CN116846675A - Monitoring method for system network communication security - Google Patents

Monitoring method for system network communication security Download PDF

Info

Publication number
CN116846675A
CN116846675A CN202310976943.7A CN202310976943A CN116846675A CN 116846675 A CN116846675 A CN 116846675A CN 202310976943 A CN202310976943 A CN 202310976943A CN 116846675 A CN116846675 A CN 116846675A
Authority
CN
China
Prior art keywords
internal system
enterprise internal
enterprise
network
evaluation coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310976943.7A
Other languages
Chinese (zh)
Other versions
CN116846675B (en
Inventor
杨东林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Network Core Technology Co ltd
Original Assignee
Beijing Zhongke Network Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongke Network Core Technology Co ltd filed Critical Beijing Zhongke Network Core Technology Co ltd
Priority to CN202310976943.7A priority Critical patent/CN116846675B/en
Publication of CN116846675A publication Critical patent/CN116846675A/en
Application granted granted Critical
Publication of CN116846675B publication Critical patent/CN116846675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a monitoring method for network communication safety of a system, which relates to the technical field of network communication monitoring, and comprises network flow information acquisition, network flow information monitoring, log information acquisition, log information monitoring, employee information analysis, network communication information monitoring and danger warning prompt.

Description

Monitoring method for system network communication security
Technical Field
The invention relates to the technical field of network communication monitoring, in particular to a monitoring method for system network communication safety.
Background
The current society is in the great trend of the development of network communication of the system, the frequent use and the high-speed development of the network communication enable a plurality of users to obtain various convenient communication experiences, people can realize communication without barriers and limitation, cross all transverse ditches, the maximum benefit can be obtained with minimum cost, the cooperative communication among people can be enhanced, the mutual assistance is realized, but the high-speed development of the network is often accompanied with communication unsafe, so that the system network communication needs to be monitored.
1. The prior art mainly monitors network communication in an enterprise internal system, but because of the diversity of enterprise system network personnel, the enterprise system network cannot be completely monitored, so that the enterprise system network is damaged by malicious software to a certain extent, network paralysis can be caused, important enterprise data information can be leaked, a certain benefit is damaged for the enterprise, the competitive advantage of the enterprise is lost, the trust of clients is damaged, and sensitive information can cause great damage to the reputation of the enterprise if the sensitive information is acquired by molecules and is used in illegal activities.
Disclosure of Invention
Aiming at the technical defects, the invention aims to provide a monitoring method for the network communication security of a system.
In order to solve the technical problems, the invention adopts the following technical scheme: the invention provides a monitoring method for system network communication security, which comprises the following steps: step one, obtaining network flow information: the method comprises the steps of obtaining basic parameters of network flow information in an enterprise internal system, wherein the basic parameters of the network flow information comprise network bandwidth, network bytes and network rate;
step two, monitoring network flow information: acquiring basic parameters of corresponding network flow information in the enterprise internal system, further analyzing and obtaining a state evaluation coefficient of the network flow information in the enterprise internal system, judging abnormal conditions of the network flow information in the enterprise internal system, if the network flow information in the enterprise internal system is in an abnormal state, performing step three, and if the network flow information in the enterprise internal system is in a normal state, continuing normal communication transmission;
step three, log information acquisition: if the network flow and the data in the enterprise internal system are in an abnormal state, acquiring corresponding log information in the enterprise internal system, wherein the log information comprises network connection rate, access request times and data transmission time;
step four, monitoring log information: the privacy evaluation coefficient of the log in the enterprise internal system is obtained through analysis by obtaining the corresponding log information in the enterprise internal system, and meanwhile, whether the log is invaded by malicious software is judged, and then the fifth step is executed;
fifthly, staff information analysis: according to the chat times, the chat content depth and the chat time length corresponding to each employee in the enterprise internal system, further analyzing the identity evaluation coefficients corresponding to each employee in the enterprise internal system, and simultaneously according to the IP address information corresponding to each employee login account in the enterprise internal system, further analyzing the address qualification influence coefficients corresponding to each employee in the enterprise internal system, and further analyzing the confidentiality evaluation coefficients of each employee in the enterprise internal system by acquiring the scheduling private file times, the private file date change times and the log information record times corresponding to each employee in the enterprise internal system;
step six, monitoring network communication information: the method comprises the steps of analyzing a security evaluation coefficient of network communication in an enterprise internal system by means of a state evaluation coefficient of network flow information in the enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system and a confidentiality evaluation coefficient of each employee in the enterprise internal system, and judging the optimal state of network communication security in the enterprise internal system;
step seven, dangerous warning prompt: when network communication is in an unsafe state due to malicious software invasion, early warning prompt is carried out.
Preferably, the analyzing obtains a state evaluation coefficient of network traffic information in an enterprise internal system, and the specific analysis process is as follows:
by calculation formulaAnalyzing and obtaining state evaluation coefficient of network flow information in enterprise internal system>,/>、/>、/>Weight factors respectively expressed as corresponding network bandwidth, network byte and network rate in the set enterprise internal system, +.>、/>、/>Respectively expressed as corresponding network bandwidth, network bytes, network rate, and +.>、/>、/>Respectively expressed as corresponding network bandwidth, network byte and network rate in the set enterprise internal system.
Preferably, the specific analysis process for judging the abnormal situation of the network traffic information in the internal system of the enterprise is as follows:
comparing the state evaluation coefficient threshold value of the network flow information in the enterprise internal system with a preset state evaluation coefficient threshold value of the network flow information in the enterprise internal system, judging that the network flow information in the enterprise internal system is abnormal if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is larger than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system, and judging that the network flow in the enterprise internal system can perform normal data communication transmission if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is smaller than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system.
Preferably, the analysis obtains privacy evaluation coefficients of each log in the enterprise internal system, and simultaneously judges whether the log is invaded by malicious software, and the specific analysis process is as follows:
by calculation formulaAnalyzing to obtain privacy evaluation coefficient of log in enterprise internal system>I represents the number of each log, +.>,/>、/>、/>Weight factors respectively expressed as preset network connection rate, access request times and data transmission time in enterprise internal system, +.>、/>、/>Respectively expressed as the set network connection rate, access request times, data transmission time in the enterprise internal system,/>、/>、/>Respectively representing the network connection rate, the access request times and the data transmission time corresponding to the ith log in the enterprise internal system;
comparing the privacy evaluation coefficient threshold value of each log in the enterprise internal system with a preset privacy evaluation coefficient threshold value of each log in the enterprise internal system, if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is different from the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy of the log is revealed and invaded by malicious software, and if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is the same as the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy guarantee of the software is good and not invaded by the malicious software.
Preferably, the analyzing the identity evaluation coefficients corresponding to each employee in the enterprise internal system includes the following specific analysis processes:
by calculation formulaAnalyzing to obtain identity evaluation coefficients corresponding to staff in enterprise internal system>J represents the number of each employee, +.>,/>、/>、/>Respectively representing the chat times, the chat content depth and the chat time corresponding to the jth employee in the enterprise internal system, < + >>、/>、/>Respectively expressed as preset enterprise internal systemWeight factors of chat times, chat content depth and chat time corresponding to all employees in the system, < ->、/>、/>Respectively expressed as the chat times, the chat content depth and the chat time of the reference.
Preferably, the analyzing the address qualification influence coefficient corresponding to each employee in the enterprise internal system includes the following specific analysis process:
extracting target IP address information from IP address information corresponding to each employee login account in the enterprise internal system, comparing the target IP address information with the IP address information corresponding to each employee login account in the enterprise internal system, and if the target IP address information corresponding to a certain employee login account is the same as the IP address information corresponding to the employee login account, marking the login qualification influence coefficient corresponding to each employee in the enterprise internal system asOtherwise, it is marked as +.>Thereby obtaining the address qualification influence coefficient corresponding to each employee in the enterprise internal system>Wherein->The value is +.>Or->And->>/>
Preferably, the analysis of the secret evaluation coefficients of each employee in the enterprise internal system comprises the following specific analysis processes:
by calculation formulaAnalyzing to obtain security evaluation coefficients of staff in enterprise internal system>,/>、/>、/>Respectively representing the number of times of dispatching private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to each employee in a preset enterprise internal system,、/>、/>respectively expressed as the number of times of dispatching private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to the jth staff in the enterprise internal system,/>、/>、/>Separate tableThe number of scheduled private files, the number of date changes of the private file, and the number of log information records are shown as references.
Preferably, the analyzing the security evaluation coefficient of the network communication in the internal system of the enterprise and judging the optimal state of the security of the network communication in the internal system of the enterprise specifically includes the following steps:
by calculation formulaAnalysis to obtain the security evaluation coefficient of network communication in the enterprise internal system>,/>、/>、/>、/>The system is respectively expressed as a state evaluation coefficient of network flow information in a preset enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system, a weight factor of confidentiality evaluation coefficient of each employee in the enterprise internal system, and a weight factor of->、/>、/>、/>The state evaluation coefficients are respectively expressed as network flow information in the enterprise internal system and privacy evaluation coefficients of logs in the enterprise internal systemThe identity evaluation coefficients corresponding to all employees in the enterprise internal system and the confidentiality evaluation coefficients of all employees in the enterprise internal system;
comparing the safety evaluation coefficient threshold value of the network communication in the enterprise internal system with the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, judging that the network communication in the enterprise internal system is in a safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is larger than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and judging that the network communication in the enterprise internal system is not in the safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is smaller than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and interrupting the communication.
