CN116527299A - Network-based safety protection method and dynamic defense system - Google Patents

Network-based safety protection method and dynamic defense system Download PDF

Info

Publication number
CN116527299A
CN116527299A CN202211722842.9A CN202211722842A CN116527299A CN 116527299 A CN116527299 A CN 116527299A CN 202211722842 A CN202211722842 A CN 202211722842A CN 116527299 A CN116527299 A CN 116527299A
Authority
CN
China
Prior art keywords
network
security
user
access
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211722842.9A
Other languages
Chinese (zh)
Inventor
许路平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou New Reed Technology Co ltd
Original Assignee
Suzhou New Reed Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou New Reed Technology Co ltd filed Critical Suzhou New Reed Technology Co ltd
Priority to CN202211722842.9A priority Critical patent/CN116527299A/en
Publication of CN116527299A publication Critical patent/CN116527299A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to the technical field of computer network security, and discloses a network security protection method and a dynamic defense system, which comprises the following steps: strengthening facility management and establishing a sound safety management system; step two: strengthening an access control strategy; step three: establishing a perfect backup and recovery mechanism; step four: establishing a security management mechanism, according to the first step, further comprising: the invention relates to a network security protection method and a dynamic defense system based on which whether a user has access rights to resources is judged to obtain a first judgment result, when the first judgment result indicates that the user has the access rights to the resources, the physical partition where the resources are located is determined, an access control strategy is strengthened, data, files, passwords and control information in a network are protected, and backup protection is performed in real time.

Description

Network-based safety protection method and dynamic defense system
Technical Field
The invention relates to the technical field of computer network security, in particular to a network security protection method and a dynamic defense system.
Background
The network security technology is mainly used for preventing potential network security hidden trouble and preventing network resources from being attacked by malicious codes. A complete network system needs to protect, detect, respond and recover comprehensive application, and has a plurality of network attack protection forms, such as a security router, a firewall technology, disaster recovery and recovery, network survival and other technologies.
However, the current network security technology cannot achieve effective monitoring and early warning in terms of network detection early warning and network security situation awareness, the network attack means is invariable, and most network security protection systems have no autonomous learning ability to cope with complex and changeable emergencies, so we propose a network security protection method and a dynamic defense system.
Disclosure of Invention
The invention mainly solves the technical problems existing in the prior art and provides a network-based security protection method and a dynamic defense system.
In order to achieve the above purpose, the invention adopts the following technical scheme that the network-based security protection method comprises the following steps:
step one: strengthening facility management and establishing a sound safety management system;
step two: strengthening an access control strategy;
step three: establishing a perfect backup and recovery mechanism;
step four: and establishing a security management mechanism.
As a preference; according to step one, further comprising: the protection of hardware entities and communication lines such as computer systems, network servers, printers and the like from natural disasters, artificial damages and wire-bonding attacks is focused on; and verifying the identity and the use authority of the user, preventing the user from unauthorized operation, and ensuring the entity security of the computer network system.
As a preference; according to step two, further comprising: the access control is a main strategy for network security protection and protection, and the main task of the access control is to ensure that network resources are not illegally used and illegally accessed, and various security strategies must be mutually matched to truly play a role in protection, but the access control is one of the most important core strategies for ensuring network security.
As a preference; according to step two, further comprising:
1) An access control policy; further comprises: it provides a first layer of access control. At this layer, which users are allowed to log in to the network server and acquire network resources, the time of allowing the users to access the network and the work station where the users are allowed to access the network are controlled, and the access control of the network can be realized in three steps: identifying and verifying the user name; identifying and verifying a user password; the checking of the user account number, as long as any step is not passed in the three steps, the network administrator manages the account number use, the network access time and the mode of the common user except the refused user, and can control the user to log in to the network site and limit the number of the network workstations of the user;
2) A network authority control strategy; further comprises: the security protection measure is provided for illegal network operation, and users and user groups are endowed with certain authority and are divided into three types: special users (e.g., system administrators); a general user, a system administrator allocates operation authorities to the general user according to the actual needs of the general user; auditing users, responsible for the security control of the network and the auditing of the resource use condition;
3) Establishing security settings of a network server; further comprises: the security control of the network server comprises setting a password locking server console; setting a server login time limit and a time interval for illegal visitor detection and closing; the firewall technology is an application security technology based on the modern communication network technology and the information security technology, is increasingly applied to the interconnection environment of a private network and a public network, particularly to the access of an Internet network, is a separator and a limiter and an analyzer logically, effectively monitors any activity between an intranet and the Internet, and ensures the security of the intranet;
4) An information encryption strategy; further comprises: the purpose of information encryption is to protect data, files, passwords and control information in a network, and protect data transmitted on the network, the common method of network encryption comprises three types of line encryption, endpoint encryption and node encryption, and the purpose of line encryption is to protect the security of line information between network nodes; the purpose of endpoint encryption is to provide protection for the source end user to destination end user data; the purpose of node encryption is to provide protection for the transmission line between the source node and the destination node, and the user can select the encryption mode according to the network condition;
5) Attribute security control policies; further comprises: when files, directories and network equipment are used, a network system administrator should assign access attributes to the files, directories and the like, attribute security control can link the given attributes with the files, directories and network equipment of a network server, attribute security provides further security on the basis of authority security, resources on the network should mark a set of security attributes in advance, access authority of users to the network resources corresponds to an access control table for indicating the access capability of the users to the network resources, attribute setting can cover any assigned and effective authority of assigned trustees, and the attributes of the network can protect important directories and files, prevent users from deleting the directories and the files mistakenly, modifying and displaying the files and the like.
As a preference; according to step three, further comprising:
in order to prevent abnormal damage of the storage device, a disk fault-tolerant array consisting of hot-swapped SCSI hard disks can be adopted to perform real-time hot backup of the system in a RAID5 mode, and meanwhile, powerful database triggers and operation and update tasks for recovering important data are established, so that the important data can be recovered to the maximum extent under any conditions.
As a preference; according to step four, further comprising:
the security management mechanism is directly related to the security of a computer system, and consists of security, audit, system analysis, software and hardware, communication, security personnel and other related personnel.
A network-based security protection method and a dynamic defense system comprise the following steps:
the data acquisition module is used for acquiring access data of various service programs of a plurality of server instances;
the data processing analysis module is used for regularizing the collected access data;
the dynamic rule generation module is used for carrying out exception analysis on the regularized data and generating a safety rule;
and the backup safety management module adopts a disk fault-tolerant array formed by hot-plug SCSI hard disks to carry out real-time hot backup of the system in a RAID5 mode.
Advantageous effects
The invention provides a network-based safety protection method and a dynamic defense system. The beneficial effects are as follows:
the network-based security protection method and the dynamic defense system judge whether a user has access rights to resources or not, and obtain a first judgment result; when the first judgment result indicates that the user has access rights to the resources, determining a physical partition where the resources are located; and strengthening an access control strategy, protecting data, files, passwords and control information in the network, and carrying out backup protection in real time.
Detailed Description
In the following, the technical solutions in the embodiments of the present invention will be clearly and completely described in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Examples: a network-based security protection method and a dynamic defense system comprise the following steps:
step one: strengthening facility management and establishing a sound safety management system;
step two: strengthening an access control strategy;
step three: establishing a perfect backup and recovery mechanism;
step four: and establishing a security management mechanism.
According to step one, further comprising: the protection of hardware entities and communication lines such as computer systems, network servers, printers and the like from natural disasters, artificial damages and wire-bonding attacks is focused on; and verifying the identity and the use authority of the user, preventing the user from unauthorized operation, and ensuring the entity security of the computer network system.
According to step two, further comprising: the access control is a main strategy for network security protection and protection, and the main task of the access control is to ensure that network resources are not illegally used and illegally accessed, and various security strategies must be mutually matched to truly play a role in protection, but the access control is one of the most important core strategies for ensuring network security.
According to step two, further comprising:
1) An access control policy; further comprises: it provides a first layer of access control. At this layer, which users are allowed to log in to the network server and acquire network resources, the time of allowing the users to access the network and the work station where the users are allowed to access the network are controlled, and the access control of the network can be realized in three steps: identifying and verifying the user name; identifying and verifying a user password; checking the account number of the user, wherein in the three steps, as long as any step is not finished, the network administrator manages the account number use, the network access time and the network access mode of the common user except the refused user, and can control the user to log in to the network station and limit the number of the network stations of the user;
2) A network authority control strategy; further comprises: the security protection measure is provided for illegal network operation, and users and user groups are endowed with certain authority and are divided into three types: special users (e.g., system administrators); a general user, a system administrator allocates operation authorities to the general user according to the actual needs of the general user; auditing users, responsible for the security control of the network and the auditing of the resource use condition;
3) Establishing security settings of a network server; further comprises: the security control of the network server comprises setting a password locking server console; setting a server login time limit and a time interval for illegal visitor detection and closing; the firewall technology is an application security technology based on the modern communication network technology and the information security technology, is increasingly applied to the interconnection environment of a private network and a public network, particularly to the access of an Internet network, is a separator and a limiter and an analyzer logically, effectively monitors any activity between an intranet and the Internet, and ensures the security of the intranet;
4) An information encryption strategy; further comprises: the purpose of information encryption is to protect data, files, passwords and control information in a network, and protect data transmitted on the network, the common method of network encryption comprises three types of line encryption, endpoint encryption and node encryption, and the purpose of line encryption is to protect the security of line information between network nodes; the purpose of endpoint encryption is to provide protection for the source end user to destination end user data; the purpose of node encryption is to provide protection for the transmission line between the source node and the destination node, and the user can select the encryption mode according to the network condition;
5) Attribute security control policies; further comprises: when files, directories and network equipment are used, a network system administrator should assign access attributes to the files, directories and the like, attribute security control can link the given attributes with the files, directories and network equipment of a network server, attribute security provides further security on the basis of authority security, resources on the network should mark a set of security attributes in advance, access authority of users to the network resources corresponds to an access control table for indicating the access capability of the users to the network resources, attribute setting can cover any assigned and effective authority of assigned trustees, and the attributes of the network can protect important directories and files, prevent users from deleting the directories and the files mistakenly, modifying and displaying the files and the like.
According to step three, further comprising:
in order to prevent abnormal damage of the storage device, a disk fault-tolerant array consisting of hot-swapped SCSI hard disks can be adopted to perform real-time hot backup of the system in a RAID5 mode, and meanwhile, powerful database triggers and operation and update tasks for recovering important data are established, so that the important data can be recovered to the maximum extent under any conditions.
According to step four, further comprising:
the security management mechanism is directly related to the security of a computer system, and consists of security, audit, system analysis, software and hardware, communication, security personnel and other related personnel.
A network-based security protection method and a dynamic defense system comprise the following steps:
the data acquisition module is used for acquiring access data of various service programs of a plurality of server instances;
the data processing analysis module is used for regularizing the collected access data;
the dynamic rule generation module is used for carrying out exception analysis on the regularized data and generating a safety rule;
and the backup safety management module adopts a disk fault-tolerant array formed by hot-plug SCSI hard disks to carry out real-time hot backup of the system in a RAID5 mode.
The foregoing has shown and described the basic principles and main features of the present invention and the advantages of the present invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made without departing from the spirit and scope of the invention, which is defined in the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. A network-based safety protection method is characterized in that: the method comprises the following steps:
step one: strengthening facility management and establishing a sound safety management system;
step two: strengthening an access control strategy;
step three: establishing a perfect backup and recovery mechanism;
step four: and establishing a security management mechanism.
2. The network-based security protection method according to claim 1, wherein: according to step one, further comprising: the protection of hardware entities and communication lines such as computer systems, network servers, printers and the like from natural disasters, artificial damages and wire-bonding attacks is focused on; and verifying the identity and the use authority of the user, preventing the user from unauthorized operation, and ensuring the entity security of the computer network system.
3. The network-based security protection method according to claim 1, wherein: according to step two, further comprising: the access control is a main strategy for network security protection and protection, and the main task of the access control is to ensure that network resources are not illegally used and illegally accessed, and various security strategies must be mutually matched to truly play a role in protection, but the access control is one of the most important core strategies for ensuring network security.
4. The network-based security protection method according to claim 1, wherein: according to step two, further comprising:
1) An access control policy; further comprises: it provides a first layer of access control. At this layer, which users are allowed to log in to the network server and acquire network resources, the time of allowing the users to access the network and the work station where the users are allowed to access the network are controlled, and the access control of the network can be realized in three steps: identifying and verifying the user name; identifying and verifying a user password; checking the account number of the user, wherein in the three steps, as long as any step is not finished, the network administrator manages the account number use, the network access time and the network access mode of the common user except the refused user, and can control the user to log in to the network station and limit the number of the network stations of the user;
2) A network authority control strategy; further comprises: the security protection measure is provided for illegal network operation, and users and user groups are endowed with certain authority and are divided into three types: special users (e.g., system administrators); a general user, a system administrator allocates operation authorities to the general user according to the actual needs of the general user; auditing users, responsible for the security control of the network and the auditing of the resource use condition;
3) Establishing security settings of a network server; further comprises: the security control of the network server comprises setting a password locking server console; setting a server login time limit and a time interval for illegal visitor detection and closing; the firewall technology is an application security technology based on the modern communication network technology and the information security technology, is increasingly applied to the interconnection environment of a private network and a public network, particularly to the access of an Internet network, is a separator and a limiter and an analyzer logically, effectively monitors any activity between an intranet and the Internet, and ensures the security of the intranet;
4) An information encryption strategy; further comprises: the purpose of information encryption is to protect data, files, passwords and control information in a network, and protect data transmitted on the network, the common method of network encryption comprises three types of line encryption, endpoint encryption and node encryption, and the purpose of line encryption is to protect the security of line information between network nodes; the purpose of endpoint encryption is to provide protection for the source end user to destination end user data; the purpose of node encryption is to provide protection for the transmission line between the source node and the destination node, and the user can select the encryption mode according to the network condition;
5) Attribute security control policies; further comprises: when files, directories and network equipment are used, a network system administrator should assign access attributes to the files, directories and the like, attribute security control can link the given attributes with the files, directories and network equipment of a network server, attribute security provides further security on the basis of authority security, resources on the network should mark a set of security attributes in advance, access authority of users to the network resources corresponds to an access control table for indicating the access capability of the users to the network resources, attribute setting can cover any assigned and effective authority of assigned trustees, and the attributes of the network can protect important directories and files, prevent users from deleting the directories and the files mistakenly, modifying and displaying the files and the like.
5. The network-based security protection method according to claim 1, wherein: according to step three, further comprising:
in order to prevent abnormal damage of the storage device, a disk fault-tolerant array consisting of hot-swapped SCSI hard disks can be adopted to perform real-time hot backup of the system in a RAID5 mode, and meanwhile, powerful database triggers and operation and update tasks for recovering important data are established, so that the important data can be recovered to the maximum extent under any conditions.
6. The network-based security protection method according to claim 1, wherein: according to step four, further comprising:
the security management mechanism is directly related to the security of a computer system, and consists of security, audit, system analysis, software and hardware, communication, security personnel and other related personnel.
7. The network-based security protection method and dynamic defense system according to claim 1, wherein:
the data acquisition module is used for acquiring access data of various service programs of a plurality of server instances;
the data processing analysis module is used for regularizing the collected access data;
the dynamic rule generation module is used for carrying out exception analysis on the regularized data and generating a safety rule;
and the backup safety management module adopts a disk fault-tolerant array formed by hot-plug SCSI hard disks to carry out real-time hot backup of the system in a RAID5 mode.
CN202211722842.9A 2022-12-30 2022-12-30 Network-based safety protection method and dynamic defense system Pending CN116527299A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211722842.9A CN116527299A (en) 2022-12-30 2022-12-30 Network-based safety protection method and dynamic defense system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211722842.9A CN116527299A (en) 2022-12-30 2022-12-30 Network-based safety protection method and dynamic defense system

Publications (1)

Publication Number Publication Date
CN116527299A true CN116527299A (en) 2023-08-01

Family

ID=87394593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211722842.9A Pending CN116527299A (en) 2022-12-30 2022-12-30 Network-based safety protection method and dynamic defense system

Country Status (1)

Country Link
CN (1) CN116527299A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116974708A (en) * 2023-09-25 2023-10-31 北京众图识人科技有限公司 Service data processing system
CN117040946A (en) * 2023-10-10 2023-11-10 深圳安天网络安全技术有限公司 Method and device for determining safety protection strategy

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116974708A (en) * 2023-09-25 2023-10-31 北京众图识人科技有限公司 Service data processing system
CN117040946A (en) * 2023-10-10 2023-11-10 深圳安天网络安全技术有限公司 Method and device for determining safety protection strategy
CN117040946B (en) * 2023-10-10 2024-01-26 深圳安天网络安全技术有限公司 Method and device for determining safety protection strategy

Similar Documents

Publication Publication Date Title
CN111784209B (en) Asset visualization and safe operation management system
Dhage et al. Intrusion detection system in cloud computing environment
Montesino et al. Information security automation: how far can we go?
CN114978584A (en) Network security protection safety method and system based on unit cell
US7669239B2 (en) Secure network system and associated method of use
CN116527299A (en) Network-based safety protection method and dynamic defense system
WO2013052377A2 (en) Secure integrated cyberspace security and situational awareness system
CN105430000A (en) Cloud computing security management system
JP2022530288A (en) How to prevent root-level access attacks and a measurable SLA security and compliance platform
CN106603488A (en) Safety system based on power grid statistical data searching method
CN113407949A (en) Information security monitoring system, method, equipment and storage medium
CN113411295A (en) Role-based access control situation awareness defense method and system
CN109150853A (en) The intruding detection system and method for role-base access control
CN113411297A (en) Situation awareness defense method and system based on attribute access control
Atieh Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
CN114915477A (en) Information security protection system of computer network
Wu The problems in campus network information security and its solutions
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
Guynes et al. E-commerce/network security considerations
US20230058569A1 (en) Systems and methods for quantifying file access risk exposure by an endpoint in a network environment
Kossakowski et al. Responding to intrusions
Miloslavskaya et al. Taxonomy for unsecure digital information processing
Yang et al. Analysis of Computer Network Security and Prevention Technology
Kowalski et al. Improving Security Through Analysis of Log Files Intersections.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination