CN116827674A - Protection method based on network communication security - Google Patents

Protection method based on network communication security Download PDF

Info

Publication number
CN116827674A
CN116827674A CN202311023658.XA CN202311023658A CN116827674A CN 116827674 A CN116827674 A CN 116827674A CN 202311023658 A CN202311023658 A CN 202311023658A CN 116827674 A CN116827674 A CN 116827674A
Authority
CN
China
Prior art keywords
network communication
network
communication equipment
port
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311023658.XA
Other languages
Chinese (zh)
Inventor
徐钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Network Core Technology Co ltd
Original Assignee
Beijing Zhongke Network Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongke Network Core Technology Co ltd filed Critical Beijing Zhongke Network Core Technology Co ltd
Priority to CN202311023658.XA priority Critical patent/CN116827674A/en
Publication of CN116827674A publication Critical patent/CN116827674A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a protection method based on network communication safety, which relates to the technical field of network safety protection, and can help an organization to evaluate the safety of each port in network communication equipment by analyzing the safety of each port in the network communication equipment, judge whether each port in the network communication equipment has a loophole or not, improve the safety of the network communication equipment, block the data packet in the network communication equipment when judging that the data packet in the network communication equipment carries viruses, analyze the data packet carrying viruses, help the organization to timely discover and cope with various safety threats, and update anti-virus software and safety patches on the network communication equipment, thereby improving the safety and protection capability of the network communication equipment, and timely discover and repair faults and problems of the network detection equipment by analyzing the state of the network detection equipment, thereby improving the reliability of the network detection equipment.

Description

Protection method based on network communication security
Technical Field
The invention relates to the technical field of network security protection, in particular to a protection method based on network communication security.
Background
Network communication security is a very important issue in today's society. With the popularization of the internet, data transmission and storage become easier and easier, but at the same time, security risks are brought. In order to protect personal privacy and enterprise confidentiality, a series of protective measures are required to be taken, in addition, network security holes and latest security threats are also required to be concerned, corresponding countermeasures are required to be taken in time, and only then, the security of network communication can be ensured, information leakage and loss are avoided, so that a protective method based on network communication security is required;
the existing network security technology and measures in the prior art have certain defects in coping with increasing network attacks and threats, at present, network attack means are continuously updated, hacking attack technology is continuously improved, so that the traditional security protection means are difficult to meet security requirements, and obviously, the protection means have at least the following problems:
1. the traditional network security protection can not find that viruses invade from a specific port of the network communication equipment, the traditional network security protection is mainly concentrated on the terminal equipment and the server, the security protection for each port in the network communication equipment is relatively less, the fact that the viruses invade from the specific port in the network communication equipment can not be found out and the threats can not be timely found out and handled by organizations when facing network attacks can be caused, so that the security problems such as data leakage and system paralysis can be possibly caused, in addition, the modern network attack technology is increasingly complex, and attackers can use various technologies and means to avoid traditional security protection measures;
2. meanwhile, if the invasion of the virus from the port in the network communication equipment cannot be found, the source and the transmission path of the virus cannot be determined, which causes that no targeted measures can be taken to prevent the further transmission and invasion of the virus, namely unknown security holes possibly exist in the network communication equipment, the holes can be utilized by hackers to continue unauthorized invasion activities, the system is continuously damaged, if the virus source cannot be found, measures cannot be timely taken to protect important data, the enterprises face risks of data leakage, commercial secret leakage and the like, and the continuous invasion of the virus can cause faults or service interruption of the network communication equipment, so that the normal operation and service continuity of the enterprises are influenced. The virus source cannot be found in time, the affected equipment and system cannot be recovered quickly, and the service interruption time is prolonged;
3. meanwhile, whether the network detection equipment operates normally cannot be accurately judged, network attack or abnormal behavior can not be found in time, the security risk of a system and data is increased, malicious activities can continue under the condition that the network attack or abnormal behavior is not detected, serious consequences such as data leakage and system paralysis are caused, and measures can not be taken in time to repair the equipment or replace the equipment. This may result in the device being in an abnormal state for a long time, further increasing the network security risk and the failure risk.
Disclosure of Invention
Aiming at the technical defects, the invention aims to provide a protection method based on network communication security.
In order to solve the technical problems, the invention adopts the following technical scheme: the invention provides a protection method based on network communication security, which comprises the following steps: step one, acquiring network parameters: acquiring network parameters corresponding to network communication equipment;
step two, analyzing the state of the network communication equipment: according to the network parameters corresponding to the network communication equipment, the state of the network communication equipment is analyzed to obtain a network state evaluation coefficient corresponding to the state of the network communication equipment, and whether the network communication equipment is abnormal or not is further judged;
step three, analyzing the data packet: when the network communication equipment is judged to be abnormal, the data packet in the network communication equipment is analyzed, whether the data packet in the network communication equipment carries viruses is judged, and when the data packet in the network communication equipment is judged to carry viruses, the data packet in the network communication equipment is blocked, and anti-virus software and security patches on the network communication equipment are updated;
step four, collecting port data: when the data packet in the network communication equipment is judged to carry viruses, a plurality of acquisition points are arranged at each port of the network communication equipment, and then port data corresponding to each port in the network communication equipment are acquired at each acquisition point, wherein the port data comprises port flow and port connection number;
fifth, analyzing port data: acquiring port data corresponding to each port in the network communication equipment according to each acquisition point, so as to analyze the safety of each port in the network communication equipment, obtain a safety evaluation coefficient corresponding to the safety of each port in the network communication equipment, and judge whether each port in the network communication equipment has a loophole or not;
step six, obtaining performance parameters: when the data packet in the network communication equipment is judged not to carry viruses, further acquiring performance parameters of the network detection equipment;
step seven, analyzing performance parameters: according to the performance parameters of the network detection equipment, the state of the network detection equipment is analyzed to obtain a state evaluation coefficient corresponding to the network detection equipment, and whether the network detection equipment operates normally is judged;
step eight, early warning prompting: and when the data packet in the network communication device carries viruses and the network detection device fails, an alarm is sent.
Preferably, the network parameters include network traffic size, network traffic frequency and network traffic speed.
Preferably, the analyzing the status of the network communication device specifically includes the following steps:
respectively recording the network traffic size, the network traffic frequency and the network traffic speed corresponding to the network communication equipment as、/>And->Substituting the calculation formula +.>Obtaining a network state evaluation coefficient corresponding to the state of the network communication equipment>Wherein->、/>、/>Respectively expressed as standard network flow size, standard network flow frequency, standard network communication equipment corresponding to the preset network communication equipment,Standard network traffic speed,/-, and>、/>、/>respectively expressed as the weight factors corresponding to the network traffic size, the network traffic frequency and the network traffic speed in the network communication equipment.
Preferably, the determining whether the network communication device is abnormal or not includes the following specific determining process:
and (3) corresponding the network state evaluation coefficient corresponding to the network communication equipment state and the preset standard network state evaluation coefficient, if the network state evaluation coefficient corresponding to the network communication equipment state is smaller than the preset standard network state evaluation coefficient, judging that the network communication equipment is abnormal, and if the network state evaluation coefficient corresponding to the network communication equipment state is larger than or equal to the preset standard network state evaluation coefficient, judging that the network communication equipment is normal.
Preferably, the analyzing the data packet in the network communication device specifically includes the following steps:
a1, comparing a source address, a target address and a protocol type corresponding to a data packet in network communication equipment with an initial source address, an initial target address and an initial protocol type corresponding to the data packet in the network communication equipment, if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are different from the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment carries viruses, and if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are the same as the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment does not carry viruses;
and A2, comparing the viruses in the data packet carrying the viruses in the network communication equipment with various viruses in the database, so as to obtain the virus types corresponding to the viruses in the data packet carrying the viruses in the network communication equipment, and updating the antivirus software corresponding to the virus types and the security patches corresponding to the virus types on the network communication equipment according to the corresponding virus types.
Preferably, the security of each port in the network communication device is analyzed, and the specific analysis process is as follows:
respectively recording port flow and port connection number corresponding to each port in each acquisition point acquisition network communication equipment asAnd->Wherein i represents the number corresponding to each acquisition point, < > and->Substituting the calculation formula +.>Obtaining security evaluation coefficients corresponding to the security of each port in the network communication equipment>Wherein->、/>Respectively expressed as standard port flow and standard port connection number corresponding to the ports in the preset network communication equipment,/->、/>And respectively representing the port flow and the weight factors corresponding to the port connection number.
Preferably, the analyzing the virus carried by the data packet in the network communication device specifically includes the following steps:
comparing the security evaluation coefficient corresponding to the security of each port in the network communication equipment with the security evaluation coefficient corresponding to the security of the preset standard port, if the security evaluation coefficient corresponding to the security of a certain port in the network communication equipment is smaller than the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is vulnerable, and if the security evaluation coefficient corresponding to the security of the certain port in the network communication equipment is greater than or equal to the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is not vulnerable.
Preferably, the performance parameters include packet loss rate, transmission speed and response time length.
Preferably, the analyzing the status of the network detection device specifically includes the following steps:
respectively marking the packet loss rate, the transmission speed and the response time length corresponding to the network detection equipment as、/>And->Substituting the calculation formula +.>Obtaining a state evaluation coefficient corresponding to the network detection device ∈ ->Wherein->、/>、/>Respectively expressed as a standard packet loss rate, a standard transmission speed and a standard response time length corresponding to preset network detection equipment, < >>、/>、/>Respectively expressed as weight factors corresponding to packet loss rate, transmission speed and response time length in the network detection equipment.
Preferably, the judging whether the network detection device operates normally or not includes the following specific judging process:
comparing the state evaluation coefficient corresponding to the network detection device with the state evaluation coefficient corresponding to the preset standard network detection device, if the state evaluation coefficient corresponding to the network detection device is smaller than the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device fails, and if the state evaluation coefficient corresponding to the network detection device is larger than or equal to the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device operates normally.
The invention has the beneficial effects that:
1. the security evaluation coefficients corresponding to the security of each port in the network communication equipment are obtained by analyzing the security of each port in the network communication equipment, so that the organization can be helped to evaluate the security of each port in the network communication equipment, judge whether holes exist or not, judge whether each port in the network communication equipment has holes or not, and improve the security of the network communication equipment: by evaluating the safety of each port in the network communication equipment, loopholes and safety problems in the network communication equipment can be found and repaired in time, so that the safety of the network communication equipment is improved, and various safety threats can be found and dealt with in time by analyzing the safety of each port in the network communication equipment, so that the safety risks faced by organizations are reduced;
2. when the data package in the network communication equipment is judged to carry viruses, the data package in the network communication equipment is blocked, and the data package carrying viruses is analyzed, so that an organization can be helped to find and cope with various security threats in time, and further, anti-virus software and security patches on the network communication equipment are updated, so that the security and protection capability of the network communication equipment are improved, various security threats can be found and cope with in time through the blocking and analysis of the data package carrying viruses, the security risks faced by the organization are reduced, and confidential information of the organization can be protected from being revealed or attacked through the blocking and analysis of the data package carrying viruses;
3. according to the performance parameters of the network detection equipment, the state of the network detection equipment can be analyzed to obtain a state evaluation coefficient corresponding to the network detection equipment, whether the network detection equipment is in normal operation or not is judged, the faults and problems of the network detection equipment can be found and repaired in time through the analysis of the state of the network detection equipment, so that the reliability of the network detection equipment is improved, the faults and the problems can be found and repaired in time through the analysis of the state of the network detection equipment, the operation and maintenance cost and the investment of manpower resources are reduced, the state of the network detection equipment is analyzed, and various faults and problems can be found and handled in time, so that the continuity and the stability of business are guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of the steps of the method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The embodiment of the invention is shown in fig. 1, and a protection method based on network communication security comprises the following steps: step one, acquiring network parameters: and acquiring network parameters corresponding to the network communication equipment.
In a specific embodiment, the network parameters include network traffic size, network traffic frequency, and network traffic speed.
It should be noted that the network monitoring tool may monitor and record information of network traffic, and may provide real-time network traffic size, network traffic frequency, and network traffic speed.
Step two, analyzing the state of the network communication equipment: according to the network parameters corresponding to the network communication devices, the states of the network communication devices are analyzed to obtain network state evaluation coefficients corresponding to the states of the network communication devices, and whether the network communication devices are abnormal or not is further judged.
In a specific embodiment, the analyzing the status of the network communication device is as follows:
respectively recording the network traffic size, the network traffic frequency and the network traffic speed corresponding to the network communication equipment as、/>And->Substituting the calculation formula +.>Obtaining a network state evaluation coefficient corresponding to the state of the network communication equipment>Wherein->、/>、/>Respectively expressed as standard network traffic size, standard network traffic frequency and standard network traffic speed corresponding to preset network communication equipment, < >>、/>、/>Respectively expressed as the weight factors corresponding to the network traffic size, the network traffic frequency and the network traffic speed in the network communication equipment.
In another specific embodiment, the determining whether the network communication device is abnormal includes the following specific determining process:
and (3) corresponding the network state evaluation coefficient corresponding to the network communication equipment state and the preset standard network state evaluation coefficient, if the network state evaluation coefficient corresponding to the network communication equipment state is smaller than the preset standard network state evaluation coefficient, judging that the network communication equipment is abnormal, and if the network state evaluation coefficient corresponding to the network communication equipment state is larger than or equal to the preset standard network state evaluation coefficient, judging that the network communication equipment is normal.
Step three, analyzing the data packet: when the network communication equipment is judged to be abnormal, the data packet in the network communication equipment is analyzed, whether the data packet in the network communication equipment carries viruses or not is judged, and when the data packet in the network communication equipment is judged to carry viruses, the data packet in the network communication equipment is blocked, and anti-virus software and security patches on the network communication equipment are updated.
Viruses include Trojan virus, worm virus, lesu software, and the like.
It should also be noted that anti-virus software includes siamesed iron, carbostyril, norton, and the like.
In a specific embodiment, the analyzing the data packet in the network communication device specifically includes the following steps:
a1, comparing a source address, a target address and a protocol type corresponding to a data packet in network communication equipment with an initial source address, an initial target address and an initial protocol type corresponding to the data packet in the network communication equipment, if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are different from the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment carries viruses, and if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are the same as the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment does not carry viruses;
and A2, comparing the viruses in the data packet carrying the viruses in the network communication equipment with various viruses in the database, so as to obtain the virus types corresponding to the viruses in the data packet carrying the viruses in the network communication equipment, and updating the antivirus software corresponding to the virus types and the security patches corresponding to the virus types on the network communication equipment according to the corresponding virus types.
When the data package in the network communication equipment is judged to carry viruses, the data package in the network communication equipment is blocked, and the data package carrying viruses is analyzed, so that the organization can be helped to find and cope with various security threats in time, and further, the anti-virus software and the security patches on the network communication equipment are updated, so that the security and the protection capability of the network communication equipment are improved, various security threats can be found and cope with in time through the blocking and the analysis of the data package carrying viruses, the security risks faced by the organization are reduced, and confidential information of the organization can be protected from being revealed or attacked through the blocking and the analysis of the data package carrying viruses.
Step four, collecting port data: when the data packet in the network communication equipment is judged to carry viruses, a plurality of acquisition points are arranged on each port of the network communication equipment, and then port data corresponding to each port in the network communication equipment are acquired at each acquisition point, wherein the port data comprises port flow and port connection number.
It should be noted that, using the network monitoring tool: the network monitoring tool can monitor and record information of network traffic, and can provide real-time port traffic and connection numbers.
Fifth, analyzing port data: and acquiring port data corresponding to each port in the network communication equipment according to each acquisition point, so as to analyze the safety of each port in the network communication equipment, obtain a safety evaluation coefficient corresponding to the safety of each port in the network communication equipment, and judge whether each port in the network communication equipment has a loophole or not.
In a specific embodiment, the security of each port in the network communication device is analyzed, and the specific analysis process is as follows:
respectively recording port flow and port connection number corresponding to each port in each acquisition point acquisition network communication equipment asAnd->Wherein i represents the number corresponding to each acquisition point, < > and->Substituting the calculation formula +.>Obtaining security evaluation coefficients corresponding to the security of each port in the network communication equipment>Wherein->、/>Respectively expressed as standard port flow and standard port connection number corresponding to the ports in the preset network communication equipment,/->、/>And respectively representing the port flow and the weight factors corresponding to the port connection number.
In another specific embodiment, the analyzing the virus carried by the data packet in the network communication device specifically includes the following steps:
comparing the security evaluation coefficient corresponding to the security of each port in the network communication equipment with the security evaluation coefficient corresponding to the security of the preset standard port, if the security evaluation coefficient corresponding to the security of a certain port in the network communication equipment is smaller than the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is vulnerable, and if the security evaluation coefficient corresponding to the security of the certain port in the network communication equipment is greater than or equal to the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is not vulnerable.
The security evaluation coefficients corresponding to the security of each port in the network communication equipment are obtained by analyzing the security of each port in the network communication equipment, so that the organization can be helped to evaluate the security of each port in the network communication equipment, judge whether holes exist or not, judge whether each port in the network communication equipment has holes or not, and improve the security of the network communication equipment: by evaluating the safety of each port in the network communication equipment, loopholes and safety problems in the network communication equipment can be found and repaired in time, so that the safety of the network communication equipment is improved, and by analyzing the safety of each port in the network communication equipment, various safety threats can be found and dealt with in time, so that the safety risks faced by organizations are reduced.
Step six, obtaining performance parameters: and when the data packet in the network communication equipment is judged not to carry viruses, further acquiring the performance parameters of the network detection equipment.
In a specific embodiment, the performance parameters include a packet loss rate, a transmission speed, and a response time duration.
It should be noted that, using the network monitoring tool: the network monitoring tool can monitor and record the information of the network flow, and can provide indexes such as real-time packet loss rate, transmission speed, response time length and the like.
Step seven, analyzing performance parameters: according to the performance parameters of the network detection equipment, the state of the network detection equipment is analyzed, a state evaluation coefficient corresponding to the network detection equipment is obtained, and whether the network detection equipment operates normally is judged.
In a specific embodiment, the state of the network detection device is analyzed, and a specific analysis process is as follows:
respectively marking the packet loss rate, the transmission speed and the response time length corresponding to the network detection equipment as、/>And->Substituting the calculation formula +.>Obtaining a state evaluation coefficient corresponding to the network detection device ∈ ->Wherein->、/>、/>Respectively expressed as a standard packet loss rate, a standard transmission speed and a standard response time length corresponding to preset network detection equipment, < >>、/>、/>Respectively expressed as weight factors corresponding to packet loss rate, transmission speed and response time length in the network detection equipment.
In another specific embodiment, the specific judging process for judging whether the network detection device operates normally is as follows:
comparing the state evaluation coefficient corresponding to the network detection device with the state evaluation coefficient corresponding to the preset standard network detection device, if the state evaluation coefficient corresponding to the network detection device is smaller than the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device fails, and if the state evaluation coefficient corresponding to the network detection device is larger than or equal to the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device operates normally.
Step eight, early warning prompting: and when the data packet in the network communication device carries viruses and the network detection device fails, an alarm is sent.
According to the performance parameters of the network detection equipment, the state of the network detection equipment can be analyzed to obtain a state evaluation coefficient corresponding to the network detection equipment, whether the network detection equipment is in normal operation or not is judged, the faults and problems of the network detection equipment can be found and repaired in time through the analysis of the state of the network detection equipment, so that the reliability of the network detection equipment is improved, the faults and the problems can be found and repaired in time through the analysis of the state of the network detection equipment, the operation and maintenance cost and the investment of manpower resources are reduced, the state of the network detection equipment is analyzed, and various faults and problems can be found and handled in time, so that the continuity and the stability of business are guaranteed.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. The protection method based on network communication safety is characterized by comprising the following steps:
step one, acquiring network parameters: acquiring network parameters corresponding to network communication equipment;
step two, analyzing the state of the network communication equipment: according to the network parameters corresponding to the network communication equipment, the state of the network communication equipment is analyzed to obtain a network state evaluation coefficient corresponding to the state of the network communication equipment, and whether the network communication equipment is abnormal or not is further judged;
step three, analyzing the data packet: when the network communication equipment is judged to be abnormal, the data packet in the network communication equipment is analyzed, whether the data packet in the network communication equipment carries viruses is judged, and when the data packet in the network communication equipment is judged to carry viruses, the data packet in the network communication equipment is blocked, and anti-virus software and security patches on the network communication equipment are updated;
step four, collecting port data: when the data packet in the network communication equipment is judged to carry viruses, a plurality of acquisition points are arranged at each port of the network communication equipment, and then port data corresponding to each port in the network communication equipment are acquired at each acquisition point, wherein the port data comprises port flow and port connection number;
fifth, analyzing port data: acquiring port data corresponding to each port in the network communication equipment according to each acquisition point, so as to analyze the safety of each port in the network communication equipment, obtain a safety evaluation coefficient corresponding to the safety of each port in the network communication equipment, and judge whether each port in the network communication equipment has a loophole or not;
step six, obtaining performance parameters: when the data packet in the network communication equipment is judged not to carry viruses, further acquiring performance parameters of the network detection equipment;
step seven, analyzing performance parameters: according to the performance parameters of the network detection equipment, the state of the network detection equipment is analyzed to obtain a state evaluation coefficient corresponding to the network detection equipment, and whether the network detection equipment operates normally is judged;
step eight, early warning prompting: and when the data packet in the network communication device carries viruses and the network detection device fails, an alarm is sent.
2. The network communication security-based protection method of claim 1, wherein the network parameters include a network traffic size, a network traffic frequency, and a network traffic speed.
3. The protection method based on network communication security as claimed in claim 2, wherein the analyzing the status of the network communication device comprises the following specific analysis processes:
respectively recording the network traffic size, the network traffic frequency and the network traffic speed corresponding to the network communication equipment as、/>And->Substituting the calculation formula +.>Obtaining a network state evaluation coefficient corresponding to the state of the network communication equipment>Wherein->、/>、/>Respectively expressed as standard network traffic size, standard network traffic frequency and standard network traffic speed corresponding to preset network communication equipment, < >>、/>、/>Respectively expressed as the weight factors corresponding to the network traffic size, the network traffic frequency and the network traffic speed in the network communication equipment.
4. The protection method based on network communication security as claimed in claim 3, wherein the specific judgment process for judging whether the network communication device is abnormal is as follows:
and (3) corresponding the network state evaluation coefficient corresponding to the network communication equipment state and the preset standard network state evaluation coefficient, if the network state evaluation coefficient corresponding to the network communication equipment state is smaller than the preset standard network state evaluation coefficient, judging that the network communication equipment is abnormal, and if the network state evaluation coefficient corresponding to the network communication equipment state is larger than or equal to the preset standard network state evaluation coefficient, judging that the network communication equipment is normal.
5. The protection method based on network communication security as claimed in claim 4, wherein the analyzing the data packet in the network communication device comprises the following specific analysis processes:
a1, comparing a source address, a target address and a protocol type corresponding to a data packet in network communication equipment with an initial source address, an initial target address and an initial protocol type corresponding to the data packet in the network communication equipment, if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are different from the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment carries viruses, and if the source address, the target address and the protocol type corresponding to the data packet in the network communication equipment are the same as the initial source address, the initial target address and the initial protocol type corresponding to the data packet in the network communication equipment, judging that the data packet in the network communication equipment does not carry viruses;
and A2, comparing the viruses in the data packet carrying the viruses in the network communication equipment with various viruses in the database, so as to obtain the virus types corresponding to the viruses in the data packet carrying the viruses in the network communication equipment, and updating the antivirus software corresponding to the virus types and the security patches corresponding to the virus types on the network communication equipment according to the corresponding virus types.
6. The protection method based on network communication security as claimed in claim 1, wherein the security of each port in the network communication device is analyzed by the following specific analysis process:
respectively recording port flow and port connection number corresponding to each port in each acquisition point acquisition network communication equipment asAndwherein i represents the number corresponding to each acquisition point, < > and->Substituting the calculation formula +.>In (3) obtaining a network communication deviceSecurity evaluation coefficient +.>Wherein->、/>Respectively expressed as standard port flow and standard port connection number corresponding to the ports in the preset network communication equipment,/->、/>And respectively representing the port flow and the weight factors corresponding to the port connection number.
7. The protection method based on network communication security as claimed in claim 6, wherein the analyzing the virus carried by the data packet in the network communication device comprises the following specific analysis processes:
comparing the security evaluation coefficient corresponding to the security of each port in the network communication equipment with the security evaluation coefficient corresponding to the security of the preset standard port, if the security evaluation coefficient corresponding to the security of a certain port in the network communication equipment is smaller than the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is vulnerable, and if the security evaluation coefficient corresponding to the security of the certain port in the network communication equipment is greater than or equal to the security evaluation coefficient corresponding to the security of the preset standard port, judging that the port protection in the network communication equipment is not vulnerable.
8. The method of claim 1, wherein the performance parameters include a packet loss rate, a transmission speed, and a response time.
9. The protection method based on network communication security as claimed in claim 8, wherein the analyzing the status of the network detection device comprises the following specific analysis processes:
respectively marking the packet loss rate, the transmission speed and the response time length corresponding to the network detection equipment as、/>And->Substituting the calculation formula +.>Obtaining a state evaluation coefficient corresponding to the network detection device ∈ ->Wherein->、/>、/>Respectively expressed as a standard packet loss rate, a standard transmission speed and a standard response time length corresponding to preset network detection equipment, < >>、/>、/>Respectively expressed as weight factors corresponding to packet loss rate, transmission speed and response time length in the network detection equipment.
10. The protection method based on network communication security as claimed in claim 9, wherein the specific judgment process for judging whether the network detection device is operating normally is as follows:
comparing the state evaluation coefficient corresponding to the network detection device with the state evaluation coefficient corresponding to the preset standard network detection device, if the state evaluation coefficient corresponding to the network detection device is smaller than the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device fails, and if the state evaluation coefficient corresponding to the network detection device is larger than or equal to the state evaluation coefficient corresponding to the preset standard network detection device, judging that the network detection device operates normally.
CN202311023658.XA 2023-08-15 2023-08-15 Protection method based on network communication security Pending CN116827674A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311023658.XA CN116827674A (en) 2023-08-15 2023-08-15 Protection method based on network communication security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311023658.XA CN116827674A (en) 2023-08-15 2023-08-15 Protection method based on network communication security

Publications (1)

Publication Number Publication Date
CN116827674A true CN116827674A (en) 2023-09-29

Family

ID=88139479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311023658.XA Pending CN116827674A (en) 2023-08-15 2023-08-15 Protection method based on network communication security

Country Status (1)

Country Link
CN (1) CN116827674A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117439866A (en) * 2023-10-12 2024-01-23 南京麦杰软件有限公司 Method and apparatus for ensuring network communication during maintenance work

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060067124A (en) * 2004-12-14 2006-06-19 한국전자통신연구원 Method for evaluation of network security level of customer network and apparatus thereof
CN110224894A (en) * 2019-06-18 2019-09-10 国网四川省电力公司内江供电公司 A kind of transformer station process layer network management system for monitoring
CN110768846A (en) * 2019-10-31 2020-02-07 国网四川省电力公司阿坝供电公司 Intelligent substation network safety protection system
CN115242693A (en) * 2021-04-22 2022-10-25 中兴通讯股份有限公司 Network detection method, device, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060067124A (en) * 2004-12-14 2006-06-19 한국전자통신연구원 Method for evaluation of network security level of customer network and apparatus thereof
CN110224894A (en) * 2019-06-18 2019-09-10 国网四川省电力公司内江供电公司 A kind of transformer station process layer network management system for monitoring
CN110768846A (en) * 2019-10-31 2020-02-07 国网四川省电力公司阿坝供电公司 Intelligent substation network safety protection system
CN115242693A (en) * 2021-04-22 2022-10-25 中兴通讯股份有限公司 Network detection method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117439866A (en) * 2023-10-12 2024-01-23 南京麦杰软件有限公司 Method and apparatus for ensuring network communication during maintenance work

Similar Documents

Publication Publication Date Title
JP4961153B2 (en) Aggregating knowledge bases from computer systems and proactively protecting computers from malware
US8931099B2 (en) System, method and program for identifying and preventing malicious intrusions
US20160232349A1 (en) Mobile malware detection and user notification
WO2017034072A1 (en) Network security system and security method
CN113839935B (en) Network situation awareness method, device and system
CN114978770A (en) Internet of things security risk early warning management and control method and system based on big data
CN109995727B (en) Active protection method, device, equipment and medium for penetration attack behavior
CN116827675A (en) Network information security analysis system
CN111277539A (en) Server Lesox virus protection system and method
CN113438249B (en) Attack tracing method based on strategy
KR102414334B1 (en) Method and apparatus for detecting threats of cooperative-intelligent transport road infrastructure
CN111835680A (en) Safety protection system of industry automatic manufacturing
CN116827674A (en) Protection method based on network communication security
CN114666088A (en) Method, device, equipment and medium for detecting industrial network data behavior information
CN111083172A (en) Link communication monitoring view construction method based on data packet analysis
KR20220081145A (en) AI-based mysterious symptom intrusion detection and system
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
CN112671781A (en) RASP-based firewall system
Coulibaly An overview of intrusion detection and prevention systems
Ye et al. Research on network security protection strategy
KR100651749B1 (en) Method for detection of unknown malicious traffic and apparatus thereof
CN115396167A (en) Network information security protection method based on big data
KR102377784B1 (en) Network security system that provides security optimization function of internal network
CN111711626A (en) Method and system for monitoring network intrusion
Sitorus et al. Nunukan State Court's Computer Network Security Improvement Using Centralized Next-Generation Firewall

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination