CN113645213A - Multi-terminal network management monitoring system based on VPN technology - Google Patents

Multi-terminal network management monitoring system based on VPN technology Download PDF

Info

Publication number
CN113645213A
CN113645213A CN202110886701.XA CN202110886701A CN113645213A CN 113645213 A CN113645213 A CN 113645213A CN 202110886701 A CN202110886701 A CN 202110886701A CN 113645213 A CN113645213 A CN 113645213A
Authority
CN
China
Prior art keywords
vpn
access
server
cloud
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110886701.XA
Other languages
Chinese (zh)
Inventor
樊增辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid International Co ltd
Original Assignee
China Southern Power Grid International Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid International Co ltd filed Critical China Southern Power Grid International Co ltd
Priority to CN202110886701.XA priority Critical patent/CN113645213A/en
Publication of CN113645213A publication Critical patent/CN113645213A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention belongs to the field of network monitoring, and discloses a multi-terminal network management monitoring system based on a VPN technology, which comprises a public network module, a service provider (VPN) server, an application system module, a data center network module and a cloud firewall, wherein the bastion server and the VPN server are exposed in the public network, only specific IP access is allowed through white list setting, and any other IP is rejected; the virtual router and the virtual switch enter the application system module through the virtual router and the virtual switch, a user successfully authenticated by the VPN can access the application system, the bastion machine can remotely apply the server, and the bastion machine performs audit management on the operation of the remote user system and performs safety authentication on a user connected with the host; and screening malicious traffic from the public network. According to the invention, only specific IP access is allowed through the VPN white list setting, any other IP is rejected, and the access flow of the Internet is controlled through the cloud firewall setting, so that the attack and threat from the Internet are intercepted.

Description

Multi-terminal network management monitoring system based on VPN technology
Technical Field
The invention belongs to the field of network monitoring, and particularly relates to a multi-terminal network management monitoring system based on a VPN technology.
Background
The outside mechanisms generally have the condition that the network information safety protection is not in place, and all the outside mechanisms do not form an omnibearing, multi-level and standardized network safety protection system, so that the network and information safety of the outside mechanisms are weak; the staff uses the temporary leasing field as an office place, the network is simple and lacks effective protection means, the network information security risk is large, the network security management requirements of a network company on overseas institutions are difficult to meet, and the condition that an information system is attacked appears for many times.
The information machine room of the outside-dwelling organization is generally simple and crude, an information system is not prepared locally or in different places, and once the machine room or a server is abnormal, information data related to the outside-dwelling organization over the years is lost, so that the overall daily management and operation activities of the company are seriously influenced.
To this end, we propose a multi-terminal network management monitoring system based on VPN technology to solve the above problems.
Disclosure of Invention
In view of the above problems, an object of the present invention is to provide a highly safe multi-terminal network management monitoring system based on the VPN technology.
In order to achieve the purpose, the invention adopts the following technical scheme: a multi-terminal network management monitoring system based on VPN technology comprises a public network module, a service module and a service module, wherein the public network module comprises a bastion machine and a VPN server, the bastion machine and the VPN server are exposed in a public network, only specific IP access is allowed through white list setting, and any other IP is rejected;
the cloud monitoring agent calls a host process to present parameters such as a CPU (central processing unit), a memory, a disk IO (input/output), a network and the like through a visual interface of a cloud console;
the data center network module comprises a virtual router and a virtual switch, enters the application system module through the virtual router and the virtual switch, a user successfully authenticated by the VPN can access the application system, the bastion machine can remotely apply the server, and the bastion machine performs audit management on the operation of a remote user system and performs safety authentication on a user connected with the host;
the cloud firewall screens malicious traffic from a public network, protects the bastion machine and the VPN server, monitors the access traffic, manages and controls the access traffic between ECS servers in the intranet, and safely isolates different services, so that the security threat to the whole cloud service caused by the security risk of a certain server is avoided.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the VPN servers are based on a tunnel encapsulation technology, each VPN server has an independent tunnel number, one tunnel number corresponds to one virtualized network, private networks are isolated from each other by tunnel IDs, internal networks of different private networks are completely isolated from each other, IP interconnection by external mapping is possible, and servers in the private networks use security-group firewalls to perform three-layer network access control.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the white list setting specifically includes: the source IP address, the source port, the destination IP address, the destination port and the transport layer protocol are accurately controlled, and the permission and the rejection behaviors of the authorization strategy can be matched with the source IP to perform blacklist and white list limitation.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the black-and-white list limitation specifically includes: and limiting the source IP, if the strategy is allowed, the source IP is a white list, and if the strategy is rejected, the source IP is a black list.
In the multi-terminal network management monitoring system based on the VPN technology, the bastion machine selects two or more combined authentication technologies for identity authentication of the same user, and audits important safety related events in the system, such as important user behaviors, abnormal use of system resources, use of important system commands and the like.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the cloud firewall further includes: and the internet boundary access control controls access flow of the internet, intercepts attacks and threats from the internet, such as hacker intrusion, mining and malicious flow and the like.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the cloud firewall further includes: and the intranet access control is used for managing and controlling access flow among ECS servers in the intranet, and carrying out safety isolation on different services, so that safety threats to the whole cloud service due to safety risks of a certain server are avoided.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the cloud firewall further includes: and intrusion prevention, namely detecting and analyzing the active external connection behavior of the cloud server, the internet access flow and the intranet server mutual access flow, knowing the network flow dynamics in real time, blocking abnormal behaviors in real time and preventing potential risks.
In the foregoing multi-terminal network management monitoring system based on the VPN technology, the cloud firewall further includes: and the flow is visualized, the information and the access relation of the assets are visualized and displayed by the console, and abnormal flow is found in time.
Compared with the prior art, the multi-terminal network management monitoring system based on the VPN technology has the advantages that:
the method only allows specific IP access through the VPN white list setting, refuses any other IP, manages and controls access flow of the Internet and the access flow of the Internet through the cloud firewall setting, intercepts attacks and threats from the Internet, such as hacker invasion, mining and malicious flow, manages and controls access flow between ECS servers in the intranet, safely isolates different services, avoids safety threats to the whole cloud service due to safety risks of a certain server, detects and analyzes the active external connection behavior of the cloud server, the access flow of the Internet and the mutual access flow of the intranet server, knows network flow dynamics in real time, blocks abnormal behaviors in real time, defends potential risks, and visually displays asset information and access relation through the console to find abnormal flow in time.
The method comprises the steps of building a data sharing service platform with unified standards and an interconnected network service platform, creating an overseas network security system meeting international business requirements, providing system services with low maintenance amount, high availability and high security for companies, and providing powerful support for the technical realization and security management aspects of building overseas data centers.
Drawings
Fig. 1 is a schematic structural diagram of a multi-terminal network management monitoring system based on VPN technology according to the present invention.
Detailed Description
The following examples are for illustrative purposes only and are not intended to limit the scope of the present invention.
Examples
As shown in fig. 1, a multi-terminal network management monitoring system based on VPN technology includes a public network module including a bastion machine and a VPN server, where the bastion machine and the VPN server are exposed in a public network, and only a specific IP is allowed to access through a white list setting, and any other IP is rejected, where the white list setting specifically includes: the method accurately controls a source IP address, a source port, a destination IP address, a destination port and a transport layer protocol, supports the limitation of a host port, supports the limitation of the transport layer protocol (only ssh, http, icmp and the like are allowed), allows and rejects behaviors of an authorization strategy can be matched with the source IP to perform black and white list limitation, and the IP range of 0.0.0.0/0 represents the development of all ports.
The cloud monitoring agent calls a host process to display parameters such as a CPU (central processing unit), a memory, a disk IO (input/output), a network and the like through a visual interface of a cloud console, and data are transmitted back to the client to access the client of the intranet system or the client of the remote host;
the data center network module comprises a virtual router and a virtual switch, enters the application system module through the virtual router and the virtual switch, a user successfully authenticated by the VPN can access the application system, the bastion machine can remotely apply the server, and the bastion machine performs audit management on the operation of a remote user system and performs safety authentication on a user connected with the host;
the cloud firewall screens malicious traffic from a public network, protects the bastion machine and the VPN server, monitors the access traffic, manages and controls the access traffic between ECS servers in the intranet, and safely isolates different services, so that the security threat to the whole cloud service caused by the security risk of a certain server is avoided.
The cloud firewall specifically comprises:
1. the internet boundary access control is used for managing and controlling access flow of the internet, and intercepting attacks and threats from the internet, such as hacker intrusion, mining, malicious flow and the like;
the intranet access control is used for managing and controlling access flow among ECS servers in the intranet and carrying out safety isolation on different services, so that safety threats to the whole cloud service caused by safety risks of a certain server are avoided;
2. intrusion prevention, namely detecting and analyzing the active external connection behavior of a cloud server, the internet access flow and the intranet server mutual access flow, knowing the network flow dynamics in real time, blocking abnormal behaviors in real time and preventing potential risks;
3. and the flow is visualized, the console visually displays the information and the access relation of the assets, and abnormal flow is discovered in time.
4. And (4) the equal-compliance standard stores the access log of the cloud server for more than 6 months, and meets the requirement of the equal-compliance standard.
Furthermore, the cloud firewall is a saas product, can be used by purchasing without any installation operation, and provides operation documents to guide how to perform network security protection configuration.
The cloud firewall also has the following advantages:
1. the service adopts the SDN technology, does not need to deploy any equipment (complex basic systems and network configuration operations such as mirror image installation and routing setting of the traditional firewall), does not need to pay attention to the problems of disaster tolerance, capacity expansion or access and the like, is simple and easy to use, can be used immediately after the control console completes simple setting, has second-level access and can defend immediately, and meanwhile, the operation and maintenance cost of network security management and control is effectively reduced.
2. The cloud firewall adopts a cluster deployment mode, supports smooth expansion of performance, and can achieve 2Gbps of protection flow for a single IP; the default is high, the dual Available Zone (AZ) is adopted for deployment, the cloud firewall fault cannot be caused when any one server or any one AZ fails, and the system is stable and reliable.
3. A built-in threat detection engine can synchronously update threat intelligence of the whole network, monitor more than 500 million active malicious IP and domain name entries and realize real-time detection and blocking of threats from the Internet. Meanwhile, a network killing chain is provided, and targeted network defense and real-time intrusion defense are performed in an important network attack stage.
4. The cloud firewall visually displays the assets and the access relations of the assets through the topological graph, and can know the service partition, grouping, the access relations among the assets and the access relations among the assets without configuration and the clustering analysis of user flow. The method supports visual analysis of flow, guarantees the correctness of the strategy to the maximum extent, meets the requirements of boundary protection, access control and the like in the equal-protection requirements, and makes the business relation visible.
The VPN servers are based on a tunnel encapsulation technology, each VPN server is provided with an independent tunnel number, one tunnel number corresponds to one virtual network, the private networks are isolated through tunnel IDs, subnets can be divided in the private networks like a traditional network environment due to the existence of switches and routers, different cloud servers in each subnet are interconnected through the same switch, and different subnets are interconnected through the routers. The internal networks of different proprietary networks are completely isolated, and can be interconnected through externally mapped IP.
All assets are uniformly controlled and monitored, the overall safety of the cloud service is monitored in real time, and loopholes, threats and attack conditions in the server are displayed. And each vulnerability is prevented from being evolved into an attacked entry of the whole network, and asset management and control are realized.
And periodically carrying out vulnerability scanning and baseline configuration checking on the service on the cloud, and providing monitoring and repairing service aiming at the detected holes and risk configuration items.
And searching various network and host logs, investigating the access amount, and counting and analyzing the original log information of each dimension.
And backtracking the intrusion events (such as Webshell, malicious software, encrypted lasso of core data and the like) occurring in the server, and discovering the cause and the whole process of the intrusion.
The IP message of the cloud server is encapsulated by using a tunnel encapsulation technology, the information of a data link layer (a two-layer MAC address) of the cloud server cannot enter a physical network, and the two-layer network isolation among different cloud servers is realized, so that the two-layer network isolation among different proprietary networks is also realized.
Servers within the private network use a security group firewall for three-tier network access control.
The bastion machine selects two or more combined identification technologies for identity identification of the same user, and audits important safety related events in the system, such as identity identification, system operation audit and account management and control, of important user behaviors, abnormal use of system resources, use of important system commands and the like.
The fort machine has the functions of core system operation and maintenance, safety audit management and control, safety compliance and the like:
the operation and maintenance personnel can carry out one-stop management on a plurality of resources by logging in at one time; all operations and logs are recorded in real time, so that audit is facilitated.
When the fort machine is used: client software does not need to be installed when logging in resources, monitoring resources in real time and uploading/downloading files; managing the centralized account number, and uniformly maintaining resources such as a host, network equipment, application release and the like; the functions of access history record playback, operation instruction search and the like are supported, and the access condition of a user to the host and the network equipment can be checked at any time; fine-grained authority division and dynamic authorization function for users; intercepting a real-time command of a host controlled by the cloud fort machine, and controlling the use of a sensitive command; other operation and maintenance personnel or experts can be invited to carry out cooperative operation and maintenance, and the same session is subjected to cooperative operation or problem location.
The fort machine can enable operation and maintenance personnel to manage various machine account passwords, and when the operation and maintenance personnel need to switch among a plurality of sets of host systems, the workload of the operation and maintenance personnel is reduced, the operation and maintenance efficiency is improved, the misoperation is reduced, and the normal operation of an IT system is maintained.
The invention also includes disaster recovery backup design:
cloud server business: operation and maintenance personnel perform data backup on a server system disk and a data disk through operations of making snapshots, mirroring and the like by a cloud control console, support snapshot rollback, restore data of time nodes for making snapshots, and support setting of automatic backup strategy and automatic snapshot generation;
a system manufacturer: and the system operation and maintenance personnel perform data backup by periodically backing up data to the local disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (9)

1. A multi-terminal network management monitoring system based on VPN technology is characterized by comprising:
the public network module comprises a bastion machine and a VPN server, wherein the bastion machine and the VPN server are exposed in a public network, only specific IP access is allowed through white list setting, and any other IP is rejected;
the cloud monitoring agent calls a host process to present parameters such as a CPU (central processing unit), a memory, a disk IO (input/output), a network and the like through a visual interface of a cloud console;
the data center network module comprises a virtual router and a virtual switch, enters the application system module through the virtual router and the virtual switch, a user successfully authenticated by the VPN can access the application system, the bastion machine can remotely apply the server, and the bastion machine performs audit management on the operation of a remote user system and performs safety authentication on a user connected with the host;
the cloud firewall screens malicious flow from a public network, protects the bastion machine and the VPN server, monitors the flow of access and exit, manages and controls access flow between ECS servers in an intranet, and safely isolates different services, so that security threats to the whole cloud service due to security risks of a certain server are avoided.
2. The system of claim 1, wherein the VPN servers are based on tunnel encapsulation technology, each VPN server has an independent tunnel number, one tunnel number corresponds to one virtualized network, private networks are isolated by tunnel IDs, internal networks are completely isolated from each other, and servers in the private networks can be interconnected by mapping IP, and a security firewall is used to control access to the three-layer network.
3. The multi-terminal network management monitoring system based on VPN technology according to claim 1, wherein said white list setting specifically is: the source IP address, the source port, the destination IP address, the destination port and the transport layer protocol are accurately controlled, and the permission and the rejection of the authorization strategy can be matched with the source IP to perform black and white list limitation.
4. The multi-terminal network management monitoring system based on VPN technology according to claim 3, wherein said black and white list restriction is specifically: and limiting the source IP, if the strategy is allowed, the source IP is a white list, and if the strategy is rejected, the source IP is a black list.
5. The system according to claim 1, wherein the bastion machine selects two or more combined authentication techniques for identity authentication for the same user, and audits important security-related events in the system such as important user behavior, abnormal use of system resources, and use of important system commands.
6. The multi-terminal network management monitoring system based on VPN technology as claimed in claim 1, wherein said cloud firewall further comprises: and the internet boundary access control controls access flow of the internet, intercepts attacks and threats from the internet, such as hacker intrusion, mining and malicious flow and the like.
7. The multi-terminal network management monitoring system based on VPN technology as claimed in claim 1, wherein said cloud firewall further comprises: and the intranet access control manages and controls the access flow between ECS servers in the intranet, and performs security isolation on different services, so that security threats to the whole cloud service due to security risks of a certain server are avoided.
8. The multi-terminal network management monitoring system based on VPN technology as claimed in claim 1, wherein said cloud firewall further comprises: and intrusion prevention, namely detecting and analyzing the active external connection behavior of the cloud server, the internet access flow and the intranet server mutual access flow, knowing the network flow dynamics in real time, blocking abnormal behaviors in real time and preventing potential risks.
9. The multi-terminal network management monitoring system based on VPN technology as claimed in claim 1, wherein said cloud firewall further comprises: and the flow is visualized, the information and the access relation of the assets are visualized and displayed by the console, and abnormal flow is found in time.
CN202110886701.XA 2021-08-03 2021-08-03 Multi-terminal network management monitoring system based on VPN technology Pending CN113645213A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110886701.XA CN113645213A (en) 2021-08-03 2021-08-03 Multi-terminal network management monitoring system based on VPN technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110886701.XA CN113645213A (en) 2021-08-03 2021-08-03 Multi-terminal network management monitoring system based on VPN technology

Publications (1)

Publication Number Publication Date
CN113645213A true CN113645213A (en) 2021-11-12

Family

ID=78419487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110886701.XA Pending CN113645213A (en) 2021-08-03 2021-08-03 Multi-terminal network management monitoring system based on VPN technology

Country Status (1)

Country Link
CN (1) CN113645213A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499927A (en) * 2021-12-13 2022-05-13 航天信息股份有限公司 Network security processing method and system under hybrid cloud environment
CN114629730A (en) * 2022-05-16 2022-06-14 华能国际电力江苏能源开发有限公司 Regional company computer network security interconnection method and system
CN114978670A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Identity authentication method and device based on fort machine
CN115296848A (en) * 2022-07-05 2022-11-04 北京瑞和云图科技有限公司 Bastion machine system based on multi-local area network environment and bastion machine access method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333090A (en) * 2011-09-28 2012-01-25 辽宁国兴科技有限公司 Internal control bastion host and security access method of internal network resources
CN109472136A (en) * 2018-10-26 2019-03-15 山东钢铁集团日照有限公司 Virtualization cloud desktop security access method based on defense-in-depth
WO2019090153A1 (en) * 2017-11-03 2019-05-09 Todyl, Inc. Cloud-based multi-function firewall and zero trust private virtual network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333090A (en) * 2011-09-28 2012-01-25 辽宁国兴科技有限公司 Internal control bastion host and security access method of internal network resources
WO2019090153A1 (en) * 2017-11-03 2019-05-09 Todyl, Inc. Cloud-based multi-function firewall and zero trust private virtual network
CN109472136A (en) * 2018-10-26 2019-03-15 山东钢铁集团日照有限公司 Virtualization cloud desktop security access method based on defense-in-depth

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
艾奇昆: "部署堡垒机保障运维安全", 《网络安全技术与应用》 *
苟文强: "构建医院网络安全系统 保障信息系统安全", 《中国管理信息化》 *
郑尔等: "例析广电网络防控系统在疫情时期的应用", 《广播电视网络》 *
陈健锋等: "浅析运维堡垒机的设计和应用前景", 《有线电视技术》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499927A (en) * 2021-12-13 2022-05-13 航天信息股份有限公司 Network security processing method and system under hybrid cloud environment
CN114629730A (en) * 2022-05-16 2022-06-14 华能国际电力江苏能源开发有限公司 Regional company computer network security interconnection method and system
CN114629730B (en) * 2022-05-16 2022-08-12 华能国际电力江苏能源开发有限公司 Regional company computer network security interconnection method and system
CN114978670A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Identity authentication method and device based on fort machine
CN114978670B (en) * 2022-05-19 2024-03-01 中国银行股份有限公司 Identity authentication method and device based on fort machine
CN115296848A (en) * 2022-07-05 2022-11-04 北京瑞和云图科技有限公司 Bastion machine system based on multi-local area network environment and bastion machine access method
CN115296848B (en) * 2022-07-05 2023-08-25 北京瑞和云图科技有限公司 Multi-local area network environment-based fort system and fort access method

Similar Documents

Publication Publication Date Title
US10462188B2 (en) Computer network security system
Alsmadi et al. Security of software defined networks: A survey
US7213265B2 (en) Real time active network compartmentalization
CN113645213A (en) Multi-terminal network management monitoring system based on VPN technology
CN114978584A (en) Network security protection safety method and system based on unit cell
Chang et al. Deciduous: Decentralized source identification for network-based intrusions
US20070266433A1 (en) System and Method for Securing Information in a Virtual Computing Environment
Ficco et al. Intrusion detection in cloud computing
CN110601889B (en) System and method for realizing safe backtracking deep encryption controlled network link resource scheduling management
CN112738125A (en) Network security collaborative defense system
Naseer Implementation of Hybrid Mesh firewall and its future impacts on Enhancement of cyber security
Toosarvandani et al. The risk assessment and treatment approach in order to provide LAN security based on ISMS standard
KR20020075319A (en) Intelligent Security Engine and Intelligent and Integrated Security System Employing the Same
CN112511562A (en) Cross-network data transmission system based on one-way isolation all-in-one machine and cloud desktop technology
CN117118703A (en) Mobile office security architecture based on Internet
Benjamin et al. Protecting IT systems from cyber crime
Yuan et al. Design and implementation of enterprise network security system based on firewall
Zardari et al. A quantitative analysis of cloud users' satisfaction and data security in cloud models
Mukhanov et al. “Common Criteria” and Software-Defined Network (SDN) Security
Zhao et al. Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios
Dautov et al. Distributed Ledger Methods In Securing Software-Defined Networks
Ariffin et al. Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed
Topala Cybersecurity system for enterprise telecommunications resources
CN113709157B (en) Electric power safety research and development network structure based on cloud routing and safety control center
Sachdeva et al. Cyber security disaster management for power sector

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination