CN112769841A - Network security protection method and system based on network security equipment - Google Patents
Network security protection method and system based on network security equipment Download PDFInfo
- Publication number
- CN112769841A CN112769841A CN202110057788.XA CN202110057788A CN112769841A CN 112769841 A CN112769841 A CN 112769841A CN 202110057788 A CN202110057788 A CN 202110057788A CN 112769841 A CN112769841 A CN 112769841A
- Authority
- CN
- China
- Prior art keywords
- network security
- equipment
- protection
- network
- security equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000006870 function Effects 0.000 claims abstract description 63
- 230000004048 modification Effects 0.000 claims description 7
- 238000012986 modification Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application discloses a network security protection method and system based on network security equipment, the network security equipment and a readable storage medium, wherein the method comprises the following steps: determining corresponding function requirements and protection tasks according to the input network security protection request; determining corresponding network security equipment according to the functional requirements, and calling the network security equipment to execute a protection task; and when the network safety equipment completes the protection task, generating corresponding network safety protection data according to the return value of the network safety equipment. According to the method and the device, the network security equipment is uniformly managed and called, and meanwhile, the network security equipment is called as required, so that the problems that the functions of different network security equipment are single and the comprehensive calling of the functions of the equipment under a complex scene cannot be realized are solved; meanwhile, the problems of different return value formats and disordered display of different network security equipment are avoided, and the network security protection efficiency is greatly improved.
Description
Technical Field
The present application relates to the field of network security protection, and in particular, to a network security protection method and system based on a network security device, and a readable storage medium.
Background
When the network technology is spread in all corners of the society, the network security is applied to all scenes immediately, and the network can be attacked in different angles, in various forms and in different ways according to different environments. When such a complex network security situation is encountered, the security measures that should be taken should also change as the environment changes. Aiming at different attacks, different protection measures are adopted.
However, due to historical reasons or manufacturer planning reasons, a phenomenon appears in which different devices are supported by limited protection means, and network security protection functions of different devices are only fixed, but with continuous development of networks, network attack means are continuously strengthened and changed, and ideas are also changed. This situation causes that the network security device with single function is not enough to perform the security protection function, resulting in low efficiency of network security protection.
Therefore, how to improve the efficiency of network security protection is a technical problem that needs to be solved by those skilled in the art at present.
Disclosure of Invention
The application aims to provide a network security protection method and system based on network security equipment, the network security equipment and a readable storage medium, which are used for improving the efficiency of network security protection.
In order to solve the above technical problem, the present application provides a method for network security protection, including:
determining corresponding function requirements and protection tasks according to the input network security protection request;
determining corresponding network security equipment according to the function requirements, and calling the network security equipment to execute the protection task;
and when the network safety equipment completes the protection task, generating corresponding network safety protection data according to the return value of the network safety equipment.
Optionally, before determining the device to be called according to the function requirement, the method further includes:
receiving a registration request sent by network security equipment, and determining corresponding equipment information according to the registration request, wherein the equipment information comprises functions supported by the network security equipment;
and executing the registration request to complete the registration of the network security equipment, and storing the corresponding relation between the equipment information and the network security equipment in a database.
Optionally, the device information further includes a calling mode of the network security device;
determining corresponding network security equipment according to the function requirement, and calling the network security equipment to execute the protection task, wherein the method comprises the following steps:
and matching corresponding network security equipment in the database according to the function requirements, and executing a corresponding calling mode to call the network security equipment to execute the protection task.
Optionally, the method further includes:
and modifying the corresponding relation between the equipment information in the database and the network security equipment according to the input modification command.
Optionally, the method further includes:
determining network security equipment to be assembled and an assembling strategy according to an input assembling command;
and executing the assembly strategy to assemble the network security equipment to be assembled to obtain a corresponding equipment group, and performing network security protection by using the equipment group.
The present application further provides a system for network security protection based on a network security device, the system comprising:
the first determining module is used for determining corresponding function requirements and protection tasks according to the input network security protection request;
the second determining module is used for determining corresponding network security equipment according to the function requirement and calling the network security equipment to execute the protection task;
and the generating module is used for generating corresponding network safety protection data according to the return value of the network safety equipment when the network safety equipment completes the protection task.
Optionally, the receiving module is configured to receive a registration request sent by a network security device, and determine corresponding device information according to the registration request, where the device information includes a function supported by the network security device;
and the execution module is used for executing the registration request to complete the registration of the network security equipment and storing the corresponding relation between the equipment information and the network security equipment in a database.
Optionally, the device information further includes a calling mode of the network security device;
the second determining module includes:
and the matching sub-module is used for matching the corresponding network security equipment in the database according to the function requirements and executing a corresponding calling mode to call the network security equipment to execute the protection task.
The present application further provides a network security device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method for network security protection as described in any one of the above when the computer program is executed.
The present application also provides a readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the method for network security protection according to any one of the above.
The application provides a network security protection method based on network security equipment, which comprises the following steps: determining corresponding function requirements and protection tasks according to the input network security protection request; determining corresponding network security equipment according to the functional requirements, and calling the network security equipment to execute a protection task; and when the network safety equipment completes the protection task, generating corresponding network safety protection data according to the return value of the network safety equipment.
According to the technical scheme provided by the application, the corresponding function requirements and protection tasks are determined according to the input network safety protection requests, and then the corresponding network safety equipment is called according to the function requirements to execute the protection tasks, so that the network safety equipment is called as required while unified management and calling are realized, and the problems that the functions of different network safety equipment are single and comprehensive calling of the equipment functions under complex scenes cannot be realized are solved; meanwhile, when the network security equipment completes the protection task, corresponding network security protection data are generated according to the return values of the network security equipment, the problems that the return values of different network security equipment are different in format and disordered in display are solved, and the network security protection efficiency is greatly improved. The application also provides a network security protection system based on the network security device, the network security device and a readable storage medium, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for network security protection based on a network security device according to an embodiment of the present application;
fig. 2 is a block diagram of a system for network security protection based on a network security device according to an embodiment of the present application;
fig. 3 is a block diagram of a network security device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a network security protection method and system based on network security equipment, the network security equipment and a readable storage medium, which are used for improving the efficiency of network security protection.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a network security protection method based on a network security device according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: determining corresponding function requirements and protection tasks according to the input network security protection request;
based on the prior art, different devices can support limited protection means, and the network security protection functions of different devices can only be fixed, for example, scanning can only be performed when scanning is performed, other processing cannot be performed, IP blocking can only be performed when IP blocking is performed, protection rules cannot be added, the devices have single functions, and the devices cannot be well concatenated to serve as a complete capability. However, with the continuous development of networks, the network attack means are continuously strengthened and changed, and the thought is also changed. This situation causes that the network security device with single function is not enough to perform the security protection function, resulting in low efficiency of network security protection; therefore, the present application provides a network security protection method based on network security devices, which is used to solve the above problems;
the network security protection request mentioned here may be specifically input by a user, and may also be sent by invoking a service, and the source of the network security protection request is not specifically limited in the present application;
the network security protection request includes a protection task to be executed and a function requirement corresponding to the protection task to be executed, for example, the function requirement may include a scanning function requirement, a blocking IP function requirement, a protection rule function requirement, and the like.
S102: determining corresponding network security equipment according to the functional requirements, and calling the network security equipment to execute a protection task;
in the step, the corresponding network safety equipment is called according to the function requirement to execute the protection task, so that the network safety equipment is called as required while unified management and calling of the network safety equipment are realized, and the problems that the functions of different network safety equipment are single and comprehensive calling of the equipment functions under a complex scene cannot be realized are solved;
the network security device mentioned here may include but is not limited to an alpha big data device, a terminal security response system device, a Web application protection system device, etc.;
optionally, in the prior art, the problem of low network security protection efficiency is solved by adding all network security protection functions to one device, and the problem of the method is that functions are repeated, and the functions cannot be completely unified due to different implementation manners of each function, so that embodiments of the present application provide a method for integrating existing network security devices, that is, the network security devices are accessed to a unified platform through an interface or other manners, so that not only is function redevelopment avoided, but also the problem of compatibility between the devices and the functions does not need to be considered, that is, before determining the devices to be called according to the function requirements, the following steps can be performed to integrate the network security devices:
receiving a registration request sent by network security equipment, and determining corresponding equipment information according to the registration request, wherein the equipment information comprises functions supported by the network security equipment;
and executing the registration request to complete the registration of the network security equipment, and storing the corresponding relation between the equipment information and the network security equipment in a database.
Further, the device information also includes a calling mode of the network security device;
on this basis, the determining of the corresponding network security device according to the function requirement and the invoking of the network security device to execute the protection task mentioned herein may specifically be:
and matching the corresponding network security equipment in the database according to the functional requirements, and executing a corresponding calling mode to call the network security equipment to execute the protection task.
Because the equipment of different manufacturers has different coding rules, the calling modes of different network security equipment are different, for example, some network security equipment can be called through HTTP access, and some network security equipment can be called only by locally installing equipment, so that the calling modes of all network security equipment are saved in a database together when the network security equipment is registered, and further the corresponding network security equipment is called to execute a protection task according to the functional requirements.
Furthermore, when the network security device needs to be replaced, upgraded, added and deleted, the corresponding relation between the device information in the database and the network security device can be modified according to the input modification command.
S103: and when the network safety equipment completes the protection task, generating corresponding network safety protection data according to the return value of the network safety equipment.
Based on the different return value formats of the existing network security equipment, for example, some network security equipment has no return value, some network security equipment has many return values, and the return values of some network security equipment are irregular and return intermittently, so that the problem of disordered display exists, therefore, when the network security equipment completes a protection task, the application generates corresponding network security protection data according to the return values of the network security equipment, so as to facilitate further statistics of users or calling services;
optionally, the network security protection data generated according to the return value of the network security device may specifically be unified processing of the return value, and the specification is the network security protection data including the actual call number, the success number, the failure number, and the original data of the device.
Optionally, as the complexity of the network increases, the complexity of attack and prevention also becomes more and more complex, and the difficulty of network security protection increases in geometric multiples under the condition of combining multiple bottom-layer means, so that the problem of network security protection in a complex scene is difficult to solve; the screenshot of the embodiment of the application assembles the combination function for dealing with various complex scenes in a manner similar to a dragging component, so that workers do not need to call various devices and do not need to switch back and forth between the devices, and the network safety protection efficiency is greatly improved; meanwhile, some well-made basic assemblies can be reused, the reuse rate can be improved, equipment which does not act as a large device under the original single function is assembled together, and a very complex task can be completed, namely, the network security protection of a complex scene can be realized by executing the following steps:
determining network security equipment to be assembled and an assembling strategy according to an input assembling command;
and executing an assembly strategy to assemble the network security equipment to be assembled to obtain a corresponding equipment group, and performing network security protection by using the equipment group.
Based on the technical scheme, the corresponding function requirements and protection tasks are determined according to the input network safety protection requests, then the corresponding network safety equipment is called according to the function requirements to execute the protection tasks, unified management and calling of the network safety equipment are realized, meanwhile, calling of the network safety equipment according to the requirements is also realized, and further the problems that functions of different network safety equipment are single, and comprehensive calling of equipment functions under complex scenes cannot be realized are solved; meanwhile, when the network security equipment completes the protection task, corresponding network security protection data are generated according to the return values of the network security equipment, the problems that the return values of different network security equipment are different in format and disordered in display are solved, and the network security protection efficiency is greatly improved.
Referring to fig. 2, fig. 2 is a block diagram of a network security protection system based on a network security device according to an embodiment of the present disclosure.
The system may include:
a first determining module 100, configured to determine a corresponding function requirement and a protection task according to an input network security protection request;
the second determining module 200 is configured to determine a corresponding network security device according to a function requirement, and call the network security device to execute a protection task;
the generating module 400 is configured to generate corresponding network security protection data according to a return value of the network security device when the network security device completes a protection task.
On the basis of the above embodiment, in a specific embodiment, the system may further include:
the receiving module is used for receiving a registration request sent by the network security equipment and determining corresponding equipment information according to the registration request, wherein the equipment information comprises functions supported by the network security equipment;
and the execution module is used for executing the registration request to complete the registration of the network security equipment and storing the corresponding relation between the equipment information and the network security equipment in a database.
On the basis of the above embodiment, in a specific embodiment, the device information may further include a calling mode of the network security device;
the second determining module 200 may include:
and the matching sub-module is used for matching the corresponding network security equipment in the database according to the functional requirements and executing a corresponding calling mode to call the network security equipment to execute the protection task.
On the basis of the above embodiment, in a specific embodiment, the system may further include:
and the modification module is used for modifying the corresponding relation between the equipment information in the database and the network security equipment according to the input modification command.
On the basis of the above embodiment, in a specific embodiment, the system may further include:
the third determining module is used for determining the network security equipment to be assembled and an assembling strategy according to the input assembling command;
and the assembling module is used for executing an assembling strategy to assemble the network security equipment to be assembled to obtain a corresponding equipment group and performing network security protection by using the equipment group.
Since the embodiment of the system part corresponds to the embodiment of the method part, the embodiment of the system part is described with reference to the embodiment of the method part, and is not repeated here.
Referring to fig. 3, fig. 3 is a structural diagram of a network security device according to an embodiment of the present disclosure.
The network security apparatus 400 may vary significantly due to different configurations or capabilities, and may include one or more processors (CPUs) 422 (e.g., one or more processors) and memory 432, one or more storage media 430 (e.g., one or more mass storage devices) storing applications 442 or data 444. Wherein the memory 432 and storage medium 430 may be transient or persistent storage. The program stored on the storage medium 430 may include one or more modules (not shown), each of which may include a sequence of instruction operations for the device. Further, processor 422 may be configured to communicate with storage medium 430 to execute a series of instruction operations in storage medium 430 on network security device 400.
The steps in the method for network security protection described in fig. 1 above are implemented by the network security device based on the structure shown in fig. 3.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The method, system, network security device and readable storage medium for network security protection based on network security device provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Claims (10)
1. A network security protection method based on network security equipment is characterized by comprising the following steps:
determining corresponding function requirements and protection tasks according to the input network security protection request;
determining corresponding network security equipment according to the function requirements, and calling the network security equipment to execute the protection task;
and when the network safety equipment completes the protection task, generating corresponding network safety protection data according to the return value of the network safety equipment.
2. The method of claim 1, before determining the device to be invoked according to the functional requirements, further comprising:
receiving a registration request sent by network security equipment, and determining corresponding equipment information according to the registration request, wherein the equipment information comprises functions supported by the network security equipment;
and executing the registration request to complete the registration of the network security equipment, and storing the corresponding relation between the equipment information and the network security equipment in a database.
3. The method of claim 2, wherein the device information further includes a manner of invocation of the network security device;
determining corresponding network security equipment according to the function requirement, and calling the network security equipment to execute the protection task, wherein the method comprises the following steps:
and matching corresponding network security equipment in the database according to the function requirements, and executing a corresponding calling mode to call the network security equipment to execute the protection task.
4. The method of claim 2, further comprising:
and modifying the corresponding relation between the equipment information in the database and the network security equipment according to the input modification command.
5. The method of claim 1, further comprising:
determining network security equipment to be assembled and an assembling strategy according to an input assembling command;
and executing the assembly strategy to assemble the network security equipment to be assembled to obtain a corresponding equipment group, and performing network security protection by using the equipment group.
6. A system for network security protection based on network security devices, comprising:
the first determining module is used for determining corresponding function requirements and protection tasks according to the input network security protection request;
the second determining module is used for determining corresponding network security equipment according to the function requirement and calling the network security equipment to execute the protection task;
and the generating module is used for generating corresponding network safety protection data according to the return value of the network safety equipment when the network safety equipment completes the protection task.
7. The system of claim 6, further comprising:
the network security equipment comprises a receiving module, a registration module and a processing module, wherein the receiving module is used for receiving a registration request sent by network security equipment and determining corresponding equipment information according to the registration request, and the equipment information comprises functions supported by the network security equipment;
and the execution module is used for executing the registration request to complete the registration of the network security equipment and storing the corresponding relation between the equipment information and the network security equipment in a database.
8. The system of claim 7, wherein the device information further includes a manner of invocation of the network security device;
the second determining module includes:
and the matching sub-module is used for matching the corresponding network security equipment in the database according to the function requirements and executing a corresponding calling mode to call the network security equipment to execute the protection task.
9. A network security device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method for network security protection based on network security device according to any of claims 1 to 5 when executing the computer program.
10. A readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for network security protection based on a network security device according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110057788.XA CN112769841A (en) | 2021-01-15 | 2021-01-15 | Network security protection method and system based on network security equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110057788.XA CN112769841A (en) | 2021-01-15 | 2021-01-15 | Network security protection method and system based on network security equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112769841A true CN112769841A (en) | 2021-05-07 |
Family
ID=75702055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110057788.XA Pending CN112769841A (en) | 2021-01-15 | 2021-01-15 | Network security protection method and system based on network security equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112769841A (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2207322A1 (en) * | 2008-12-02 | 2010-07-14 | Kaspersky Lab Zao | Adaptive security for information devices |
CN202679411U (en) * | 2012-06-08 | 2013-01-16 | 江苏永御信息产业有限公司 | Campus network intrusion prevention system |
CN105119750A (en) * | 2015-09-08 | 2015-12-02 | 南京联成科技发展有限公司 | Distributed information security operation and maintenance management platform based on massive data |
CN107819742A (en) * | 2017-10-19 | 2018-03-20 | 北京交通大学 | A kind of system architecture and its method of Dynamical Deployment Network Security Service |
CN108965289A (en) * | 2018-07-10 | 2018-12-07 | 北京明朝万达科技股份有限公司 | A kind of network security collaboration means of defence and system |
CN109150870A (en) * | 2018-08-14 | 2019-01-04 | 中国电子科技集团公司电子科学研究院 | Network safety situation analysis and application method and system |
CN110519185A (en) * | 2019-08-28 | 2019-11-29 | 福建威盾科技集团有限公司 | A kind of method of novel across a network data exchange |
CN110620790A (en) * | 2019-10-10 | 2019-12-27 | 国网山东省电力公司信息通信公司 | Network security device linkage processing method and device |
CN111327601A (en) * | 2020-01-21 | 2020-06-23 | 广东电网有限责任公司广州供电局 | Abnormal data response method, system, device, computer equipment and storage medium |
CN111683074A (en) * | 2020-05-29 | 2020-09-18 | 国网江苏省电力有限公司信息通信分公司 | NFV-based secure network architecture and network security management method |
CN111752679A (en) * | 2020-06-22 | 2020-10-09 | 中国电子科技集团公司第五十四研究所 | Dynamic arranging device for safety service chain |
CN111901154A (en) * | 2020-07-04 | 2020-11-06 | 烽火通信科技股份有限公司 | Safety architecture system based on NFV and safety deployment and safety threat processing method |
-
2021
- 2021-01-15 CN CN202110057788.XA patent/CN112769841A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2207322A1 (en) * | 2008-12-02 | 2010-07-14 | Kaspersky Lab Zao | Adaptive security for information devices |
CN202679411U (en) * | 2012-06-08 | 2013-01-16 | 江苏永御信息产业有限公司 | Campus network intrusion prevention system |
CN105119750A (en) * | 2015-09-08 | 2015-12-02 | 南京联成科技发展有限公司 | Distributed information security operation and maintenance management platform based on massive data |
CN107819742A (en) * | 2017-10-19 | 2018-03-20 | 北京交通大学 | A kind of system architecture and its method of Dynamical Deployment Network Security Service |
CN108965289A (en) * | 2018-07-10 | 2018-12-07 | 北京明朝万达科技股份有限公司 | A kind of network security collaboration means of defence and system |
CN109150870A (en) * | 2018-08-14 | 2019-01-04 | 中国电子科技集团公司电子科学研究院 | Network safety situation analysis and application method and system |
CN110519185A (en) * | 2019-08-28 | 2019-11-29 | 福建威盾科技集团有限公司 | A kind of method of novel across a network data exchange |
CN110620790A (en) * | 2019-10-10 | 2019-12-27 | 国网山东省电力公司信息通信公司 | Network security device linkage processing method and device |
CN111327601A (en) * | 2020-01-21 | 2020-06-23 | 广东电网有限责任公司广州供电局 | Abnormal data response method, system, device, computer equipment and storage medium |
CN111683074A (en) * | 2020-05-29 | 2020-09-18 | 国网江苏省电力有限公司信息通信分公司 | NFV-based secure network architecture and network security management method |
CN111752679A (en) * | 2020-06-22 | 2020-10-09 | 中国电子科技集团公司第五十四研究所 | Dynamic arranging device for safety service chain |
CN111901154A (en) * | 2020-07-04 | 2020-11-06 | 烽火通信科技股份有限公司 | Safety architecture system based on NFV and safety deployment and safety threat processing method |
Non-Patent Citations (1)
Title |
---|
王金润等: "联动网络安全防护体系", 《山西建筑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246251B (en) | Micro-service calling method, device, system, equipment and readable storage medium | |
CN109976667B (en) | Mirror image management method, device and system | |
CN107203419B (en) | Method, device and system for calling among modules in application program | |
US9043445B2 (en) | Linking instances within a cloud computing environment | |
CN111258565B (en) | Method, system, server and storage medium for generating applet | |
CN110928548B (en) | Data processing method and device | |
CN114547569A (en) | Account login processing method and device | |
CN112631696A (en) | Service arranging method, arranging device, processor and service arranging system | |
CN114528517A (en) | View processing method and device, electronic equipment and computer readable medium | |
CN116755788A (en) | On-line rule modification method, device, equipment and storage medium | |
CN112835632A (en) | Method and device for calling end capability and computer storage medium | |
CN112905273A (en) | Service calling method and device | |
CN112769841A (en) | Network security protection method and system based on network security equipment | |
CN115061796B (en) | Execution method and system for calling between subtasks and electronic equipment | |
CN115001848A (en) | Network security protection system based on network security equipment | |
CN114553859A (en) | BMC configuration management method and device, electronic equipment and storage medium | |
CN109471849B (en) | Model processing method and device, storage medium and electronic equipment | |
CN106503577A (en) | A kind of System right management method, device and corresponding equipment | |
CN112799699A (en) | Server updating method and device | |
CN112148803A (en) | Method, device and equipment for calling tasks in block chain and readable storage medium | |
CN115080276B (en) | Application program function dynamic switching method and device, storage medium and electronic equipment | |
CN113821750B (en) | Page data processing method and system, electronic equipment and readable storage medium | |
CN118394548B (en) | Micro-front-end cross-application information sharing method and micro-front-end architecture system | |
CN110059125B (en) | Method for invoking proxy contract and related equipment | |
CN118228978A (en) | Method and device for managing calculation power identification, terminal equipment, storage medium and product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210507 |