CN113395694A - Intelligent security defense system and defense method based on 5G and local area base station - Google Patents

Intelligent security defense system and defense method based on 5G and local area base station Download PDF

Info

Publication number
CN113395694A
CN113395694A CN202110699706.1A CN202110699706A CN113395694A CN 113395694 A CN113395694 A CN 113395694A CN 202110699706 A CN202110699706 A CN 202110699706A CN 113395694 A CN113395694 A CN 113395694A
Authority
CN
China
Prior art keywords
module
information
defense
local
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110699706.1A
Other languages
Chinese (zh)
Other versions
CN113395694B (en
Inventor
林章文
孙瑞贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Knet Technology Co ltd
Original Assignee
Shenzhen Knet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Knet Technology Co ltd filed Critical Shenzhen Knet Technology Co ltd
Priority to CN202110699706.1A priority Critical patent/CN113395694B/en
Publication of CN113395694A publication Critical patent/CN113395694A/en
Application granted granted Critical
Publication of CN113395694B publication Critical patent/CN113395694B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了基于5G及局域基站的智慧安全防御系统及防御方法,包括网络管理模块、加密模块、检测模块、监控模块、系统管理模块、过滤防火墙、远程控制模块以及紧急防御模块。本系统设计有监控模块以及检测模块,通过监控模块,能及时发现系统是否存在异常,配合过滤防火墙以及加密模块能起到主动防御的效果,通过检测模块,能保证整个系统的正常进行,防止数据被破坏、窃取、丢失等事故发生,通过设置AI计算模块能够基于大数据提供AI安防预警;本发明设计有紧急防御模块,当出现系统严重入侵情况时,通过本地数据打包模块以及本地数据转移模块能够将系统的加密信息转移到远程控制模块,并通过本地数据删除模块将本地数据删除,防止系统数据的泄露。

Figure 202110699706

The invention discloses an intelligent security defense system and defense method based on 5G and local base stations, including a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module. This system is designed with a monitoring module and a detection module. Through the monitoring module, we can find out whether there is any abnormality in the system in time, and cooperate with the filtering firewall and encryption module to play an active defense effect. Through the detection module, we can ensure the normal operation of the entire system and prevent data In the event of damage, theft, loss and other accidents, AI security warning can be provided based on big data by setting up an AI computing module; the present invention is designed with an emergency defense module. When a serious system intrusion occurs, the local data packaging module and local data transfer module It can transfer the encrypted information of the system to the remote control module, and delete the local data through the local data deletion module to prevent the leakage of system data.

Figure 202110699706

Description

Intelligent security defense system and defense method based on 5G and local area base station
Technical Field
The invention relates to a security defense system, in particular to an intelligent security defense system and a defense method based on a 5G and local area base station, and belongs to the technical field of network defense systems.
Background
The network defense system is a system which ensures that hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates and network service is not interrupted, and the security defense system based on the 5G and the local area base station is continuously developed along with popularization of the local area network and the 5G.
However, most of the existing network defense systems based on 5G and local area base stations are passively defended through firewalls and are not flexible enough, so that the defense effect is poor.
Disclosure of Invention
The invention aims to provide an intelligent security defense system and a defense method based on 5G and local area base stations in order to solve the problems.
The intelligent security defense system based on the 5G and local area base stations comprises a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module.
Preferably, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Preferably, the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module.
Preferably, the detection module comprises a disinfection module and a test module.
Preferably, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module.
Preferably, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Preferably, the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarming module, the remote control module is connected with the information sending module inside the system management module through the internal information receiving module, and the remote control module is connected with the instruction receiving module inside the system management module through the internal instruction sending module.
Preferably, the emergency defense module includes a local data packing module, a local data deleting module and a local data transferring module.
An intelligent security defense method based on 5G and a local area base station comprises the following steps:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Preferably, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of implementing data parsing, processing, and execution.
The invention has the beneficial effects that:
1. the system is provided with a monitoring module and a detection module, the performance of data, access information, local information and hardware of the system is monitored, whether the system is abnormal or not can be found in time, the system can play an active defense effect by matching with a filtering firewall and an encryption module, the normal operation of the whole system can be ensured by regularly performing software antivirus and software test, accidents such as data damage, stealing, loss and the like are prevented, and AI security and protection early warning can be provided based on big data by arranging an AI calculation module;
2. the invention is designed with an emergency defense module, when the system is seriously invaded, the encrypted information of the system can be transferred to the remote control module in time by arranging the local data packaging module and the local data transferring module, and the local data is completely deleted by the local data deleting module, so that the leakage of the system data is prevented.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic diagram of a network management module according to the present invention;
FIG. 3 is a schematic diagram of the steps of the method of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
Referring to fig. 1-3, the intelligent security defense system based on 5G and local area base stations includes a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module, and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module, and the emergency defense module are all connected to the system management module.
Specifically, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Specifically, the encryption module includes an access information encryption module, a data transmission encryption module, and a local information encryption module.
Specifically, the detection module comprises a disinfection module and a test module.
Specifically, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module, and a hardware monitoring module.
Specifically, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, wherein the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Specifically, the remote control module includes information receiving module, instruction sending module, information storage module and early warning and alarm module, the remote control module is connected with the inside information sending module of system management module through inside information receiving module, the remote control module is connected with the inside instruction receiving module of system management module through inside instruction sending module.
Specifically, the emergency defense module includes a local data packing module, a local data deleting module, and a local data transferring module.
The intelligent security defense method based on the 5G and the local area base station comprises the following steps of:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Specifically, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of data parsing, processing, and execution.
The system is designed with a monitoring module and a detection module, the monitoring module can monitor the performance of data, access information, local information and hardware of the system through an internal data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module, ensures that the abnormality of the system can be found in time, can play an active defense effect by matching with a filtering firewall and an encryption module, can regularly disinfect and test software contained in the system through a disinfection module and a test module in the detection module, and can timely repair the bug through a remote control module, thereby ensuring the normal operation of the whole system, preventing the system data from being damaged, stolen, lost and other accidents, and providing AI security early warning, AI intelligent edge calculation, big data analysis, data analysis and the like through the arrangement of an AI calculation module, The process of processing and executing, thereby ensuring the accurate judgment of the defense system information; the invention is designed with an emergency defense module, when the system is seriously invaded, all encrypted important information can be packaged and backed up through a local data packaging module arranged in the emergency defense module, the packaged data can be timely transferred to a background of a remote control module through the local data packaging module arranged in the emergency defense module, and the local data is completely deleted through a local data deleting module, so that the system data is prevented from being maliciously leaked or tampered by hackers.

Claims (10)

1.基于5G及局域基站的智慧安全防御方法,其特征在于:包括以下步骤:1. The intelligent security defense method based on 5G and local area base stations, is characterized in that: comprises the following steps: S1、系统初始化,网络管理模块通过网络接入模块接入5G网络或者局域基站的网络,防御系统进行初始化配置;S1. System initialization, the network management module is connected to the 5G network or the network of the local base station through the network access module, and the defense system is initialized and configured; S2、主动防御,监控模块通过数据传输监控模块、访问信息监控模块、本地信息监控模块以及硬件监控模块对系统的数据传输情况、人员访问系统的情况、本地信息是否正常以及硬件性能是否正常运行进行实时监控,网络监控模块也针对接入的5G网络或局域基站网络进行监控;S2. Active defense. The monitoring module conducts data transmission through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module to the system data transmission, personnel access to the system, whether the local information is normal, and whether the hardware performance is running normally. Real-time monitoring, the network monitoring module also monitors the connected 5G network or local base station network; S3、监控信息辨别,监控模块以及网络监控模块会将监控到的信息全部发送到系统管理模块,系统管理模块内部的信息反馈模块接收到信息后,会发送给AI计算模块,AI计算模块对监控信息进行分析辨别,判断是否存在异常情况,并将接收到的信息以及判断结果全部发送到系统管理模块内部的本地存储模块进行本地信息存储;S3. Identification of monitoring information. The monitoring module and the network monitoring module will send all the monitored information to the system management module. After the information feedback module inside the system management module receives the information, it will be sent to the AI computing module, and the AI computing module will monitor the monitoring. The information is analyzed and identified to determine whether there is an abnormal situation, and all the received information and the judgment result are sent to the local storage module inside the system management module for local information storage; S4、防御措施,当监控信息发现异常情况,系统管理模块通过信息发送模块给过滤防火墙、远程控制模块以及加密模块发送信息,过滤防火墙会对访问者进行过滤,远程控制模块通过信息接收模块接收到信息后,通过预警及报警模块对后台人员进行预警以及报警,后台人员通过指令发送模块对系统管理模块下达指令,进行bug修复,加密模块接收到信息后通过访问信息加密模块、数据传输加密模块以及本地信息加密模块依次对访问信息、数据传输以及本地存储的信息进行二次加密;S4. Defensive measures. When the monitoring information finds an abnormal situation, the system management module sends information to the filtering firewall, the remote control module and the encryption module through the information sending module. The filtering firewall will filter the visitors, and the remote control module receives the information through the information receiving module. After receiving the information, the background personnel will be warned and alarmed through the early warning and alarm module. The background personnel will issue instructions to the system management module through the instruction sending module to repair bugs. After the encryption module receives the information, it will access the information encryption module, data transmission encryption module and The local information encryption module performs secondary encryption on access information, data transmission and locally stored information in turn; S5、紧急防御,当系统出现严重入侵情况,系统管理模块将驱动紧急防御模块开始紧急防御措施,紧急防御模块先通过内部的本地数据打包模块将系统包含的重要数据进行打包处理,再通过本地数据转移模块将打包好的数据发送到远程控制模块的后台,然后通过本地数据删除模块将本系统的重要数据全部删除;S5. Emergency defense. When there is a serious intrusion in the system, the system management module will drive the emergency defense module to start emergency defense measures. The emergency defense module first packages the important data contained in the system through the internal local data packaging module, and then passes the local data. The transfer module sends the packaged data to the background of the remote control module, and then deletes all the important data of the system through the local data deletion module; S6、日常检测,日常通过检测模块内部的杀毒模块扫描本系统的所有数据包,检测系统是否存在入侵的病毒,若含有病毒,杀毒模块会对其进行杀毒处理,通过检测模块内部的测试模块对本系统包含的软件以及程序进行功能测试,及时修复可能存在的bug,保证整个防御系统能维持正常的防御流程。S6. Routine detection. Daily scan all data packets of the system through the antivirus module inside the detection module to detect whether there is an invading virus in the system. If there is a virus, the antivirus module will perform antivirus processing on it. The software and programs included in the system are functionally tested, and possible bugs are repaired in time to ensure that the entire defense system can maintain a normal defense process. 2.根据权利要求1所述的基于5G及局域基站的智慧安全防御方法,其特征在于:所述S3中的AI计算模块提供AI安防预警、AI智能边缘计算、大数据分析、实现数据解析、处理与执行的过程。2. The intelligent security defense method based on 5G and local base stations according to claim 1, wherein the AI computing module in the S3 provides AI security warning, AI intelligent edge computing, big data analysis, and realization data analysis , processing and execution process. 3.一种用于实现权利要求1所述的基于5G及局域基站的智慧安全防御的基于5G及局域基站的智慧安全防御系统,其特征在于:包括网络管理模块、加密模块、检测模块、监控模块、系统管理模块、过滤防火墙、远程控制模块以及紧急防御模块,所述网络管理模块、加密模块、检测模块、监控模块、过滤防火墙、远程控制模块以及紧急防御模块均与系统管理模块连接。3. A smart security defense system based on 5G and local area base stations for realizing the smart security defense based on 5G and local area base stations according to claim 1, characterized in that: comprising a network management module, an encryption module, a detection module , monitoring module, system management module, filtering firewall, remote control module and emergency defense module, the network management module, encryption module, detection module, monitoring module, filtering firewall, remote control module and emergency defense module are all connected with the system management module . 4.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述网络管理模块包括网络接入模块以及网络监控模块,所述网络接入模块包括5G网络接入模块以及局域网接入模块。4. The smart security defense system based on 5G and local area base stations according to claim 3, wherein the network management module comprises a network access module and a network monitoring module, and the network access module comprises a 5G network access module. Access module and LAN access module. 5.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述加密模块包括访问信息加密模块、数据传输加密模块以及本地信息加密模块。5 . The smart security defense system based on 5G and local area base stations according to claim 3 , wherein the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module. 6 . 6.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述检测模块包括杀毒模块以及测试模块。6 . The smart security defense system based on 5G and local area base stations according to claim 3 , wherein the detection module comprises an antivirus module and a test module. 7 . 7.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述监控模块包括数据传输监控模块、访问信息监控模块、本地信息监控模块以及硬件监控模块。7 . The smart security defense system based on 5G and local area base stations according to claim 3 , wherein the monitoring module comprises a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module. 8 . 8.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述系统管理模块包括信息反馈模块、信息发送模块、AI计算模块、指令接收模块以及本地存储模块,所述信息反馈模块、信息发送模块、指令接收模块以及本地存储模块均与AI计算模块连接,所述网络管理模块、加密模块、检测模块以及监控模块均通过信息反馈模块与系统管理模块连接,所述加密模块、过滤防火墙、远程控制模块以及紧急防御模块均通过信息发送模块与系统管理模块连接,所述指令接收模块与远程控制模块连接。8. The smart security defense system based on 5G and local area base stations according to claim 3, wherein the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module , the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, and the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, The encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module. 9.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述远程控制模块包括信息接收模块、指令发送模块、信息存储模块以及预警及报警模块,所述远程控制模块通过内部的信息接收模块与系统管理模块内部的信息发送模块连接,所述远程控制模块通过内部的指令发送模块与系统管理模块内部的指令接收模块连接。9. The smart security defense system based on 5G and local area base stations according to claim 3, wherein the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarm module, the The remote control module is connected with the information sending module inside the system management module through the internal information receiving module, and the remote control module is connected with the command receiving module inside the system management module through the internal command sending module. 10.根据权利要求3所述的基于5G及局域基站的智慧安全防御系统,其特征在于:所述紧急防御模块包括本地数据打包模块、本地数据删除模块以及本地数据转移模块。10 . The smart security defense system based on 5G and local area base stations according to claim 3 , wherein the emergency defense module comprises a local data packing module, a local data deletion module and a local data transfer module. 11 .
CN202110699706.1A 2021-06-23 2021-06-23 Smart security defense system and defense method based on 5G and local area base stations Expired - Fee Related CN113395694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699706.1A CN113395694B (en) 2021-06-23 2021-06-23 Smart security defense system and defense method based on 5G and local area base stations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699706.1A CN113395694B (en) 2021-06-23 2021-06-23 Smart security defense system and defense method based on 5G and local area base stations

Publications (2)

Publication Number Publication Date
CN113395694A true CN113395694A (en) 2021-09-14
CN113395694B CN113395694B (en) 2023-07-07

Family

ID=77623561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699706.1A Expired - Fee Related CN113395694B (en) 2021-06-23 2021-06-23 Smart security defense system and defense method based on 5G and local area base stations

Country Status (1)

Country Link
CN (1) CN113395694B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157462A (en) * 2021-11-23 2022-03-08 四川邮电职业技术学院 Computer network information safety control system and method
CN114525745A (en) * 2022-03-03 2022-05-24 谢文武 Intelligent intrusion defense detection system based on block chain
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712427A (en) * 2018-05-23 2018-10-26 北京国信安服信息安全科技有限公司 A kind of network security method and system of dynamic Initiative Defense
CN110381008A (en) * 2018-04-13 2019-10-25 武汉梓金山科技有限公司 A kind of Dynamic Defense System of Network Security and method based on big data
CN112149090A (en) * 2020-09-16 2020-12-29 山东大学 Computer network safety protection system based on data cloud
US20210051467A1 (en) * 2019-08-14 2021-02-18 Blackberry Limited Different profiles for selecting different network interfaces for communications of an electronic device
CN112464235A (en) * 2020-11-26 2021-03-09 西京学院 Computer network safety control system and control method
CN112615842A (en) * 2020-12-11 2021-04-06 黑龙江亿林网络股份有限公司 Network security implementation system and method based on big data platform
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381008A (en) * 2018-04-13 2019-10-25 武汉梓金山科技有限公司 A kind of Dynamic Defense System of Network Security and method based on big data
CN108712427A (en) * 2018-05-23 2018-10-26 北京国信安服信息安全科技有限公司 A kind of network security method and system of dynamic Initiative Defense
US20210051467A1 (en) * 2019-08-14 2021-02-18 Blackberry Limited Different profiles for selecting different network interfaces for communications of an electronic device
CN112149090A (en) * 2020-09-16 2020-12-29 山东大学 Computer network safety protection system based on data cloud
CN112464235A (en) * 2020-11-26 2021-03-09 西京学院 Computer network safety control system and control method
CN112615842A (en) * 2020-12-11 2021-04-06 黑龙江亿林网络股份有限公司 Network security implementation system and method based on big data platform
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157462A (en) * 2021-11-23 2022-03-08 四川邮电职业技术学院 Computer network information safety control system and method
CN114525745A (en) * 2022-03-03 2022-05-24 谢文武 Intelligent intrusion defense detection system based on block chain
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Also Published As

Publication number Publication date
CN113395694B (en) 2023-07-07

Similar Documents

Publication Publication Date Title
CN113395694B (en) Smart security defense system and defense method based on 5G and local area base stations
US7673137B2 (en) System and method for the managed security control of processes on a computer system
CN108931968B (en) Network security protection system applied to industrial control system and protection method thereof
CN105337971A (en) Electric power information system cloud safety guarantee system and implementation method thereof
CN101719846A (en) Security monitoring method, device and system
CN114666088A (en) Method, device, equipment and medium for detecting industrial network data behavior information
CN107454096A (en) A kind of wrong report removing method based on daily record playback
CN107256358A (en) Industrial configuration monitoring software implementation procedure dynamic protection method
CN117527297A (en) Domain name based network security detection system
CN111786986B (en) Numerical control system network intrusion prevention system and method
CN118503962A (en) Computer information security protection security inspection device
CN112217803A (en) A real-time network security threat early warning analysis method and device
US20140245454A1 (en) Method and apparatus for protecting flight data
CN110708340A (en) Enterprise private network security supervision system
CN119341830A (en) A vulnerability protection method using blocking package blocking
CN114707144A (en) Virtual machine escape behavior detection method and device
Ye et al. Research on network security protection strategy
CN117972727A (en) Antivirus security system deployment method, device, computer equipment and storage medium
Zou et al. A case study of anomaly detection in industrial environments
CN113783875A (en) Fire protection system for network information security and use method thereof
CN207612279U (en) A kind of food processing factory's network security management system
Yao Research on computer database intrusion detection technology based on virtualization technology
CN113542186A (en) Monitoring system based on network security and early warning method thereof
CN116886406B (en) Computer network data safety intelligent protection system
Wu et al. Industrial control trusted computing platform for power monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20230707