CN113225328A - Intelligent protection system and method for multi-node network use based on block chain data - Google Patents

Intelligent protection system and method for multi-node network use based on block chain data Download PDF

Info

Publication number
CN113225328A
CN113225328A CN202110474505.1A CN202110474505A CN113225328A CN 113225328 A CN113225328 A CN 113225328A CN 202110474505 A CN202110474505 A CN 202110474505A CN 113225328 A CN113225328 A CN 113225328A
Authority
CN
China
Prior art keywords
unit
data
module
authentication
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110474505.1A
Other languages
Chinese (zh)
Inventor
黄亚党
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Qunqui Information Technology Co ltd
Original Assignee
Guangxi Qunqui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Qunqui Information Technology Co ltd filed Critical Guangxi Qunqui Information Technology Co ltd
Priority to CN202110474505.1A priority Critical patent/CN113225328A/en
Publication of CN113225328A publication Critical patent/CN113225328A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses an intelligent protection system for multi-node network based on block chain data, which belongs to the technical field of network protection, and particularly comprises a transmission unit, an authentication unit, a data acquisition unit, a processing unit, a storage unit, a backup unit and a system configuration unit, wherein the transmission unit is used for transmitting data and state information of multiple nodes in an access system, and the authentication unit is used for authenticating identity information of the multiple nodes, meanwhile, when a problem occurs, the problem can be found out through the data collected in the data collecting unit at the first time.

Description

Intelligent protection system and method for multi-node network use based on block chain data
Technical Field
The invention relates to the technical field of network protection, in particular to an intelligent protection system and method for multi-node network use based on block chain data.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, a solid trust foundation is laid by the block chain technology, a reliable cooperation mechanism is created, the block chain has a wide application prospect, the block chain is usually connected with a plurality of nodes for data interaction, the data security is very important in the data interaction process, most of protection systems applied by the existing block chain can only realize the functions of encrypting data information, authenticating identity and monitoring data, the security in the protection systems is poor, and when problems occur, the problems cannot be found in time.
Disclosure of Invention
The invention aims to provide an intelligent protection system and method for a multi-node network based on block chain data, which aim to solve the problems that the existing protection system in the background technology is poor in safety and cannot find problems in time when the problems occur.
In order to achieve the purpose, the invention provides the following technical scheme: the intelligent protection system for the use of the multi-node network based on the block chain data comprises a transmission unit, an authentication unit, a data acquisition unit, a processing unit, a storage unit, a backup unit and a system configuration unit, wherein the transmission unit is used for transmitting data and state information of the multi-node in an access system, the authentication unit is used for authenticating the identity information of the multi-node and preventing unauthorized nodes from entering the system, the data acquisition unit is used for collecting and analyzing operation data in the transmission unit, the authentication unit and the processing unit and checking whether safety violating behaviors and attacked traces exist in the system or not to ensure the safety of the system, the processing unit is used for processing the data information in the multi-node network, the storage unit is used for processing the data information and log information of the node, and the backup unit is used for backing up the data of the information stored in the storage unit, the system configuration unit is used for updating and modifying the source data in the transmission unit, the authentication unit, the data acquisition unit, the processing unit and the backup unit.
Preferably, the authentication unit is connected with the transmission unit and the processing unit, the storage unit is connected with the processing unit and the backup unit, the data acquisition unit is connected with the transmission unit, the authentication unit and the processing unit, and the system configuration unit is connected with the transmission unit, the authentication unit, the processing unit and the backup unit.
Preferably, the transmission unit comprises a sequencing module, a data state monitoring module, an isolation module, a decryption module and a network state monitoring module, the sequencing module is used for sequencing the access information of the plurality of nodes, the decryption module is used for decrypting the data of the access information of the plurality of nodes, the data state monitoring module is used for detecting the data states of a plurality of nodes to obtain system data state information, the network state monitoring module is used for detecting the network states of a plurality of nodes to obtain system network state information, the isolation module is used for tracking according to the data state and the network state in the data state monitoring module and the network state monitoring module, and screening out nodes without data state and network state updating within 30min, and cutting off the connection between the nodes and the system, thereby ensuring the safety of the system and reducing the load rate.
Preferably, the authentication unit includes an identity authentication module, an access log generation module, and a user configuration module, the identity authentication module is configured to authenticate the identity of the node and determine whether the node passes through a node authorized by the system, the node data can enter the processing unit after the authentication is successful, the user configuration module is configured to configure a matched authority according to the identity of the node after the authentication is successful, and the access log generation module is configured to record time information of access to the node data and generate a log.
Preferably, the data acquisition unit comprises a data acquisition module, an operation database, a data analysis module and an alarm module, the data acquisition module is used for acquiring operation data in the transmission unit, the authentication unit and the processing unit, the data analysis module is used for analyzing the operation data in the data acquisition module and comparing the operation data with safety data in the operation database, the data comparison result is within a normal range value, the system operates normally, and when the comparison result exceeds the normal range value, the alarm module warns and reminds, and the system operates abnormally.
Preferably, the identity information of the multiple nodes in the access system is authenticated after the data and the state information of the multiple nodes are transmitted, the unauthorized nodes are prevented from entering the system, the operation data in the transmission unit, the authentication unit and the processing unit are collected and analyzed, the operation data are compared with the safety data, the data comparison result is within a normal range value, the system operates normally, and when the comparison result exceeds the normal range value, warning and reminding are carried out, so that the system operates abnormally.
Compared with the prior art, the invention has the beneficial effects that:
1) the invention collects, analyzes and compares the operation data in the transmission unit, the authentication unit and the processing unit through the data collection unit, the system operates normally when the comparison result of the data is within the normal range value, and when the comparison result exceeds the normal range value, the system carries out warning and reminding to check whether the system has behaviors violating safety and traces attacked or not, thereby ensuring the safety of the system, and meanwhile, the problem can be found out through the data collected in the data collection unit at the first time when the problem occurs.
2) The backup unit is arranged in the invention, and establishes a backup mechanism with the storage unit, so that the data in the storage unit can be backed up, the data in the storage unit can be timely recovered after being damaged, and the safety of the system data is ensured.
Drawings
FIG. 1 is a logic block diagram of the system of the present invention;
FIG. 2 is a logic block diagram of a transmission unit according to the present invention;
FIG. 3 is a logic block diagram of an authentication unit according to the present invention;
FIG. 4 is a logic block diagram of a data acquisition unit of the present invention.
In the figure: the system comprises a transmission unit 1, an authentication unit 2, a data acquisition unit 3, a processing unit 4, a storage unit 5, a backup unit 6, a system configuration unit 7, a sorting module 8, a data state monitoring module 9, an isolation module 10, a decryption module 11, a network state monitoring module 12, an identity authentication module 13, an access log generation module 14, a user configuration module 15, a data acquisition module 16, an operation database 17, a data analysis module 18 and an alarm module 19.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Example (b):
referring to fig. 1-4, the present invention provides a technical solution: the intelligent protection system for the use of the multi-node network based on the block chain data comprises a transmission unit 1, an authentication unit 2, a data acquisition unit 3, a processing unit 4, a storage unit 5, a backup unit 6 and a system configuration unit 7, wherein the transmission unit 1 is used for transmitting data and state information of the multi-node in an access system, the authentication unit 2 is used for authenticating identity information of the multi-node and preventing unauthorized nodes from entering the system, the data acquisition unit 3 is used for collecting and analyzing operation data in the transmission unit 1, the authentication unit 2 and the processing unit 4 and checking whether safety violating behaviors and attacked traces exist in the system or not to ensure the safety of the system, the processing unit 4 is used for processing the data information in the multi-node network, and the storage unit 5 is used for processing the data information and log information of the node, the backup unit 6 is used for performing data backup on information stored in the storage unit 5, and the system configuration unit 7 is used for updating and modifying source data in the transmission unit 1, the authentication unit 2, the data acquisition unit 3, the processing unit 4 and the backup unit 6.
The authentication unit 2 is connected with the transmission unit 1 and the processing unit 4, the storage unit 5 is connected with the processing unit 4 and the backup unit 6, the data acquisition unit 3 is connected with the transmission unit 1, the authentication unit 2 and the processing unit 4, and the system configuration unit 7 is connected with the transmission unit 1, the authentication unit 2, the processing unit 4 and the backup unit 6.
The transmission unit 1 comprises a sequencing module 8, a data state monitoring module 9, an isolation module 10, a decryption module 11 and a network state monitoring module 12, the sorting module 8 is used for sorting the access information of the plurality of nodes, the decryption module 11 is used for decrypting the data of the access information of the plurality of nodes, the data status monitoring module 9 is used for detecting data statuses of a plurality of nodes to obtain system data status information, the network status monitoring module 12 is configured to detect network statuses of a plurality of nodes to obtain system network status information, the isolation module 10 is used for tracking according to the data state and the network state in the data state monitoring module 9 and the network state monitoring module 12, and screening out nodes without data state and network state updating within 30min, and cutting off the connection between the nodes and the system, thereby ensuring the safety of the system and reducing the load rate.
The authentication unit 2 comprises an identity authentication module 13, an access log generation module 14 and a user configuration module 15, wherein the identity authentication module 13 is used for authenticating the identity of a node and judging whether the node passes through the node authorized by the system, after the authentication is successful, the node data can enter the processing unit 4, the user configuration module 15 is used for configuring the matched authority according to the identity of the node after the authentication is successful, and the access log generation module 14 is used for recording the time information of the node data access and generating a log.
The data acquisition unit 3 includes data acquisition module 16, operation database 17, data analysis module 18, alarm module 19, data acquisition module 16 is arranged in gathering the operating data among transmission unit 1, authentication unit 2, the processing unit 4, data analysis module 18 is arranged in carrying out the analysis to the operating data among the data acquisition module 16 to compare with the security data among the operation database 17, the data comparison result is within normal range value, then the system operation is normal, when the comparison result exceedes normal range value, warns through alarm module 19 and reminds, and system operation appears unusually.
The system protection method comprises the following steps: the transmission unit 1 is used for transmitting data and state information of multiple nodes in an access system and then authenticating the identity information of the multiple nodes through the authentication unit 2, unauthorized nodes are prevented from entering the system, the data acquisition unit 3 is used for acquiring and analyzing operation data in the transmission unit 1, the authentication unit 2 and the processing unit 4, the operation data are compared with safety data in the operation database 17, the data comparison result is within a normal range value, the system operates normally, when the comparison result exceeds the normal range value, warning and reminding are carried out, and the system operates abnormally.
While there have been shown and described the fundamental principles and essential features of the invention and advantages thereof, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing exemplary embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof; the present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein, and any reference signs in the claims are not intended to be construed as limiting the claim concerned.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. Multi-node network based on block chain data uses intelligent protection system, including transmission unit (1), authentication unit (2), data acquisition unit (3), processing unit (4), memory cell (5), backup unit (6) and system configuration unit (7), its characterized in that: the system comprises a transmission unit (1), an authentication unit (2), a data acquisition unit (3), a processing unit (4), a storage unit (5), a backup unit (6), a system configuration unit (7), a transmission unit (1), an authentication unit (2), a processing unit (4), a storage unit (5), a processing unit (2), a processing unit (4) and a processing unit (4), wherein the transmission unit (1) is used for transmitting data and state information of multiple nodes in an access system, the authentication unit (2) is used for authenticating identity information of the multiple nodes and preventing unauthorized nodes from entering the system, the processing unit (4) is used for collecting and analyzing running data in the transmission unit (1), the authentication unit (2) and the processing unit (4), checking whether safety violating behaviors and attacking traces exist in the system or not and ensuring the safety of the system, the processing unit (4) is used for processing the data information in a multi-node network, the storage unit (5) is used for backing up data and the data stored in the storage unit (5), and the system configuration unit (7) is used for backing up data stored in the transmission unit (1) and state information stored in the storage unit (5) and used for storing data information in the system configuration unit (7) in the system, And source data in the authentication unit (2), the data acquisition unit (3), the processing unit (4) and the backup unit (6) are updated and modified.
2. The system of claim 1, wherein: the authentication unit (2) is connected with the transmission unit (1) and the processing unit (4), the storage unit (5) is connected with the processing unit (4) and the backup unit (6), the data acquisition unit (3) is connected with the transmission unit (1), the authentication unit (2) and the processing unit (4), and the system configuration unit (7) is connected with the transmission unit (1), the authentication unit (2), the processing unit (4) and the backup unit (6).
3. The system of claim 1, wherein: the transmission unit (1) comprises a sorting module (8), a data state monitoring module (9), an isolation module (10), a decryption module (11) and a network state monitoring module (12), wherein the sorting module (8) is used for sorting access information of a plurality of nodes, the decryption module (11) is used for decrypting data of the access information of the plurality of nodes, the data state monitoring module (9) is used for detecting data states of the plurality of nodes to obtain system data state information, the network state monitoring module (12) is used for detecting network states of the plurality of nodes to obtain system network state information, the isolation module (10) is used for tracking according to the data states and the network states in the data state monitoring module (9) and the network state monitoring module (12) and screening out that no data state exists in 30min, The nodes with updated network state separate the connection between the nodes and the system, thus ensuring the safety of the system and reducing the load rate.
4. The system of claim 1, wherein: the authentication unit (2) comprises an identity authentication module (13), an access log generation module (14) and a user configuration module (15), wherein the identity authentication module (13) is used for authenticating the identity of the node and judging whether the node passes through the node authorized by the system or not, after the authentication is successful, the node data can enter the processing unit (4), the user configuration module (15) is used for configuring matched authority according to the node identity after the authentication is successful, and the access log generation module (14) is used for recording the time information of the node data access and generating a log.
5. The system of claim 1, wherein: the data acquisition unit (3) includes data acquisition module (16), operation database (17), data analysis module (18), alarm module (19), data acquisition module (16) are arranged in gathering the operating data among transmission unit (1), authentication unit (2), processing unit (4), data analysis module (18) are arranged in analyzing the operating data among data acquisition module (16) to compare with the security data in operation database (17), the data comparison result is within normal range value, then the system operation is normal, when the comparison result exceedes normal range value, warns through alarm module (19) and reminds, the system operation appears unusually.
6. A protection method using an intelligent protection system for a multi-node network based on blockchain data according to any one of claims 1 to 5, wherein: the identity information of the multiple nodes is authenticated after the data and the state information of the multiple nodes in the access system are transmitted, the unauthorized nodes are prevented from entering the system, the operation data in the transmission unit (1), the authentication unit (2) and the processing unit (4) are collected and analyzed, the operation data are compared with the safety data, the data comparison result is within a normal range value, the system operates normally, and when the comparison result exceeds the normal range value, warning reminding is carried out, and the system operates abnormally.
CN202110474505.1A 2021-04-29 2021-04-29 Intelligent protection system and method for multi-node network use based on block chain data Pending CN113225328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110474505.1A CN113225328A (en) 2021-04-29 2021-04-29 Intelligent protection system and method for multi-node network use based on block chain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110474505.1A CN113225328A (en) 2021-04-29 2021-04-29 Intelligent protection system and method for multi-node network use based on block chain data

Publications (1)

Publication Number Publication Date
CN113225328A true CN113225328A (en) 2021-08-06

Family

ID=77090170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110474505.1A Pending CN113225328A (en) 2021-04-29 2021-04-29 Intelligent protection system and method for multi-node network use based on block chain data

Country Status (1)

Country Link
CN (1) CN113225328A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114666149A (en) * 2022-04-07 2022-06-24 杭州集联科技有限公司 Internet of things environment safety monitoring system based on block chain
CN114915634A (en) * 2022-06-10 2022-08-16 北京国控天成科技有限公司 Industrial data acquisition and storage system and method based on data lake

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453377A (en) * 2016-10-28 2017-02-22 中金云金融(北京)大数据科技股份有限公司 Intelligent monitoring system and method for distributed network based on block chain
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN112398830A (en) * 2020-11-04 2021-02-23 深圳供电局有限公司 Information security system and method with anti-attack function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453377A (en) * 2016-10-28 2017-02-22 中金云金融(北京)大数据科技股份有限公司 Intelligent monitoring system and method for distributed network based on block chain
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN112398830A (en) * 2020-11-04 2021-02-23 深圳供电局有限公司 Information security system and method with anti-attack function

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114666149A (en) * 2022-04-07 2022-06-24 杭州集联科技有限公司 Internet of things environment safety monitoring system based on block chain
CN114666149B (en) * 2022-04-07 2024-01-26 杭州集联科技有限公司 Block chain-based Internet of things environment safety monitoring system
CN114915634A (en) * 2022-06-10 2022-08-16 北京国控天成科技有限公司 Industrial data acquisition and storage system and method based on data lake

Similar Documents

Publication Publication Date Title
Hu et al. A survey of intrusion detection on industrial control systems
Choi et al. Ontology-based security context reasoning for power IoT-cloud security service
Lunt IDES: An intelligent system for detecting intruders
CA2526759C (en) Event monitoring and management
Wang et al. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks
CN113225328A (en) Intelligent protection system and method for multi-node network use based on block chain data
Zhe et al. DoS attack detection model of smart grid based on machine learning method
CN105721198A (en) Video monitoring system log safety audit method
CN111625870B (en) Block chain-based security audit method, system and storage medium
CN108259202A (en) A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN115996146A (en) Numerical control system security situation sensing and analyzing system, method, equipment and terminal
CN110826094A (en) Information leakage monitoring method and device
CN115561546A (en) Abnormity detection and alarm system for power system
KR101444250B1 (en) System for monitoring access to personal information and method therefor
CN113569254A (en) High-safety network information protection system and protection method thereof
CN117439916A (en) Network security test evaluation system and method
CN112600828A (en) Attack detection and protection method and device for power control system based on data message
CN112733188B (en) Sensitive file management method
CN112953891A (en) Electric power operation and maintenance multilevel network safety monitoring and early warning system
Pryshchepa et al. Modern IT problems and ways to solve them
Zhang et al. Security assessment of intelligent distribution transformer terminal unit based on RBF-SVM
KR20150021282A (en) Scanning attack detection apparatus in control network
CN109450934A (en) Terminal accesses data exception detection method and system
Gong Research on the Construction of Network Security Situational Awareness Platform for Logistics System Using Big Data
Wang et al. Progress and research of network system survivability scheme with cooperative information management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210806