1. Compared with the prior art, the invention has the beneficial effects that: the invention provides a monitoring method for network communication security of a system, which monitors network traffic information, further better analyzes the state of the network traffic in an enterprise system, thereby more accurately monitoring log information, further better analyzing whether the log is invaded by malicious software, further better analyzing employee information, further more comprehensively knowing the identity state of the employee, further better monitoring the network communication information, thereby acquiring the safe network communication, facilitating people to communicate with each other with more safety guarantee, solving the defects in the prior art, better guaranteeing the privacy of communication, ensuring the benefits of the people not to be damaged, better strengthening and developing the own enterprises and advantages, and giving a good impression.
2. According to the method and the system, the log privacy evaluation coefficient in the enterprise internal system is deeply analyzed in log information monitoring, so that the privacy of the log can be better ensured, and meanwhile, the normal running state of the log can be known, so that malicious software can be prevented.
3. The invention carries out deep analysis on the employee information of the enterprise in the enterprise internal system in the employee information analysis, so that the state of each employee can be better and more carefully known, the important file of the enterprise information can be better ensured not to be leaked, and the normal operation of the enterprise is ensured.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of the system structure of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for monitoring network communication security of a system includes network traffic information acquisition, network traffic information monitoring, log information acquisition, log information monitoring, employee information analysis, network communication information monitoring, and hazard warning prompt.
The network flow information acquisition is respectively connected with the network flow information monitoring and the log information acquisition, the log information acquisition is respectively connected with the log information monitoring and the employee information analysis, and the employee information analysis is respectively connected with the network communication information monitoring and the danger warning prompt.
Step one, obtaining network flow information: the method comprises the steps of obtaining basic parameters of network flow information in an enterprise internal system, wherein the basic parameters of the network flow information comprise network bandwidth, network bytes and network rate;
the network traffic information may be obtained by a network traffic monitoring tool, for example ntop, wireshark.
Step two, monitoring network flow information: acquiring basic parameters of corresponding network flow information in the enterprise internal system, further analyzing and obtaining a state evaluation coefficient of the network flow information in the enterprise internal system, judging abnormal conditions of the network flow information in the enterprise internal system, if the network flow information in the enterprise internal system is in an abnormal state, performing step three, and if the network flow information in the enterprise internal system is in a normal state, continuing normal communication transmission;
as an optional implementation manner, the analysis obtains a state evaluation coefficient of network traffic information in an internal system of the enterprise, and the specific analysis process is as follows:
by calculation formulaAnalyzing and obtaining state evaluation coefficient of network flow information in enterprise internal system>,/>、/>、/>Weight factors respectively expressed as corresponding network bandwidth, network byte and network rate in the set enterprise internal system, +.>、/>、/>Respectively expressed as corresponding network bandwidth, network bytes, network rate, and +.>、/>、/>Respectively expressed as corresponding network bandwidth, network byte and network rate in the set enterprise internal system.
As an optional implementation manner, the specific analysis process for judging the abnormal situation of the network traffic information in the internal system of the enterprise is as follows:
comparing the state evaluation coefficient threshold value of the network flow information in the enterprise internal system with a preset state evaluation coefficient threshold value of the network flow information in the enterprise internal system, judging that the network flow information in the enterprise internal system is abnormal if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is larger than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system, and judging that the network flow in the enterprise internal system can perform normal data communication transmission if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is smaller than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system.
Step three, log information acquisition: if the network flow and the data in the enterprise internal system are in an abnormal state, acquiring corresponding log information in the enterprise internal system, wherein the log information comprises network connection rate, access request times and data transmission time;
it should be noted that, log information acquisition can be checked in the system log option.
Step four, monitoring log information: the privacy evaluation coefficient of the log in the enterprise internal system is obtained through analysis by obtaining the corresponding log information in the enterprise internal system, and meanwhile, whether the log is invaded by malicious software is judged, and then the fifth step is executed;
as an optional implementation manner, the analysis obtains privacy evaluation coefficients of each log in the internal system of the enterprise, and simultaneously judges whether the log is invaded by malicious software, and the specific analysis process is as follows:
by calculation formulaAnalyzing to obtain privacy evaluation coefficient of log in enterprise internal system>I represents the number of each log, +.>,/>、/>、/>Weight factors respectively expressed as preset network connection rate, access request times and data transmission time in enterprise internal system, +.>、/>、/>Respectively expressed as the set network connection rate, access request times, data transmission time in the enterprise internal system,/>、/>、/>Respectively representing the network connection rate, the access request times and the data transmission time corresponding to the ith log in the enterprise internal system;
comparing the privacy evaluation coefficient threshold value of each log in the enterprise internal system with a preset privacy evaluation coefficient threshold value of each log in the enterprise internal system, if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is different from the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy of the log is revealed and invaded by malicious software, and if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is the same as the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy guarantee of the software is good and not invaded by the malicious software.
Fifthly, staff information analysis: according to the chat times, the chat content depth and the chat time length corresponding to each employee in the enterprise internal system, further analyzing the identity evaluation coefficients corresponding to each employee in the enterprise internal system, and simultaneously according to the IP address information corresponding to each employee login account in the enterprise internal system, further analyzing the address qualification influence coefficients corresponding to each employee in the enterprise internal system, and further analyzing the confidentiality evaluation coefficients of each employee in the enterprise internal system by acquiring the scheduling private file times, the private file date change times and the log information record times corresponding to each employee in the enterprise internal system;
it should be noted that, information corresponding to the staff may be obtained in the background of the system.
As an optional implementation manner, the analysis of the identity evaluation coefficients corresponding to each employee in the enterprise internal system comprises the following specific analysis processes:
by calculation formulaAnalyzing to obtain identity evaluation coefficients corresponding to staff in enterprise internal system>J represents the number of each employee, +.>,/>、/>、/>Respectively representing the chat times, the chat content depth and the chat time corresponding to the jth employee in the enterprise internal system, < + >>、/>、/>Respectively expressed as weight factors of chat times, chat content depth and chat time corresponding to each employee in a preset enterprise internal system, and +.>、/>、/>Respectively expressed as the chat times, the chat content depth and the chat time of the reference.
As an optional implementation manner, the analysis of the address qualification influence coefficient corresponding to each employee in the enterprise internal system comprises the following specific analysis processes:
extracting target IP address information from IP address information corresponding to each employee login account in the enterprise internal system, comparing the target IP address information with the IP address information corresponding to each employee login account in the enterprise internal system, and if the target IP address information corresponding to a certain employee login account is the same as the IP address information corresponding to the employee login account, marking the login qualification influence coefficient corresponding to each employee in the enterprise internal system asOtherwise, it is marked as +.>Thereby obtaining the address qualification influence coefficient corresponding to each employee in the enterprise internal system>Wherein->The value is +.>Or->And->>/>
As an alternative implementation manner, the security assessment coefficients of each employee in the enterprise internal system are analyzed, and the specific analysis process is as follows:
by calculation formulaAnalyzing to obtain security evaluation coefficients of staff in enterprise internal system>,/>、/>、/>Respectively representing the number of times of dispatching private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to each employee in a preset enterprise internal system,、/>、/>respectively expressed as the number of times of dispatching private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to the jth staff in the enterprise internal system,/>、/>、/>The number of times of scheduling private files, the number of times of date change of private files and the number of times of log information recording are respectively expressed as references.
Step six, monitoring network communication information: the method comprises the steps of analyzing a security evaluation coefficient of network communication in an enterprise internal system by means of a state evaluation coefficient of network flow information in the enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system and a confidentiality evaluation coefficient of each employee in the enterprise internal system, and judging the optimal state of network communication security in the enterprise internal system;
as an optional implementation manner, the analyzing the security evaluation coefficient of the network communication in the internal system of the enterprise and judging the optimal state of the security of the network communication in the internal system of the enterprise specifically includes the following analysis processes:
by calculation formulaAnalysis to obtain the security evaluation coefficient of network communication in the enterprise internal system>,/>、/>、/>、/>The system is respectively expressed as a state evaluation coefficient of network flow information in a preset enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system, a weight factor of confidentiality evaluation coefficient of each employee in the enterprise internal system, and a weight factor of->、/>、/>、/>The system is respectively expressed as a state evaluation coefficient of network flow information in an enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system and a confidentiality evaluation coefficient of each employee in the enterprise internal system;
comparing the safety evaluation coefficient threshold value of the network communication in the enterprise internal system with the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, judging that the network communication in the enterprise internal system is in a safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is larger than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and judging that the network communication in the enterprise internal system is not in the safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is smaller than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and interrupting the communication.
Step seven, dangerous warning prompt: when network communication is in an unsafe state due to malicious software invasion, early warning prompt is carried out.
The invention provides a monitoring method for network communication security of a system, which monitors network traffic information, further better analyzes the state of the network traffic in an enterprise system, thereby more accurately monitoring log information, further better analyzing whether the log is invaded by malicious software, further better analyzing employee information, further more comprehensively knowing the identity state of the employee, further better monitoring the network communication information, thereby acquiring the safe network communication, facilitating people to communicate with each other with more safety guarantee, solving the defects in the prior art, better guaranteeing the privacy of communication, ensuring the benefits of the people not to be damaged, better strengthening and developing the own enterprises and advantages, and giving a good impression.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (8)

1. A method for monitoring the security of network communication of a system, comprising the steps of:
step one, obtaining network flow information: the method comprises the steps of obtaining basic parameters of network flow information in an enterprise internal system, wherein the basic parameters of the network flow information comprise network bandwidth, network bytes and network rate;
step two, monitoring network flow information: acquiring basic parameters of corresponding network flow information in the enterprise internal system, further analyzing and obtaining a state evaluation coefficient of the network flow information in the enterprise internal system, judging abnormal conditions of the network flow information in the enterprise internal system, if the network flow information in the enterprise internal system is in an abnormal state, performing step three, and if the network flow information in the enterprise internal system is in a normal state, continuing normal communication transmission;
step three, log information acquisition: if the network flow and the data in the enterprise internal system are in an abnormal state, acquiring corresponding log information in the enterprise internal system, wherein the log information comprises network connection rate, access request times and data transmission time;
step four, monitoring log information: the privacy evaluation coefficient of the log in the enterprise internal system is obtained through analysis by obtaining the corresponding log information in the enterprise internal system, and meanwhile, whether the log is invaded by malicious software is judged, and then the fifth step is executed;
fifthly, staff information analysis: according to the chat times, the chat content depth and the chat time length corresponding to each employee in the enterprise internal system, further analyzing the identity evaluation coefficients corresponding to each employee in the enterprise internal system, and simultaneously according to the IP address information corresponding to each employee login account in the enterprise internal system, further analyzing the address qualification influence coefficients corresponding to each employee in the enterprise internal system, and further analyzing the confidentiality evaluation coefficients of each employee in the enterprise internal system by acquiring the scheduling private file times, the private file date change times and the log information record times corresponding to each employee in the enterprise internal system;
step six, monitoring network communication information: the method comprises the steps of analyzing a security evaluation coefficient of network communication in an enterprise internal system by means of a state evaluation coefficient of network flow information in the enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system and a confidentiality evaluation coefficient of each employee in the enterprise internal system, and judging the optimal state of network communication security in the enterprise internal system;
step seven, dangerous warning prompt: when network communication is in an unsafe state due to malicious software invasion, early warning prompt is carried out.
2. The method for monitoring network communication security of system according to claim 1, wherein the analyzing obtains a state evaluation coefficient of network traffic information in an internal system of the enterprise, and the specific analyzing process is as follows:
by calculation formulaAnalyzing and obtaining state evaluation coefficient of network flow information in enterprise internal system>,/>、/>、/>Weight factors respectively expressed as corresponding network bandwidth, network byte and network rate in the set enterprise internal system, +.>、/>、/>Respectively expressed as corresponding network bandwidth, network bytes, network rate, and +.>、/>、/>Respectively expressed as corresponding in set enterprise internal systemNetwork bandwidth, network bytes, network rate.
3. The method for monitoring network communication security of system according to claim 1, wherein the specific analysis process for determining abnormal conditions of network traffic information in the internal system of the enterprise is as follows:
comparing the state evaluation coefficient threshold value of the network flow information in the enterprise internal system with a preset state evaluation coefficient threshold value of the network flow information in the enterprise internal system, judging that the network flow information in the enterprise internal system is abnormal if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is larger than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system, and judging that the network flow in the enterprise internal system can perform normal data communication transmission if the state evaluation coefficient threshold value of the network flow information in the enterprise internal system is smaller than the state evaluation coefficient threshold value of the network flow information in the preset enterprise internal system.
4. The method for monitoring network communication security of system according to claim 1, wherein the analysis obtains privacy evaluation coefficients of each log in the internal system of the enterprise, and simultaneously judges whether the log is invaded by malicious software, and the specific analysis process is as follows:
by calculation formulaAnalyzing to obtain privacy evaluation coefficient of log in enterprise internal system>I represents the number of each log, +.>,/>、/>、/>Weight factors respectively expressed as preset network connection rate, access request times and data transmission time in enterprise internal system, +.>、/>、/>Respectively expressed as the set network connection rate, the access request times and the data transmission time in the enterprise internal system,、/>、/>respectively representing the network connection rate, the access request times and the data transmission time corresponding to the ith log in the enterprise internal system;
comparing the privacy evaluation coefficient threshold value of each log in the enterprise internal system with a preset privacy evaluation coefficient threshold value of each log in the enterprise internal system, if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is different from the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy of the log is revealed and invaded by malicious software, and if the privacy evaluation coefficient threshold value of a certain log in the enterprise internal system is the same as the privacy evaluation coefficient threshold value of each log in the preset enterprise internal system, judging that the privacy guarantee of the software is good and not invaded by the malicious software.
5. The method for monitoring network communication security of system according to claim 1, wherein the analyzing the identity evaluation coefficients corresponding to each employee in the system in the enterprise comprises the following steps:
by calculation formulaAnalyzing to obtain identity evaluation coefficients corresponding to staff in enterprise internal system>J represents the number of each employee, +.>,/>、/>、/>Respectively representing the chat times, the chat content depth and the chat time corresponding to the jth employee in the enterprise internal system, < + >>、/>、/>Respectively expressed as weight factors of chat times, chat content depth and chat time corresponding to each employee in a preset enterprise internal system, and +.>、/>、/>Respectively expressed as the chat times, the chat content depth and the chat time of the reference.
6. The method for monitoring network communication security of system according to claim 5, wherein the analyzing the address qualification influence coefficient corresponding to each employee in the system in the enterprise comprises the following steps:
extracting target IP address information from IP address information corresponding to each employee login account in the enterprise internal system, comparing the target IP address information with the IP address information corresponding to each employee login account in the enterprise internal system, and if the target IP address information corresponding to a certain employee login account is the same as the IP address information corresponding to the employee login account, marking the login qualification influence coefficient corresponding to each employee in the enterprise internal system asOtherwise, it is marked as +.>Thereby obtaining the address qualification influence coefficient corresponding to each employee in the enterprise internal system>Wherein->The value is +.>Or->And->>/>
7. The method for monitoring network communication security of system according to claim 5, wherein the analyzing the secret evaluation coefficients of each employee in the internal system of the enterprise comprises the following steps:
by calculation formulaAnalyzing to obtain security evaluation coefficients of staff in enterprise internal system>,/>、/>、/>Respectively representing the number of times of scheduling private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to each employee in a preset enterprise internal system as weight factors of ∈>、/>Respectively expressed as the number of times of dispatching private files, the number of times of changing the date of the private files and the number of times of recording log information corresponding to the jth staff in the enterprise internal system,/>、/>、/>The number of times of scheduling private files, the number of times of date change of private files and the number of times of log information recording are respectively expressed as references.
8. The method for monitoring the security of network communication in a system according to claim 1, wherein the analyzing the security evaluation coefficient of the network communication in the internal system of the enterprise and determining the optimal state of the security of the network communication in the internal system of the enterprise comprises the following steps:
by calculation formulaAnalysis to obtain the security evaluation coefficient of network communication in the enterprise internal system>,/>、/>、/>、/>The system is respectively expressed as a state evaluation coefficient of network flow information in a preset enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system, a weight factor of confidentiality evaluation coefficient of each employee in the enterprise internal system, and a weight factor of->、/>、/>、/>The system is respectively expressed as a state evaluation coefficient of network flow information in an enterprise internal system, a privacy evaluation coefficient of a log in the enterprise internal system, an identity evaluation coefficient corresponding to each employee in the enterprise internal system and a confidentiality evaluation coefficient of each employee in the enterprise internal system;
comparing the safety evaluation coefficient threshold value of the network communication in the enterprise internal system with the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, judging that the network communication in the enterprise internal system is in a safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is larger than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and judging that the network communication in the enterprise internal system is not in the safe state if the safety evaluation coefficient threshold value of the network communication in the enterprise internal system is smaller than the set safety evaluation coefficient threshold value of the network communication in the enterprise internal system, and interrupting the communication.
CN202310976943.7A 2023-08-04 2023-08-04 Monitoring method for system network communication security Active CN116846675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310976943.7A CN116846675B (en) 2023-08-04 2023-08-04 Monitoring method for system network communication security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310976943.7A CN116846675B (en) 2023-08-04 2023-08-04 Monitoring method for system network communication security

Publications (2)

Publication Number Publication Date
CN116846675A true CN116846675A (en) 2023-10-03
CN116846675B CN116846675B (en) 2024-02-20

Family

ID=88169093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310976943.7A Active CN116846675B (en) 2023-08-04 2023-08-04 Monitoring method for system network communication security

Country Status (1)

Country Link
CN (1) CN116846675B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117348557A (en) * 2023-10-30 2024-01-05 山东鲁抗机电工程有限公司 Automatic control system and control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120005743A1 (en) * 2010-06-30 2012-01-05 Mitsubishi Electric Corporation Internal network management system, internal network management method, and program
CN108063753A (en) * 2017-11-10 2018-05-22 全球能源互联网研究院有限公司 A kind of information safety monitoring method and system
CN112261033A (en) * 2020-10-19 2021-01-22 北京京航计算通讯研究所 Network security protection method based on enterprise intranet
CN116488939A (en) * 2023-06-16 2023-07-25 江西科技学院 Computer information security monitoring method, system and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120005743A1 (en) * 2010-06-30 2012-01-05 Mitsubishi Electric Corporation Internal network management system, internal network management method, and program
CN108063753A (en) * 2017-11-10 2018-05-22 全球能源互联网研究院有限公司 A kind of information safety monitoring method and system
CN112261033A (en) * 2020-10-19 2021-01-22 北京京航计算通讯研究所 Network security protection method based on enterprise intranet
CN116488939A (en) * 2023-06-16 2023-07-25 江西科技学院 Computer information security monitoring method, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117348557A (en) * 2023-10-30 2024-01-05 山东鲁抗机电工程有限公司 Automatic control system and control method
CN117348557B (en) * 2023-10-30 2024-03-26 山东鲁抗机电工程有限公司 Automatic control system and control method

Also Published As

Publication number Publication date
CN116846675B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN107819771B (en) Information security risk assessment method and system based on asset dependency relationship
CN107809433B (en) Asset management method and device
CN116846675B (en) Monitoring method for system network communication security
CN110543761A (en) big data analysis method applied to information security field
CN117478433B (en) Network and information security dynamic early warning system
CN112699357A (en) Big data security system access operation platform and data retrieval method
CN114338105B (en) Zero trust based system for creating fort
Alfarisi et al. Risk assessment in fleet management system using OCTAVE allegro
CN112199700B (en) Safety management method and system for MES data system
CN117292054A (en) Three-dimensional digital-based intelligent operation and maintenance method and system for power grid
CN117150459A (en) Zero-trust user identity security detection method and system
CN112214772A (en) Privilege certificate centralized management and control and service system
CN116305040A (en) Data security management method for digital platform
CN115514485A (en) Method for carrying out community correction system data transmission with quantum encryption
CN114676025A (en) Computer data safety detection system based on internet
CN114037286A (en) Big data based automatic sensitive data detection method and system for power dispatching
JP4437410B2 (en) Security management apparatus and program
Shi et al. The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method
Cho et al. Detection and response of identity theft within a company utilizing location information
CN117390708B (en) Privacy data security protection method and system
CN115118509B (en) Method for detecting authority of debugging files of secondary equipment of transformer substation and safety control device
CN117195273B (en) Data leakage detection method and device based on time sequence data anomaly detection
CN117811839B (en) Network security monitoring device and method for monitoring Internet of things equipment
CN116506279A (en) Cloud computing-based server security monitoring system
Huang Design of Computer Network Security Defense System Based on Big Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant