CN114050924A - Method and device for automatically controlling access control strategy enabling attribute based on time - Google Patents

Method and device for automatically controlling access control strategy enabling attribute based on time Download PDF

Info

Publication number
CN114050924A
CN114050924A CN202111314945.7A CN202111314945A CN114050924A CN 114050924 A CN114050924 A CN 114050924A CN 202111314945 A CN202111314945 A CN 202111314945A CN 114050924 A CN114050924 A CN 114050924A
Authority
CN
China
Prior art keywords
attribute
time
enabling
access control
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111314945.7A
Other languages
Chinese (zh)
Inventor
苗秀
马瑞武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202111314945.7A priority Critical patent/CN114050924A/en
Publication of CN114050924A publication Critical patent/CN114050924A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a device for automatically controlling access control strategy enabling attributes based on time, wherein the method comprises the following steps: detecting whether a control access policy configured as an enable attribute references a time attribute; if the time attribute is quoted, detecting whether the time attribute is effective, and if the time attribute is effective, enabling to control the access strategy; if the time attribute is not in effect, the access control policy is not enabled. Compared with the prior art that the enabling attribute of the access control strategy is manually modified, the method and the device can improve the modification efficiency of the access control strategy and reduce errors. Meanwhile, the automation level of the network security communication equipment management is improved, and the management cost and the like when the enabling attributes of a large number of access control strategies are modified according to the requirement in the network security communication equipment at high frequency are effectively reduced.

Description

Method and device for automatically controlling access control strategy enabling attribute based on time
Technical Field
The invention relates to the technical field of network communication and network security, in particular to a method and a device for automatically controlling the enabling attribute of an access control strategy based on time.
Background
With the rapid development of network technology, network security has attracted high attention of the whole society, and network security communication devices are beginning to be deployed in a large number in actual network environments. The access control function has the function of protecting the safety of the intranet network, so that the access control is supported by a large number of network safety communication devices as an important defense line of safety guarantee. With the increasing number of access control policies configured on the network security communication device, the problem of high network maintenance and management cost becomes more and more prominent, and the management cost becomes higher and higher.
In particular, administrators may have some need to have significant temporal characteristics in managing access control policies and to frequently modify policy-enabling attributes in large amounts. For example, during working hours of a company, the security department's colleagues do not allow access to the Internet, and during non-working hours, the Internet can be accessed, and if an administrator needs to manually specify the enabling attribute of the access control policy every day, the management and maintenance cost is high.
In the prior art, when configuring the access control policy, the enabling attribute of the access control policy needs to be manually specified. The access control policy enabling attribute may be manually specified. However, when the access control policy is configured too much, it is inefficient and error-prone to manually modify the enabling attributes of a large number of access control policies on demand in a network security communication device. This invisibly increases the cost of network administration and maintenance.
Disclosure of Invention
The invention aims to solve the technical problems of low efficiency, high error probability and high cost in manual modification of an access control strategy in the prior art, and provides a method and a device for automatically controlling the enabling attribute of the access control strategy based on time.
The method for automatically controlling the access control strategy enabling attribute based on time comprises the following steps:
detecting whether a control access policy configured as an enable attribute references a time attribute;
if the time attribute is quoted, detecting whether the time attribute is effective, and if the time attribute is effective, enabling the control access strategy; if the time attribute is not in effect, the access control policy is not enabled.
According to some embodiments of the invention, the method further comprises: if the control access policy configured to be enabled does not reference a time attribute, enabling the access control policy regardless of whether the time attribute is in effect.
In some embodiments of the invention, the method further comprises:
retrieving whether the control access policy configures an enabling attribute;
and if the control access strategy is not configured with the enabling attribute, the control access strategy is not enabled.
According to some embodiments of the invention, before detecting whether the control access policy configures an enabling attribute, attribute information of the access control policy is configured, including an enabling attribute and a time attribute.
An apparatus for automatically controlling an access control policy enabling attribute based on time according to an embodiment of the present invention includes:
a first detection module for detecting whether a control access policy configured as an enable attribute references a time attribute;
the analysis module is used for detecting whether the time attribute takes effect or not when detecting that the control access policy configured as the enabling attribute refers to the time attribute, and enabling the control access policy if the time attribute takes effect; if the time attribute is not in effect, the access control policy is not enabled.
According to some embodiments of the invention, the analysis module is further to: if it is detected that the control access policy configured to be enabled does not reference a time attribute, enabling the access control policy regardless of whether the time attribute is in effect.
In some embodiments of the invention, the apparatus further comprises:
the second detection module is used for retrieving whether the control access strategy configures an enabling attribute;
and if the control access strategy is not configured with an enabling attribute, the analysis module does not enable the control access strategy.
According to some embodiments of the invention, the apparatus further comprises:
and the configuration module is used for configuring the attribute information of the access control policy before detecting whether the control access policy configures the enabling attribute, wherein the attribute information comprises the enabling attribute and the time attribute.
According to the network security communication device of the embodiment of the present invention, the network security device automatically controls the access control policy by using the method for automatically controlling the access control policy enabling attribute based on time as described above, specifically including:
the network security communication equipment creates a main process and a time attribute monitoring process;
the main process calculates the time interval which is closest to the end or the start in all the defined time attributes, and performs validity analysis and marking on all the time attributes;
the main process sends the calculated time interval to the time attribute monitoring process;
and after receiving the time interval, the time attribute monitoring process calculates the remaining time, and if the remaining time is reduced to zero, the enabling attribute of the access control strategy is triggered and analyzed.
According to some embodiments of the invention, the method of analyzing the access control policy enabling attribute comprises:
if the access control policy configuration is not enabled, not enabling the access control policy;
if the access control policy is detected to be configured as enabled, detecting whether the access control policy refers to a time attribute;
enabling the access control policy if the time attribute is not referenced; and if the time attribute is quoted, detecting whether the quoted time attribute has an effective mark, if so, enabling the access control strategy, and if not, not enabling the access control strategy.
The method and the device for automatically controlling the access control strategy enabling attribute based on time have the following beneficial effects:
compared with the prior art that the enabling attribute of the access control strategy is manually modified, the method and the device can improve the modification efficiency of the access control strategy and reduce errors. Meanwhile, the automation level of the network security communication equipment management is improved, and the management cost and the like when the enabling attributes of a large number of access control strategies are modified according to the requirement in the network security communication equipment at high frequency are effectively reduced.
Drawings
FIG. 1 is a flow diagram of a method for automatically controlling access control policy enabling attributes based on time, according to an embodiment of the present invention;
FIG. 2 is a flow diagram of a method for automatically controlling access control policy enabling attributes based on time, according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a configuration of an apparatus for automatically controlling an access control policy enabling attribute based on time according to an embodiment of the present invention.
Reference numerals:
the apparatus 100 is described in the following with reference to,
the system comprises a first detection module 10, a second detection module 20, an analysis module 30 and a configuration module 40.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the intended purpose, the present invention will be described in detail with reference to the accompanying drawings and preferred embodiments.
From an analysis of the current state of the art, it was found that the state of the art is that the enabling properties of the access control policy are modified manually. The invention can effectively solve the problems of low efficiency, easy error and high maintenance and management cost of manually modifying the enabling attribute of the access control strategy.
The invention can dynamically generate the enabling attribute for each access control strategy. The network security communication equipment arbitrarily defines effective time attributes according to requirements, and the access control strategy dynamically generates the enabling attributes of the access control strategy based on the cited effective time attributes. The access control policy is quoted to the effective time attribute dynamic enabling access control policy defined by the network security communication equipment, so that the management and maintenance cost of the network security communication equipment is greatly reduced, and the automation level of the network security communication equipment management is improved.
As shown in fig. 1 and 2, a method for automatically controlling an access control policy enabling attribute based on time according to an embodiment of the present invention includes:
s11, detecting whether the control access policy configured as the enabling attribute refers to the time attribute;
s110, if the time attribute is quoted, whether the time attribute takes effect is detected;
s111, if the time attribute takes effect, enabling to control an access strategy;
and S112, if the time attribute is not valid, the access control strategy is not enabled.
As shown in fig. 1, according to some embodiments of the invention, the method further comprises:
and S120, if the time attribute is not referenced by the control access policy configured to be enabled, enabling the access control policy no matter whether the time attribute is effective or not.
In some embodiments of the invention, the method further comprises:
s10, searching whether the control access strategy is configured with the enabling attribute;
s12, if the control access policy is not configured with the enable attribute, the control access policy is not enabled.
According to some embodiments of the invention, before detecting whether the control access policy configures the enabling attribute, attribute information of the access control policy is configured, including the enabling attribute and the time attribute.
According to the apparatus 100 for automatically controlling an access control policy enabling attribute based on time according to an embodiment of the present invention, the apparatus 100 includes: a first detection module 10 and an analysis module 30.
The first detection module 10 is configured to detect whether a control access policy configured as an enable attribute refers to a time attribute, and the analysis module 30 is configured to detect whether the time attribute is valid when the control access policy configured as the enable attribute refers to the time attribute, and enable the control access policy if the time attribute is valid; if the time attribute is not in effect, the access control policy is not enabled.
According to some embodiments of the invention, the analysis module 30 is further configured to: if it is detected that the control access policy configured to be enabled does not reference the time attribute, the access control policy is enabled regardless of whether the time attribute is in effect.
In some embodiments of the invention, the apparatus 100 further comprises: a second detection module 20, configured to retrieve whether the control access policy configures an enabling attribute;
if the control access policy is not configured with an enable attribute, the analysis module 30 does not enable the control access policy.
According to some embodiments of the invention, the apparatus 100 further comprises: and the configuration module 40 is used for configuring the attribute information of the access control policy, including the enabling attribute and the time attribute, before detecting whether the control access policy configures the enabling attribute.
According to the network security communication device of the embodiment of the invention, the network security device automatically controls the access control policy by adopting the method for automatically controlling the enabling attribute of the access control policy based on time, and the method specifically comprises the following steps:
a11, the network security communication device creates a main process and a time attribute monitoring process;
a12, calculating the time interval which is closest to the end or the start in all the defined time attributes by the main process, and carrying out validity analysis and marking on all the time attributes;
a13, the main process sends the calculated time interval to the time attribute monitoring process;
a14, the time attribute monitoring process calculates the remaining time after receiving the time interval, and if the remaining time is reduced to zero, the enabling attribute of the access control strategy is triggered and analyzed.
According to some embodiments of the invention, a method of analyzing access control policy enabling attributes comprises:
if the access control policy configuration is not enabled, not enabling the access control policy;
if the access control strategy is detected to be configured to be enabled, whether the access control strategy refers to the time attribute is detected;
if the time attribute is not referenced, enabling the access control policy; and if the time attribute is quoted, detecting whether the quoted time attribute has an effective mark, if so, enabling the access control strategy, and if not, not enabling the access control strategy.
The method and the device 100 for automatically controlling the access control strategy enabling attribute based on time have the following beneficial effects:
compared with the prior art that the enabling attribute of the access control strategy is manually modified, the method and the device can improve the modification efficiency of the access control strategy and reduce errors. Meanwhile, the automation level of the network security communication equipment management is improved, and the management cost and the like when the enabling attributes of a large number of access control strategies are modified according to the requirement in the network security communication equipment at high frequency are effectively reduced.
A method and apparatus 100 for automatically controlling an access control policy enabling attribute based on time according to the present invention will be described in detail with reference to the accompanying drawings. It is to be understood that the following description is only exemplary in nature and should not be taken as a specific limitation on the invention.
First, when the network security communication device is started, the main process creates a time attribute monitoring process, and the time attribute monitoring process is responsible for listening for a message notified by the main process when the time attribute monitoring process triggers reanalysis of the access control policy enabling attribute.
The main process is responsible for recalculating the time interval which is recently ended or started from the moment in all the time attributes defined by the user after triggering the reanalysis of the access control strategy enabling attribute every time, sending the time interval to the time attribute monitoring process, triggering the reanalysis of the access control strategy enabling attribute after the time is expired, and meanwhile, the main process is also responsible for detecting whether each defined time attribute takes effect at the moment and making an effective mark.
Second, the addition, deletion, modification, and movement of the access control policy, as well as the addition, deletion, and modification of the time attribute, trigger a reanalysis confirmation of the access control policy enable attribute and whether the time attribute is in effect at this time and make an effective flag.
Finally, the access control policy enables analysis: the first enabling attribute of the access control policy is defined at the time of configuring the access control policy, which is never enabled without modification if the access control policy is configured to be disabled. If the access control policy is configured to be enabled, then it is detected whether the access control policy references a time attribute, and if not, the access control policy is always enabled without being modified. If the time attribute is quoted, detecting whether the quoted time attribute has an effective mark at this moment, if so, indicating that the access control strategy is enabled at this moment; otherwise it states that the access control policy is not enabled at this point.
Fig. 2 shows an access control policy enabling attribute automatic analysis flow chart, which includes the following steps:
s1, the network security communication device will create a main process and a time attribute monitoring process when it is started.
S2, the host process recalculates the time interval of all defined time attributes that has recently ended or started from this point in time after each triggering of the re-analysis of the access control policy enabling attribute, and re-performs validity analysis and marking on all time attributes.
S3, the host process sends the time interval information calculated in step A2 to the time attribute monitoring process.
And S4, the time attribute monitoring process restarts calculating the remaining time until next configuration switching after receiving the information, and the reanalysis of the access control strategy enabling attribute is triggered when the remaining time is reduced to zero and no new information is received.
S5, only the enabled access control policy participates in matching and passing messages.
And S6, the enabling attribute of the access control policy is jointly determined by the enabling attribute configured by the rule and the effective time period defined by the time attribute. If the access control policy is configured to be disabled then the access control policy will never be enabled without being modified. If the access control policy is configured to be enabled, detecting whether the access control policy refers to the time attribute, if the access control policy does not refer to the time attribute, enabling the access control policy forever under the condition that the access control policy is not modified; if the time attribute is referred, detecting whether the referred time attribute has a valid mark, if so, indicating that the access control policy is enabled at the moment; otherwise it states that the access control policy is not enabled at this point.
The following is a specific embodiment of the present invention:
the implementation provides a process of automatically analyzing the enabling attributes of six specific access control strategies. The specific description is as follows:
assuming that this moment is nine am, the following access control policies are automatically analyzed:
Figure BDA0003343337230000081
waiting for fifteen pm, the following access control policies are automatically analyzed for results:
Figure BDA0003343337230000091
waiting for seventeen and half afternoons, the following access control policies are automatically analyzed:
Figure BDA0003343337230000092
in summary, the invention automatically analyzes the enabling attribute of the access control policy according to the time attribute defined by the access control policy referring to the network security communication device. And generating an effective time period according to the defined time attribute, and after the time attribute is quoted by the access control policy, automatically analyzing the enabling attribute of the access control policy, thereby effectively improving the automation level of the network security communication equipment for managing the access control policy.
The enabling attribute of the access control strategy is automatically and dynamically analyzed by referring to the time attribute defined by the network security communication equipment according to the access control strategy, so that the automation level of the network security communication equipment for managing the access control strategy is effectively improved, and the management and maintenance cost is reduced when the enabling attribute of a large number of access control strategies is modified according to the requirement in the network security communication equipment at high frequency.
The method and the device 100 for automatically controlling the access control strategy enabling attribute based on time have the following beneficial effects:
compared with the prior art that the enabling attribute of the access control strategy is manually modified, the method and the device can improve the modification efficiency of the access control strategy and reduce errors. Meanwhile, the automation level of the network security communication equipment management is improved, and the management cost and the like when the enabling attributes of a large number of access control strategies are modified according to the requirement in the network security communication equipment at high frequency are effectively reduced.
While the invention has been described in connection with specific embodiments thereof, it is to be understood that it is intended by the appended drawings and description that the invention may be embodied in other specific forms without departing from the spirit or scope of the invention.

Claims (10)

1. A method for automatically controlling access control policy enabling attributes based on time, comprising:
detecting whether a control access policy configured as an enable attribute references a time attribute;
if the time attribute is quoted, detecting whether the time attribute is effective, and if the time attribute is effective, enabling the control access strategy; if the time attribute is not in effect, the access control policy is not enabled.
2. The method for automatically controlling access control policy enabling attributes based on time of claim 1, further comprising: if the control access policy configured to be enabled does not reference a time attribute, enabling the access control policy regardless of whether the time attribute is in effect.
3. The method for automatically controlling access control policy enabling attributes based on time of claim 1, further comprising:
retrieving whether the control access policy configures an enabling attribute;
and if the control access strategy is not configured with the enabling attribute, the control access strategy is not enabled.
4. The method of claim 3, wherein before detecting whether the control access policy configures an enabling attribute, configuring attribute information of the access control policy, including an enabling attribute and a time attribute.
5. An apparatus for automatically controlling access control policy enabling attributes based on time, the apparatus comprising:
a first detection module for detecting whether a control access policy configured as an enable attribute references a time attribute;
the analysis module is used for detecting whether the time attribute takes effect or not when detecting that the control access policy configured as the enabling attribute refers to the time attribute, and enabling the control access policy if the time attribute takes effect; if the time attribute is not in effect, the access control policy is not enabled.
6. The apparatus for automatically controlling access control policy enablement attributes based on time of claim 5, wherein the analysis module is further to: if it is detected that the control access policy configured to be enabled does not reference a time attribute, enabling the access control policy regardless of whether the time attribute is in effect.
7. The apparatus for automatically controlling access control policy enablement attributes based on time of claim 5, further comprising:
the second detection module is used for retrieving whether the control access strategy configures an enabling attribute;
and if the control access strategy is not configured with an enabling attribute, the analysis module does not enable the control access strategy.
8. The apparatus for automatically controlling access control policy enablement attributes based on time of claim 7, further comprising:
and the configuration module is used for configuring the attribute information of the access control policy before detecting whether the control access policy configures the enabling attribute, wherein the attribute information comprises the enabling attribute and the time attribute.
9. A network security communication device, wherein the network security device automatically controls an access control policy by using the method for automatically controlling an access control policy enabling attribute based on time according to any one of claims 1 to 4, specifically comprising:
the network security communication equipment creates a main process and a time attribute monitoring process;
the main process calculates the time interval which is closest to the end or the start in all the defined time attributes, and performs validity analysis and marking on all the time attributes;
the main process sends the calculated time interval to the time attribute monitoring process;
and after receiving the time interval, the time attribute monitoring process calculates the remaining time, and if the remaining time is reduced to zero, the enabling attribute of the access control strategy is triggered and analyzed.
10. The network security communication device of claim 9, wherein the method for analyzing the access control policy enabling attribute comprises:
if the access control policy configuration is not enabled, not enabling the access control policy;
if the access control policy is detected to be configured as enabled, detecting whether the access control policy refers to a time attribute;
enabling the access control policy if the time attribute is not referenced; and if the time attribute is quoted, detecting whether the quoted time attribute has an effective mark, if so, enabling the access control strategy, and if not, not enabling the access control strategy.
CN202111314945.7A 2021-11-08 2021-11-08 Method and device for automatically controlling access control strategy enabling attribute based on time Pending CN114050924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111314945.7A CN114050924A (en) 2021-11-08 2021-11-08 Method and device for automatically controlling access control strategy enabling attribute based on time

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111314945.7A CN114050924A (en) 2021-11-08 2021-11-08 Method and device for automatically controlling access control strategy enabling attribute based on time

Publications (1)

Publication Number Publication Date
CN114050924A true CN114050924A (en) 2022-02-15

Family

ID=80207400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111314945.7A Pending CN114050924A (en) 2021-11-08 2021-11-08 Method and device for automatically controlling access control strategy enabling attribute based on time

Country Status (1)

Country Link
CN (1) CN114050924A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102902A (en) * 2022-06-21 2022-09-23 北京天融信网络安全技术有限公司 Automatic switching method, device and analysis method for control strategy routing
CN116319104A (en) * 2023-05-22 2023-06-23 云上(江西)安全技术有限公司 Data security operation method based on attribute re-encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118749A (en) * 2009-12-30 2011-07-06 比亚迪股份有限公司 Network access control device for mobile terminal and mobile terminal equipment
CN106874077A (en) * 2015-12-11 2017-06-20 腾讯科技(深圳)有限公司 process operation method and device
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN112511524A (en) * 2020-11-24 2021-03-16 北京天融信网络安全技术有限公司 Access control policy configuration method and device
CN113518133A (en) * 2021-05-26 2021-10-19 北京天融信网络安全技术有限公司 Information configuration method and device and communication equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118749A (en) * 2009-12-30 2011-07-06 比亚迪股份有限公司 Network access control device for mobile terminal and mobile terminal equipment
CN106874077A (en) * 2015-12-11 2017-06-20 腾讯科技(深圳)有限公司 process operation method and device
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN112511524A (en) * 2020-11-24 2021-03-16 北京天融信网络安全技术有限公司 Access control policy configuration method and device
CN113518133A (en) * 2021-05-26 2021-10-19 北京天融信网络安全技术有限公司 Information configuration method and device and communication equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102902A (en) * 2022-06-21 2022-09-23 北京天融信网络安全技术有限公司 Automatic switching method, device and analysis method for control strategy routing
CN116319104A (en) * 2023-05-22 2023-06-23 云上(江西)安全技术有限公司 Data security operation method based on attribute re-encryption
CN116319104B (en) * 2023-05-22 2023-08-04 云上(江西)安全技术有限公司 Data security operation method based on attribute re-encryption

Similar Documents

Publication Publication Date Title
US10938851B2 (en) Techniques for defense against domain name system (DNS) cyber-attacks
CN114050924A (en) Method and device for automatically controlling access control strategy enabling attribute based on time
CN110545276B (en) Threat event warning method and device, warning equipment and machine-readable storage medium
CN112631913B (en) Method, device, equipment and storage medium for monitoring operation faults of application program
US20180332057A1 (en) Cyberattack behavior detection method and apparatus
CN103379099A (en) Hostile attack identification method and system
EP4060958A1 (en) Attack behavior detection method and apparatus, and attack detection device
CN110933115B (en) Analysis object behavior abnormity detection method and device based on dynamic session
CN107666468B (en) Network security detection method and device
CN112905548B (en) Security audit system and method
US20040006619A1 (en) Structure for event reporting in SNMP systems
CN109409113B (en) Power grid data safety protection method and distributed power grid data safety protection system
CN113901441A (en) User abnormal request detection method, device, equipment and storage medium
GB2574209A (en) Threat control
CN108566418A (en) A kind of processing method of the intelligence of electronic data
WO2007059667A1 (en) A method for obtaining the network element alarm data
US7130902B2 (en) Methods and apparatus for detecting and providing notification of computer system problems
WO2015000428A1 (en) Data processing method, server and system
CN115296904B (en) Domain name reflection attack detection method and device, electronic equipment and storage medium
CN113872931B (en) Port scanning behavior detection method and system, server and proxy node
CN104410643A (en) Statistic-based anti-attack method of SDN (Soft Defined Network) controller
CN113961920A (en) Suspicious process processing method and device, storage medium and electronic equipment
CN112436969A (en) Internet of things equipment management method, system, equipment and medium
EP3220303B1 (en) Selective extended archiving of data
CN106649473B (en) Operational issue feedback query method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination