CN116566654A - Protection system for block chain management server - Google Patents
Protection system for block chain management server Download PDFInfo
- Publication number
- CN116566654A CN116566654A CN202310384813.4A CN202310384813A CN116566654A CN 116566654 A CN116566654 A CN 116566654A CN 202310384813 A CN202310384813 A CN 202310384813A CN 116566654 A CN116566654 A CN 116566654A
- Authority
- CN
- China
- Prior art keywords
- server
- blockchain
- protection
- module
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 241000700605 Viruses Species 0.000 claims abstract description 32
- 238000001514 detection method Methods 0.000 claims abstract description 23
- 238000002955 isolation Methods 0.000 claims abstract description 13
- 238000012544 monitoring process Methods 0.000 claims abstract description 11
- 238000007726 management method Methods 0.000 claims description 23
- 238000004458 analytical method Methods 0.000 claims description 9
- 239000003795 chemical substances by application Substances 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 7
- 238000000034 method Methods 0.000 claims description 7
- 230000002155 anti-virotic effect Effects 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 claims description 6
- 238000000926 separation method Methods 0.000 claims description 6
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 4
- 239000008186 active pharmaceutical agent Substances 0.000 claims description 3
- 238000012550 audit Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 238000013461 design Methods 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims description 3
- 208000015181 infectious disease Diseases 0.000 claims description 3
- 238000002347 injection Methods 0.000 claims description 3
- 239000007924 injection Substances 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims description 3
- 230000002265 prevention Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000013475 authorization Methods 0.000 description 3
- 238000007792 addition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a protection system for a blockchain management server, which comprises gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, and the security agent is deployed in the blockchain server. According to the invention, through the blockchain server safety protection system, comprehensive protection is realized in aspects of virus protection, patch protection, malicious software protection, intrusion detection and protection, access control and integrity monitoring, and the problems of mutual attack, inconsistent safety states, inconsistent running environments and storm safety risks occupied by resources among servers in the blockchain server are solved, so that the safety threat of the system is reduced, the capability of resisting the latest safety threat is provided, the safety of the server is improved, and the high availability of the blockchain service application is ensured.
Description
Technical Field
The invention relates to the technical field of protection systems, in particular to a protection system for a blockchain management server.
Background
With the rapid development of blockchain technology, the security of blockchain servers is also receiving more and more attention, and blockchain servers are called nodes in a blockchain system, and they provide storage space and computational support for the whole blockchain system.
However, the prior blockchain servers have no safety protection measures in the process of operation, the phenomenon of mutual attack easily occurs between the blockchain servers, meanwhile, the technical problems of inconsistent safety states, inconsistent running environments and storm safety risk of resource occupation exist between the blockchain servers, and potential safety hazards are brought to the use of the blockchain servers.
Disclosure of Invention
The present invention is directed to a protection system for a blockchain management server, so as to solve the above-mentioned problems in the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions: the protection system comprises gateway deployment, security agent, application deployment, security center and management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge safety of a virtual platform, providing DHCP, NAT, unified firewall, balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing agent-free virus killing, IDS/IPS, program protection, program control and management, integrity monitoring and log audit, the security center is used for uniformly updating a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and security update and report generation, and the security center is used for managing, deploying, reporting, recording and integrating third party security services and realizing role-based access control and responsibility separation;
the protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
Preferably, the virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: evaluating the blockchain servers through a patch technology, automatically providing comprehensive bug fixes for each blockchain server, and intercepting bug attacks before patch programs are not installed;
preferably, the malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
Preferably, the intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
Preferably, the integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
Preferably, the integrity detection module further comprises suspicious file analysis, specifically: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
Preferably, the management center further comprises establishing DNS communication with a blockchain couple.
Preferably, the Web application protection module further includes: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
The invention has the technical effects and advantages that: through the block chain server safety protection system, comprehensive protection is realized in the aspects of virus protection, patch protection, malicious software protection, intrusion detection and protection, access control and integrity monitoring, the problems of mutual attack, inconsistent safety states, inconsistent running environments and storm safety risks occupied by resources among servers in the block chain server are solved, the safety threat is reduced, the system has the capability of resisting the latest safety threat, the safety of the servers is improved, and therefore, the high availability of block chain service application is guaranteed.
Drawings
FIG. 1 is a system block diagram of a protection system for a blockchain management server in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a protection system for a blockchain management server, which comprises gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing non-agent virus searching and killing, IDS/IPS, program protection, program control management, integrity monitoring and log audit, the security center is responsible for unified updating of a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and security update and generate reports by establishing and maintaining a global cache of a scanned file, and can be used for managing, deploying, reporting, recording and integrating third-party security services, so that role-based access control and responsibility separation are realized;
the risks presented by the blockchain management server include: mutual attack among blockchain services, inconsistent security states, inconsistent running environments, resource occupation storms, tool vulnerability risks, data security risks and system replication risks.
The protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
Virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: evaluating the blockchain servers through a patch technology, automatically providing comprehensive bug fixes for each blockchain server, and intercepting bug attacks before patch programs are not installed;
malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
Intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
Integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
The integrity detection module further comprises suspicious file analysis, specifically: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
The management center also comprises a step of establishing DNS communication with the blockchain couple, and specifically comprises the following steps:
step S1: the client sends a city name query request to the server, and specific query content is provided, when the queried content of the client belongs to a host name within a domain name of the server, the DNS server directly replies to the client to inform an IP address, and when the queried content of the client belongs to other domain names, the client firstly queries self cache content of the server to see whether related information exists or not, if found, the client replies to the client to inform the IP address;
step S2: if the related information is not found in the cache content of the server, the server can inquire the root server, the root server can inform the server of the next city name, namely the position of the layer of authorized servers, namely the IP address, possibly comprising a plurality of next layers of authorized server addresses, the local server can inquire one of the authorized servers, the next layer of authorized server address list is stored in the cache, and then the client can directly answer the client when requesting similar content;
step S3: the remote authorization server responds to the inquiry of the local server, if the response of the remote authorization server is not the answer of the last layer, the remote authorization server continues to inquire downwards until the result required by the client is obtained, the local server responds to the inquiry result to the client, meanwhile, the inquiry result is stored in a cache of the server, and if the same inquiry of the client is received before the storage time of the local server is not out, the information stored in the cache of the server is used for responding.
The Web application protection module further comprises: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
What is not described in detail in this specification is prior art known to those skilled in the art. The specific embodiments described herein are offered by way of example only to illustrate the spirit of the invention. Those skilled in the art may make various modifications or additions to the described embodiments or substitutions thereof without departing from the spirit of the invention or exceeding the scope of the invention as defined in the accompanying claims.
Claims (8)
1. The protection system for the blockchain management server is characterized by comprising gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing non-agent virus searching and killing, IDS/IPS, program protection, program control management, integrity monitoring and log audit, the security center is responsible for uniformly updating a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and conduct security update and report generation, and can be used for managing, deploying, reporting, recording and integrating third-party security services, so that role-based access control and responsibility separation are realized;
the protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
2. The protection system for a blockchain management server of claim 1, wherein the virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: the blockchain servers are evaluated through a patch technology, comprehensive bug fixes are automatically provided for each blockchain server, and interception of bug attacks is provided before patch programs are not installed.
3. The protection system for a blockchain management server of claim 1, wherein the malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
4. The protection system for a blockchain management server of claim 1, wherein the intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
5. The protection system for a blockchain management server of claim 1, wherein the integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
6. The protection system for a blockchain management server of claim 1, wherein the integrity detection module further includes suspicious file analysis, in particular: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
7. The protection system for a blockchain management server of claim 1, wherein the management center further includes establishing DNS communication with a blockchain couple.
8. The guard system for a blockchain management server of claim 1, wherein the Web application guard module further comprises: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310384813.4A CN116566654A (en) | 2023-04-12 | 2023-04-12 | Protection system for block chain management server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310384813.4A CN116566654A (en) | 2023-04-12 | 2023-04-12 | Protection system for block chain management server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116566654A true CN116566654A (en) | 2023-08-08 |
Family
ID=87492302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310384813.4A Pending CN116566654A (en) | 2023-04-12 | 2023-04-12 | Protection system for block chain management server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116566654A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111752139A (en) * | 2019-03-29 | 2020-10-09 | 霍尼韦尔国际公司 | Redundant controllers or input-output gateways without dedicated hardware |
US20200366717A1 (en) * | 2019-05-17 | 2020-11-19 | Juniper Networks, Inc. | Classification of unknown network traffic |
CN112016094A (en) * | 2020-08-14 | 2020-12-01 | 深圳市迈科龙电子有限公司 | Block chain service safety protection strategy management and control system and method |
CN112039858A (en) * | 2020-08-14 | 2020-12-04 | 深圳市迈科龙电子有限公司 | Block chain service security reinforcement system and method |
-
2023
- 2023-04-12 CN CN202310384813.4A patent/CN116566654A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111752139A (en) * | 2019-03-29 | 2020-10-09 | 霍尼韦尔国际公司 | Redundant controllers or input-output gateways without dedicated hardware |
US20200366717A1 (en) * | 2019-05-17 | 2020-11-19 | Juniper Networks, Inc. | Classification of unknown network traffic |
CN112016094A (en) * | 2020-08-14 | 2020-12-01 | 深圳市迈科龙电子有限公司 | Block chain service safety protection strategy management and control system and method |
CN112039858A (en) * | 2020-08-14 | 2020-12-04 | 深圳市迈科龙电子有限公司 | Block chain service security reinforcement system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11775622B2 (en) | Account monitoring | |
US20230362189A1 (en) | System and method for strategic anti-malware monitoring | |
US11888897B2 (en) | Implementing decoys in a network environment | |
US10230761B1 (en) | Method and system for detecting network compromise | |
US9942270B2 (en) | Database deception in directory services | |
US9762543B2 (en) | Using DNS communications to filter domain names | |
EP3289476B1 (en) | Computer network security system | |
US9460285B2 (en) | Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware | |
US7836501B2 (en) | Client compliancy with self-policing clients | |
JP5845258B2 (en) | System and method for local protection against malicious software | |
US20060259967A1 (en) | Proactively protecting computers in a networking environment from malware | |
US8548998B2 (en) | Methods and systems for securing and protecting repositories and directories | |
Ko et al. | System health and intrusion monitoring using a hierarchy of constraints | |
CN112583845A (en) | Access detection method and device, electronic equipment and computer storage medium | |
KR101910496B1 (en) | Network based proxy setting detection system through wide area network internet protocol(IP) validation and method of blocking harmful site access using the same | |
KR101186873B1 (en) | Wireless intrusion protecting system based on signature | |
Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
CN116566654A (en) | Protection system for block chain management server | |
Cardoso et al. | Security vulnerabilities and exposures in internet systems and services | |
TW202217617A (en) | Cyber security protection system and related proactive suspicious domain alert system | |
CN114615077A (en) | Honeypot-based network access control method, device and equipment | |
Razmjou | Toward more secure SDN: A Survey | |
Narayanaguru | Analysis of Cloud Network Intrusion Issue and a Feasible Detection Methodology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |