used for controlling the normal operation of each module through a main control computer;
the virus judging module 5 is connected with the central control module 4 and used for judging viruses according to the virus data analysis result through a virus judging program to obtain virus malicious behaviors;
the storage module 6 is connected with the central control module 4 and used for storing virus judgment results through a memory;
the abnormality detection module 7 is connected with the central control module 4 and is used for detecting network security abnormality through an abnormality detection program;
an abnormal information acquisition module 8 connected with the central control module 4 and used for acquiring abnormal information through an abnormal information acquisition program;
the event reconstruction module 9 is connected with the central control module 4 and is used for reconstructing the virus event according to the virus judgment result through an event reconstruction program;
the comparison module 10 is connected with the central control module 4 and used for comparing the abnormal information with the reconstructed virus event through a comparison program to obtain a virus comparison result;
the network defense module 11 is connected with the central control module 4 and used for performing network defense according to the virus comparison result through a network defense program;
the data encryption module 12 is connected with the central control module 4 and used for encrypting the internal data of the computer through a data encryption program;
the identity authentication module 13 is connected with the central control module 4 and is used for carrying out user identity authentication through an identity authentication program;
and the decryption module 14 is connected with the central control module 4 and is used for decrypting the encrypted data after the authentication is passed through a decryption program.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention, and the scope of the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made by those skilled in the art within the technical scope of the present invention disclosed herein, which is within the spirit and principle of the present invention, should be covered by the present invention.

Claims (10)

1. A computer network security control method applying the computer network security control system according to claim 1, wherein the computer network security control method comprises the steps of:
acquiring virus information by using a virus forensics program through a virus forensics module; processing the acquired virus data by a data processing program through a data processing module; analyzing the processed virus data by using a data analysis program through a data analysis module;
when the data analysis program analyzes the virus data, the data analysis program specifically comprises:
storing the processed virus data as a data set, and acquiring a first data characteristic of the data set and a second data characteristic preset in a virus library, wherein the first data characteristic comprises a first number of first sub-characteristics, and the second data characteristic comprises a second number of second sub-characteristics;
judging whether the ratio of the first quantity to the second quantity meets a preset ratio or not;
determining that the similarity of the two data features to be identified is not greater than a preset threshold value under the condition that the ratio of the first quantity to the second quantity does not accord with a preset ratio;
under the condition that the ratio of the first quantity to the second quantity accords with a preset ratio, calculating the similarity of the first data to be identified and the second data to be identified, and judging whether the similarity is greater than a preset threshold value or not;
step two, the processing results of each module are sorted through a central control module, the sorted data are transmitted to another module for further processing, and a main control computer is used for controlling each controlled module to normally operate;
thirdly, judging the virus by a virus judging module according to the virus data analysis result by using a virus judging program to obtain virus malicious behaviors; storing the virus judgment result by using a memory through a storage module;
fourthly, detecting network security abnormity by utilizing an abnormity detection program through an abnormity detection module; acquiring abnormal information by using an abnormal information acquisition program through an abnormal information acquisition module;
reconstructing the virus event according to the virus judgment result by using an event reconstruction program through an event reconstruction module; comparing the abnormal information with the reconstructed virus event by using a comparison program through a comparison module to obtain a virus comparison result; performing network defense by using a network defense program through a network defense module according to the virus comparison result;
the network defense includes: grading the danger degree of the data, wherein the danger degree is divided into slight danger, moderate danger and severe danger, antivirus software is started for the slight danger and the moderate danger for searching and killing, when the antivirus software is started for searching and killing for the severe danger, file access and network connection are terminated firstly, a danger prompt box is skipped out, whether the network connection is closed or not is manually selected for carrying out network breaking processing and damaging suspicious files, and a virus database records detected virus data for improving the detection success rate and the accuracy rate of a detection program and reducing the detection error of the detection program;
step six, encrypting the internal data of the computer by using a data encryption program through a data encryption module; carrying out user identity authentication by an identity authentication module by using an identity authentication program; and decrypting the encrypted data after the authentication is passed by using a decryption program through the decryption module.
2. The computer network security control method of claim 1, wherein in step one, the obtaining of the virus information by the virus forensics module using the virus forensics program comprises: and acquiring the known viruses and the information of the viruses from the database.
3. The computer network security control method of claim 1, wherein in step three, the determining the virus by the virus determination module using the virus determination program according to the virus data analysis result to obtain the virus malicious behavior comprises:
(1) searching and obtaining virus information from a preset virus analysis website according to a preset annotation of a virus classification keyword;
(2) acquiring characteristic parameters in the virus information;
(3) and according to the characteristic parameters, carrying out qualitative analysis on the virus malicious behaviors.
4. The computer network security control method of claim 1, wherein the step four, the detecting the network security anomaly by the anomaly detection module using the anomaly detection program, comprises: by means of an application program interface tracker; or an antivirus software trap mode; or a login trap mode of electronic banking and games; or a file and registry monitoring mode; or in a network environment.
5. The computer network security control method of claim 1, wherein in step five, the comparing module performs a comparison between the abnormal information and the reconstructed virus event by using a comparison program to obtain a virus comparison result, and the method comprises:
(1) obtaining a virus family set, wherein the virus family set comprises at least one virus family; constructing a corresponding family model for each virus family to obtain a family model set corresponding to the virus family set;
(2) acquiring newly increased viruses, and acquiring a target virus family according to the newly increased viruses;
(3) extracting a first virus family model corresponding to the target virus family from the family model set;
(4) acquiring a logic relationship between the newly added virus and each family member in the target virus family, and adding the newly added virus to the first virus family model according to the logic relationship to obtain a second virus family model;
(5) generating an analysis result of the newly added virus according to the second virus family model;
(6) and comparing the analysis result of the newly added virus with the reconstructed virus event to obtain a virus comparison result.
6. The computer network security control method of claim 5, wherein in step (1), the constructing a corresponding family model for each virus family comprises: acquiring a logical relationship among all family members of the virus family, wherein the family members comprise virus files and association domains; constructing a virus family directed graph according to the logical relationship among all family members; traversing the virus family directed graph to obtain at least one target set to be merged, wherein elements in the target set to be merged have the same topology; and clustering each element in each target set to be merged, and merging according to clustering results to obtain a virus family model corresponding to the virus family directed graph.
7. The computer network security control method of claim 6, wherein the clustering the elements in each target set to be merged and merging the elements according to the clustering result to obtain the virus family model corresponding to the virus family directed graph comprises:
judging whether elements in each target set to be merged are similar, and clustering according to the judgment result to obtain a clustering result; merging the elements which are clustered into one class in the clustering result into a comprehensive node so as to obtain a virus family model topology corresponding to the virus family directed graph; and sequencing the family members included in each comprehensive node according to the generation sequence of the family members to obtain a virus family model.
8. The computer network security control method of claim 1, wherein in step six, the encrypting the internal data of the computer by the data encryption module using the data encryption program comprises:
(1) receiving a data encryption request;
(2) selecting a key and a key label for identifying the key in a preset mode;
(3) encrypting the data carried by the encryption request by using the secret key;
(4) and outputting the encrypted data and the key label to finish encryption.
9. The computer network security control method of claim 8, wherein in step (2), the key is obtained from a key pool of a key sequence generated by performing a quantum key distribution operation.
10. A computer network security control system for use in the computer network security control method according to any one of claims 1 to 9, the computer network security control system comprising:
the virus forensics module is connected with the central control module and is used for acquiring virus information through a virus forensics program;
the data processing module is connected with the central control module and used for processing the acquired virus data through a data processing program;
the data analysis module is connected with the central control module and is used for analyzing the processed virus data through a data analysis program;
the central control module is connected with the virus evidence obtaining module, the data processing module, the data analysis module, the virus judgment module, the storage module, the abnormality detection module, the abnormality information acquisition module, the event reconstruction module, the comparison module, the network defense module, the data encryption module, the identity verification module and the decryption module and is used for controlling the normal operation of each module through the main control computer;
the virus judging module is connected with the central control module and used for judging viruses according to the virus data analysis result through a virus judging program to obtain virus malicious behaviors;
the storage module is connected with the central control module and used for storing the virus judgment result through the memory;
the abnormality detection module is connected with the central control module and is used for detecting network safety abnormality through an abnormality detection program;
the abnormal information acquisition module is connected with the central control module and is used for acquiring abnormal information through an abnormal information acquisition program;
the event reconstruction module is connected with the central control module and is used for reconstructing the virus event according to the virus judgment result through an event reconstruction program;
the comparison module is connected with the central control module and is used for comparing the abnormal information with the reconstructed virus event through a comparison program to obtain a virus comparison result;
the network defense module is connected with the central control module and is used for performing network defense according to the virus comparison result through a network defense program;
the data encryption module is connected with the central control module and is used for encrypting the internal data of the computer through a data encryption program;
the identity authentication module is connected with the central control module and is used for carrying out user identity authentication through an identity authentication program;
and the decryption module is connected with the central control module and is used for decrypting the encrypted data after the authentication passes through the decryption program.
CN202011349433.XA 2020-11-26 2020-11-26 Computer network safety control system and control method Pending CN112464235A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011349433.XA CN112464235A (en) 2020-11-26 2020-11-26 Computer network safety control system and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011349433.XA CN112464235A (en) 2020-11-26 2020-11-26 Computer network safety control system and control method

Publications (1)

Publication Number Publication Date
CN112464235A true CN112464235A (en) 2021-03-09

Family

ID=74808819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011349433.XA Pending CN112464235A (en) 2020-11-26 2020-11-26 Computer network safety control system and control method

Country Status (1)

Country Link
CN (1) CN112464235A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395694A (en) * 2021-06-23 2021-09-14 深圳市凯莱特科技股份有限公司 Intelligent security defense system and defense method based on 5G and local area base station

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098226A (en) * 2006-06-27 2008-01-02 飞塔信息科技(北京)有限公司 Online real-time virus processing system and method
CN105095752A (en) * 2014-05-07 2015-11-25 腾讯科技(深圳)有限公司 Identification method, apparatus and system of virus packet
CN107347058A (en) * 2016-05-06 2017-11-14 阿里巴巴集团控股有限公司 Data ciphering method, data decryption method, apparatus and system
CN107818261A (en) * 2017-09-12 2018-03-20 王振铎 A kind of computer information safe stocking system
CN109829304A (en) * 2018-12-29 2019-05-31 北京奇安信科技有限公司 A kind of method for detecting virus and device
CN110311913A (en) * 2019-07-03 2019-10-08 上海应用技术大学 Computer Network Security System, application method, equipment and storage medium
CN110321704A (en) * 2019-07-08 2019-10-11 温州中壹技术研究院有限公司 A kind of computer information safe stocking system
CN110457903A (en) * 2019-07-24 2019-11-15 腾讯科技(深圳)有限公司 A kind of virus analysis method, apparatus, equipment and medium
CN111404948A (en) * 2020-03-22 2020-07-10 云南电网有限责任公司信息中心 Security system and method based on computer network monitoring
CN111865974A (en) * 2020-07-17 2020-10-30 上海国际技贸联合有限公司 Network security defense system and method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098226A (en) * 2006-06-27 2008-01-02 飞塔信息科技(北京)有限公司 Online real-time virus processing system and method
CN105095752A (en) * 2014-05-07 2015-11-25 腾讯科技(深圳)有限公司 Identification method, apparatus and system of virus packet
CN107347058A (en) * 2016-05-06 2017-11-14 阿里巴巴集团控股有限公司 Data ciphering method, data decryption method, apparatus and system
CN107818261A (en) * 2017-09-12 2018-03-20 王振铎 A kind of computer information safe stocking system
CN109829304A (en) * 2018-12-29 2019-05-31 北京奇安信科技有限公司 A kind of method for detecting virus and device
CN110311913A (en) * 2019-07-03 2019-10-08 上海应用技术大学 Computer Network Security System, application method, equipment and storage medium
CN110321704A (en) * 2019-07-08 2019-10-11 温州中壹技术研究院有限公司 A kind of computer information safe stocking system
CN110457903A (en) * 2019-07-24 2019-11-15 腾讯科技(深圳)有限公司 A kind of virus analysis method, apparatus, equipment and medium
CN111404948A (en) * 2020-03-22 2020-07-10 云南电网有限责任公司信息中心 Security system and method based on computer network monitoring
CN111865974A (en) * 2020-07-17 2020-10-30 上海国际技贸联合有限公司 Network security defense system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395694A (en) * 2021-06-23 2021-09-14 深圳市凯莱特科技股份有限公司 Intelligent security defense system and defense method based on 5G and local area base station

Similar Documents

Publication Publication Date Title
Bridges et al. A survey of intrusion detection systems leveraging host data
Biggio et al. Poisoning behavioral malware clustering
Shu et al. Unearthing stealthy program attacks buried in extremely long execution paths
RU2680736C1 (en) Malware files in network traffic detection server and method
Liang et al. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
WO2011018271A1 (en) Malware detection
CN112487383A (en) Computer system for ensuring information safety and control method thereof
Aslan et al. Using a subtractive center behavioral model to detect malware
CN111800405A (en) Detection method, detection device and storage medium
Belal et al. Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
CN115758355A (en) Lesojous software defense method and system based on fine-grained access control
JP7470116B2 (en) Secure communication method and system thereof
Rosli et al. Clustering analysis for malware behavior detection using registry data
CN113411295A (en) Role-based access control situation awareness defense method and system
CN113411297A (en) Situation awareness defense method and system based on attribute access control
US11349855B1 (en) System and method for detecting encrypted ransom-type attacks
Rani A review of intrusion detection system in cloud computing
CN112464235A (en) Computer network safety control system and control method
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
CN112417473A (en) Big data security management system
Borhan et al. A framework of TPM, SVM and boot control for securing forensic logs
KR20210025448A (en) Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis
Weng et al. TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators.
CN115085956A (en) Intrusion detection method and device, electronic equipment and storage medium
Samantray et al. A theoretical feature-wise study of malware detection techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination