CN113395694A - Intelligent security defense system and defense method based on 5G and local area base station - Google Patents
Intelligent security defense system and defense method based on 5G and local area base station Download PDFInfo
- Publication number
- CN113395694A CN113395694A CN202110699706.1A CN202110699706A CN113395694A CN 113395694 A CN113395694 A CN 113395694A CN 202110699706 A CN202110699706 A CN 202110699706A CN 113395694 A CN113395694 A CN 113395694A
- Authority
- CN
- China
- Prior art keywords
- module
- information
- defense
- local
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an intelligent security defense system and a defense method based on a 5G and local area base station, which comprise a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module. The system is provided with a monitoring module and a detection module, whether the system is abnormal or not can be found in time through the monitoring module, the active defense effect can be achieved by matching with a filtering firewall and an encryption module, the normal operation of the whole system can be ensured through the detection module, accidents such as data damage, stealing, losing and the like can be prevented, and AI security and protection early warning can be provided based on big data through the AI calculation module; the invention is designed with an emergency defense module, when the system is seriously invaded, the encrypted information of the system can be transferred to the remote control module through the local data packaging module and the local data transferring module, and the local data is deleted through the local data deleting module, so that the leakage of the system data is prevented.
Description
Technical Field
The invention relates to a security defense system, in particular to an intelligent security defense system and a defense method based on a 5G and local area base station, and belongs to the technical field of network defense systems.
Background
The network defense system is a system which ensures that hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates and network service is not interrupted, and the security defense system based on the 5G and the local area base station is continuously developed along with popularization of the local area network and the 5G.
However, most of the existing network defense systems based on 5G and local area base stations are passively defended through firewalls and are not flexible enough, so that the defense effect is poor.
Disclosure of Invention
The invention aims to provide an intelligent security defense system and a defense method based on 5G and local area base stations in order to solve the problems.
The intelligent security defense system based on the 5G and local area base stations comprises a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module.
Preferably, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Preferably, the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module.
Preferably, the detection module comprises a disinfection module and a test module.
Preferably, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module.
Preferably, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Preferably, the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarming module, the remote control module is connected with the information sending module inside the system management module through the internal information receiving module, and the remote control module is connected with the instruction receiving module inside the system management module through the internal instruction sending module.
Preferably, the emergency defense module includes a local data packing module, a local data deleting module and a local data transferring module.
An intelligent security defense method based on 5G and a local area base station comprises the following steps:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Preferably, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of implementing data parsing, processing, and execution.
The invention has the beneficial effects that:
1. the system is provided with a monitoring module and a detection module, the performance of data, access information, local information and hardware of the system is monitored, whether the system is abnormal or not can be found in time, the system can play an active defense effect by matching with a filtering firewall and an encryption module, the normal operation of the whole system can be ensured by regularly performing software antivirus and software test, accidents such as data damage, stealing, loss and the like are prevented, and AI security and protection early warning can be provided based on big data by arranging an AI calculation module;
2. the invention is designed with an emergency defense module, when the system is seriously invaded, the encrypted information of the system can be transferred to the remote control module in time by arranging the local data packaging module and the local data transferring module, and the local data is completely deleted by the local data deleting module, so that the leakage of the system data is prevented.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic diagram of a network management module according to the present invention;
FIG. 3 is a schematic diagram of the steps of the method of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
Referring to fig. 1-3, the intelligent security defense system based on 5G and local area base stations includes a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module, and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module, and the emergency defense module are all connected to the system management module.
Specifically, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Specifically, the encryption module includes an access information encryption module, a data transmission encryption module, and a local information encryption module.
Specifically, the detection module comprises a disinfection module and a test module.
Specifically, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module, and a hardware monitoring module.
Specifically, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, wherein the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Specifically, the remote control module includes information receiving module, instruction sending module, information storage module and early warning and alarm module, the remote control module is connected with the inside information sending module of system management module through inside information receiving module, the remote control module is connected with the inside instruction receiving module of system management module through inside instruction sending module.
Specifically, the emergency defense module includes a local data packing module, a local data deleting module, and a local data transferring module.
The intelligent security defense method based on the 5G and the local area base station comprises the following steps of:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Specifically, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of data parsing, processing, and execution.
The system is designed with a monitoring module and a detection module, the monitoring module can monitor the performance of data, access information, local information and hardware of the system through an internal data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module, ensures that the abnormality of the system can be found in time, can play an active defense effect by matching with a filtering firewall and an encryption module, can regularly disinfect and test software contained in the system through a disinfection module and a test module in the detection module, and can timely repair the bug through a remote control module, thereby ensuring the normal operation of the whole system, preventing the system data from being damaged, stolen, lost and other accidents, and providing AI security early warning, AI intelligent edge calculation, big data analysis, data analysis and the like through the arrangement of an AI calculation module, The process of processing and executing, thereby ensuring the accurate judgment of the defense system information; the invention is designed with an emergency defense module, when the system is seriously invaded, all encrypted important information can be packaged and backed up through a local data packaging module arranged in the emergency defense module, the packaged data can be timely transferred to a background of a remote control module through the local data packaging module arranged in the emergency defense module, and the local data is completely deleted through a local data deleting module, so that the system data is prevented from being maliciously leaked or tampered by hackers.
Claims (10)
1. An intelligent security defense method based on 5G and a local area base station is characterized in that: the method comprises the following steps:
s1, initializing the system, wherein the network management module accesses the 5G network or the network of the local base station through the network access module, and the defense system performs initialization configuration;
s2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the personnel access condition of the system, whether the local information is normal and whether the hardware performance is normal through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module in real time, and the network monitoring module also monitors the accessed 5G network or the local base station network;
s3, identifying monitoring information, wherein the monitoring module and the network monitoring module send all monitored information to the system management module, an information feedback module in the system management module receives the information and sends the information to the AI computing module, the AI computing module analyzes and identifies the monitoring information, judges whether abnormal conditions exist or not, and sends all the received information and judgment results to a local storage module in the system management module for local information storage;
s4, defense measures are taken, when monitoring information shows abnormal conditions, a system management module sends information to a filtering firewall, a remote control module and an encryption module through an information sending module, the filtering firewall can filter visitors, the remote control module carries out early warning and alarming on background personnel through an early warning and alarming module after receiving the information through an information receiving module, the background personnel issue instructions to the system management module through an instruction sending module to carry out bug repairing, and the encryption module carries out secondary encryption on access information, data transmission and locally stored information in sequence through an access information encryption module, a data transmission encryption module and a local information encryption module after receiving the information;
s5, emergency defense, wherein when a system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of a remote control module through a local data transfer module, and then deletes all the important data of the system through a local data deletion module;
and S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
2. The intelligent security defense method based on 5G and local area base stations as claimed in claim 1, wherein: the AI calculation module in the S3 provides AI security early warning, AI intelligent edge calculation, big data analysis, and realizes the processes of data analysis, processing and execution.
3. A 5G and lan base station based intelligent security defense system for implementing 5G and lan base station based intelligent security defense of claim 1, characterized in that: including network management module, cryptographic module, detection module, monitoring module, system management module, filtering firewall, remote control module and emergency defense module, network management module, cryptographic module, detection module, monitoring module, filtering firewall, remote control module and emergency defense module all are connected with system management module.
4. The system of claim 3, wherein the smart security defense system comprises: the network management module comprises a network access module and a network monitoring module, and the network access module comprises a 5G network access module and a local area network access module.
5. The system of claim 3, wherein the smart security defense system comprises: the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module.
6. The system of claim 3, wherein the smart security defense system comprises: the detection module comprises a disinfection module and a test module.
7. The system of claim 3, wherein the smart security defense system comprises: the monitoring module comprises a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module.
8. The system of claim 3, wherein the smart security defense system comprises: the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, wherein the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
9. The system of claim 3, wherein the smart security defense system comprises: the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarming module, the remote control module is connected with the information sending module inside the system management module through the inside information receiving module, and the remote control module is connected with the instruction receiving module inside the system management module through the inside instruction sending module.
10. The system of claim 3, wherein the smart security defense system comprises: the emergency defense module comprises a local data packing module, a local data deleting module and a local data transferring module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110699706.1A CN113395694B (en) | 2021-06-23 | 2021-06-23 | Intelligent security defense system and method based on 5G and local base station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110699706.1A CN113395694B (en) | 2021-06-23 | 2021-06-23 | Intelligent security defense system and method based on 5G and local base station |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113395694A true CN113395694A (en) | 2021-09-14 |
CN113395694B CN113395694B (en) | 2023-07-07 |
Family
ID=77623561
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110699706.1A Active CN113395694B (en) | 2021-06-23 | 2021-06-23 | Intelligent security defense system and method based on 5G and local base station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113395694B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114157462A (en) * | 2021-11-23 | 2022-03-08 | 四川邮电职业技术学院 | Computer network information safety control system and method |
CN114525745A (en) * | 2022-03-03 | 2022-05-24 | 谢文武 | Intelligent intrusion defense detection system based on block chain |
CN116471129A (en) * | 2023-06-20 | 2023-07-21 | 深圳市美力高集团有限公司 | Security monitoring data secure storage system and method based on big data analysis |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108712427A (en) * | 2018-05-23 | 2018-10-26 | 北京国信安服信息安全科技有限公司 | A kind of network security method and system of dynamic Initiative Defense |
CN110381008A (en) * | 2018-04-13 | 2019-10-25 | 武汉梓金山科技有限公司 | A kind of Dynamic Defense System of Network Security and method based on big data |
CN112149090A (en) * | 2020-09-16 | 2020-12-29 | 山东大学 | Computer network safety protection system based on data cloud |
US20210051467A1 (en) * | 2019-08-14 | 2021-02-18 | Blackberry Limited | Different profiles for selecting different network interfaces for communications of an electronic device |
CN112464235A (en) * | 2020-11-26 | 2021-03-09 | 西京学院 | Computer network safety control system and control method |
CN112615842A (en) * | 2020-12-11 | 2021-04-06 | 黑龙江亿林网络股份有限公司 | Network security implementation system and method based on big data platform |
CN112651021A (en) * | 2020-12-23 | 2021-04-13 | 湖南工学院 | Information security defense system based on big data |
-
2021
- 2021-06-23 CN CN202110699706.1A patent/CN113395694B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110381008A (en) * | 2018-04-13 | 2019-10-25 | 武汉梓金山科技有限公司 | A kind of Dynamic Defense System of Network Security and method based on big data |
CN108712427A (en) * | 2018-05-23 | 2018-10-26 | 北京国信安服信息安全科技有限公司 | A kind of network security method and system of dynamic Initiative Defense |
US20210051467A1 (en) * | 2019-08-14 | 2021-02-18 | Blackberry Limited | Different profiles for selecting different network interfaces for communications of an electronic device |
CN112149090A (en) * | 2020-09-16 | 2020-12-29 | 山东大学 | Computer network safety protection system based on data cloud |
CN112464235A (en) * | 2020-11-26 | 2021-03-09 | 西京学院 | Computer network safety control system and control method |
CN112615842A (en) * | 2020-12-11 | 2021-04-06 | 黑龙江亿林网络股份有限公司 | Network security implementation system and method based on big data platform |
CN112651021A (en) * | 2020-12-23 | 2021-04-13 | 湖南工学院 | Information security defense system based on big data |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114157462A (en) * | 2021-11-23 | 2022-03-08 | 四川邮电职业技术学院 | Computer network information safety control system and method |
CN114525745A (en) * | 2022-03-03 | 2022-05-24 | 谢文武 | Intelligent intrusion defense detection system based on block chain |
CN116471129A (en) * | 2023-06-20 | 2023-07-21 | 深圳市美力高集团有限公司 | Security monitoring data secure storage system and method based on big data analysis |
Also Published As
Publication number | Publication date |
---|---|
CN113395694B (en) | 2023-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113395694B (en) | Intelligent security defense system and method based on 5G and local base station | |
CN104778141B (en) | A kind of TPCM modules based on control system trusted infrastructure and credible detection method | |
CN108931968B (en) | Network security protection system applied to industrial control system and protection method thereof | |
CN110233817B (en) | Container safety system based on cloud computing | |
CN113596028B (en) | Method and device for handling network abnormal behaviors | |
CN112653654A (en) | Security monitoring method and device, computer equipment and storage medium | |
CN112968885B (en) | Edge computing platform safety protection method and device | |
CN112597462A (en) | Industrial network safety system | |
CN107122685A (en) | A kind of big data method for secure storing and equipment | |
CN114006748A (en) | Network security comprehensive monitoring method, system, equipment and storage medium | |
CN112217803A (en) | Real-time network security threat early warning analysis method and device | |
CN111786986A (en) | Numerical control system network intrusion prevention system and method | |
CN110708340A (en) | Enterprise private network security supervision system | |
CN106650338A (en) | Method and system for preventing software from being anti-debugged | |
CN116708157A (en) | Computer security operation and maintenance service system | |
Ye et al. | Research on network security protection strategy | |
Salah et al. | Surviving cyber warfare with a hybrid multiagent-base intrusion prevention system | |
CN108985051A (en) | A kind of intrusion prevention method and system of Behavior-based control tracking | |
CN113783875A (en) | Fire protection system for network information security and use method thereof | |
CN114398642A (en) | Enterprise economic management information safety system | |
Chung et al. | Machine learning in the hands of a malicious adversary: a near future if not reality | |
Yao | Research on computer database intrusion detection technology based on virtualization technology | |
CN207612279U (en) | A kind of food processing factory's network security management system | |
CN113542186A (en) | Monitoring system based on network security and early warning method thereof | |
CN112565246A (en) | Network anti-attack system and method based on artificial intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |