CN117240850B - Intelligent monitoring system for network information technology - Google Patents

Intelligent monitoring system for network information technology Download PDF

Info

Publication number
CN117240850B
CN117240850B CN202311492253.0A CN202311492253A CN117240850B CN 117240850 B CN117240850 B CN 117240850B CN 202311492253 A CN202311492253 A CN 202311492253A CN 117240850 B CN117240850 B CN 117240850B
Authority
CN
China
Prior art keywords
information file
output
client
transmission
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311492253.0A
Other languages
Chinese (zh)
Other versions
CN117240850A (en
Inventor
朱万明
聂亦能
刘旭程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China India Cloud Shenzhen Technology Co ltd
Original Assignee
China India Cloud Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China India Cloud Shenzhen Technology Co ltd filed Critical China India Cloud Shenzhen Technology Co ltd
Priority to CN202311492253.0A priority Critical patent/CN117240850B/en
Publication of CN117240850A publication Critical patent/CN117240850A/en
Application granted granted Critical
Publication of CN117240850B publication Critical patent/CN117240850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an intelligent monitoring system for network information technology, which relates to the field of enterprise management, and the technical scheme is characterized in that the application layer detects a transmitted information file and an output client, judges the duty ratio of sensitive data in the information file and the safety of the output client; the processing layer carries out data processing on the output fluctuation value of the information file in the transmission process, compares and judges the output fluctuation value of the information file with the judging fluctuation value, and judges whether the information file is kept complete in the transmission process; the analysis module judges the conditions of disturbance fluctuation and data loss of the data through the data fluctuation value of the information file; the identification layer comprises a repair module and an encryption module; the encryption module is used for encrypting and conveying the information file, and detecting the client and the data packet in the transmission process of the information file.

Description

Intelligent monitoring system for network information technology
Technical Field
The invention relates to the field of enterprise management, in particular to an intelligent monitoring system for network information technology.
Background
Generally, when large enterprises or production plants are located, an area network is provided for internal staff to send and transmit network information and files, the area network comprises a plurality of network medium-access points (including routers or other network transmission devices) and data links (including cables and optical fibers and other transmission media), the staff can transmit and receive information in the area network through clients, but some factors can cause malicious access of external clients to steal or leak file information, so that security problems occur to the file information, and serious property loss can be brought to the enterprises or companies due to leakage of confidential information or malicious attacks.
In addition, the information or the file may be subjected to various interferences in the transmission process, including but not limited to data bit errors or losses possibly caused by noise interference, data quality degradation caused by signal attenuation, data transmission interruption or errors caused by transmission medium faults, disorder caused by multipath transmission, data packet loss or delay increase possibly caused by network congestion, and even data damage caused by virus or malicious attack, which all cause fluctuation of data information in the transmission process, according to monitoring of fluctuation values of the data information and selection of a transmission link, the damage degree of information data can be effectively monitored, the fluctuation of the data information caused by external factors can be reduced, the stability in the data process can be improved, and a timely feedback mechanism for damaging the file is required to be monitored in the information transmission process.
The invention relates to an intelligent network monitoring system, which comprises a total monitoring control device, wherein the total monitoring control device is connected with sub-monitoring control devices arranged on each floor, the sub-monitoring control devices are connected with a plurality of primary electronic monitors arranged on the floor at intervals and are also connected with a plurality of secondary electronic monitors arranged on the floor at intervals, the secondary electronic monitors are distributed among the primary electronic monitors, the design relates to monitoring of equipment operation, but does not relate to monitoring of how data is transmitted and the data transmission process, and therefore, based on the problems, the invention is innovative design to achieve the effect of monitoring network information.
Disclosure of Invention
Aiming at the phenomena that in the prior art, an external client maliciously accesses to, steals or leaks file information, so that the file information has a safety problem, and the information or the file can be subjected to various interferences in the transmission process, so that data bit errors or losses are caused, the invention aims to provide an intelligent monitoring system for network information technology, so as to realize the monitoring of data in the transmission process of the information file.
In order to achieve the above purpose, the present invention provides the following technical solutions:
an intelligent monitoring system for network information technology comprises an application layer, a processing layer and an identification layer:
after the information file sent by the output client passes through the monitoring of the application layer, the information file is conveyed through the transfer station and the transmission link, the application layer detects the sent information file and the output client, and the proportion of sensitive data in the information file and the safety of the output client are judged;
the processing layer carries out data processing on the output fluctuation value of the information file in the transmission process, compares and judges the output fluctuation value of the information file with the judging fluctuation value, and judges whether the information file is kept complete in the transmission process; the processing layer comprises a selection module and an analysis module, wherein the analysis module judges the conditions of disturbance fluctuation and data loss of data through the data fluctuation value of the information file, and judges whether the information file is normally output or not;
the identification layer comprises a repair module and an encryption module, and the repair module repairs the information file within the range of the determined fluctuation value and is used for normally outputting the information file; the encryption module is used for encrypting and conveying the information file.
Preferably, the application layer includes a sequence module, and the sequence module specifically performs the labeling process of the input client:
the information file sent by the output client can be received by more than one input client, and the IP address and the corresponding port of each input client are different, so that according to the characteristics of the input clients, the input clients are traversed without repeated number marking, and one input client is set as JKH i Wherein the input client is set to JKH, i is the index of the input client JKH, i.e. JKH i Denoted input client with reference i.
Preferably, the application layer includes a pre-checking module, the pre-checking module is used for detecting the transmitted information file and the output client, in the process of detecting the output client, a first checking unit in the pre-checking module checks the IP address and the corresponding port of the output client or the input client, judges whether the IP address and the corresponding port meet the standard of allowing internet surfing, if the IP address and the corresponding port meet the standard of allowing internet surfing, an instruction of allowing information file to be transmitted is issued, the information file is transmitted to a second checking unit in the pre-checking module, if the IP address and the corresponding port do not meet the standard of networking, the information file is forbidden to be transmitted, and an abnormal warning signal of the output client or the input client is sent.
Preferably, the second checking unit of the pre-checking module is configured to monitor an information file sent by the output client, split the entire information file into a plurality of subfiles, and match information data in each subfile with sensitive data according to a formula:
judging the occupation ratio of sensitive data in the information file;
wherein,for the duty cycle value of sensitive data in the information file,representing the sub-files divided in the information file,representing non-repeated ordering labels in subfilesDenoted by the reference numeralIs used for the sub-files of (c),in order to be a sensitive database,is a correction coefficient;
if it isIs empty, thenThe method comprises the steps of carrying out a first treatment on the surface of the If it isIs not empty, thenIs thatAnd (3) withThe intersection value of (2) is atIs a ratio of the ratio of (c) to (d).
Preferably, the application layer includes an output module, and a first judging unit in the output module is configured to judge the occupation ratio value of the sensitive data in the information file, according to the formula:
acquiring a judgment value, and determining whether the information file is conveyed or not according to the judgment value;
wherein,in order to determine the value of the value,in order to guide the value of the numerical value,for the ratio of standard sensitive dataThenIf (if)Then
When (when)=1, thenThe first output unit in the output module sends an instruction for normally conveying the information file to the processing layer;
when (when)=0, thenAnd (0) representing that the ratio of the sensitive data in the information file does not meet the requirement of the standard ratio of the sensitive data, a first output unit in the output module sends an abnormal warning signal of the information file, stops the instruction of file delivery, and sends the abnormal warning signal of the information file to an administrator.
The first checking unit is used for checking the IP address and the corresponding port of the output client or the input client to realize screening and warning of the abnormal client; and matching the information file with the sensitive data through a second checking unit, further judging whether the sensitive data occupation ratio in the information file accords with the standard sensitive data occupation ratio, and carrying out safety monitoring on the information file to be conveyed to realize safety checking on the client and the information file.
Preferably, the selection module is used for selecting a transmission link and a network transit station in the transmission process of the output client and each input client, the first selection unit of the selection module records the network transit station in the regional network in real time, and selects the network transit station according to the shortest transmission path between the output client and each input client;
the second selecting unit of the selecting module selects a plurality of transmission links between the output client and the transfer station, between the transfer station and the transfer station, and between the transfer station and the input client, wherein the selection standard of the transmission links is that the transmission link with the largest idle transmission memory is preferably selected according to the size of the idle transmission memory;
marking a transmission link asWherein, the method comprises the steps of, wherein,representing the transmission link and,the index i representing the transmission link is the index of the input client JKH, i.eRepresenting the first input to input client labeled iAnd a plurality of transmission links.
By selecting the transmission link with larger transmission residual memory, the situation that the data packet is lost or delayed to be transmitted due to network congestion when the flow in the network exceeds the processing capacity or bandwidth limit of network equipment is solved, and the situation that the data transmission is interrupted or wrong is prevented.
Preferably, the analysis module includes a fluctuation value calculation unit, which judges the situation that the data in the information file is interfered and fluctuated and lost according to the formula by using the fluctuation value of the data of the information file in the transmission link and the transfer site:
acquiring total fluctuation values on a plurality of transmission links in the transmission process of an information file from an output client to an input client with the index of i;
wherein,representing information file slave inputThe output fluctuation value in the transmission process of the output client to the input client with the reference number i,representing the number of all transmission links in the transmission of an information file from an output client to an input client denoted i,reference numerals indicating the transmission links are used,representing the transfer of an information file from an output client to an input client, denoted iThe transmission link of (c) has an actual fluctuation value,representing the transfer of an information file from an output client to an input client, denoted iStandard fluctuation values possessed by the transmission link of (a).
Preferably, the analysis module includes a second judgment unit and a second output unit, where the second judgment unit is used for judging a fluctuation value in an information file transmitted to each input client, and according to the formula:
acquiring fluctuation value judgment data, and judging whether the information file is output or not;
when (when)=When the output fluctuation value in the information file is within the range of the judgment fluctuation value, the restoration can be performed,the second output unit gives an instruction for normally conveying the information file and conveys the information file to the repair module;
when (when)=When the output fluctuation value in the information file is not in the range of the judging fluctuation value, the information file is seriously damaged and can not be repaired in the conveying process, the second output unit gives an instruction for damaging the information file, the conveying of the information file is stopped, and an abnormal warning signal of the information file is sent to the corresponding input client and the corresponding output client;
wherein,a decision value representing an input client labeled i,the fluctuation value is determined in the process of information file transmission,representing output fluctuation valueLess than or equal to the judgment fluctuation valueRepresenting output fluctuation valueGreater than the judgment fluctuation value
Preferably, the actual fluctuation valueSolving process toolThe body is that, according to the formula:
wherein,is the noise interference valueThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for transmitting medium fault valuesThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for network congestion valuesThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for the value under attackThe weight coefficient occupied, A is the correction coefficient.
By obtaining output fluctuation value in transmission of information file from output client to input clientAnalyzing and calculating interference degree of an information file in the whole transmission link and fluctuation condition of data to generate two processing instructions, when the output fluctuation value in the file is in the range of judging fluctuation value, issuing an instruction for normal transmission of the information file, when the output fluctuation value in the file is not in the range of judging fluctuation value, issuing an information file abnormality instruction, stopping transmission of the information file, and realizing data damage by accurately judging the interference fluctuation condition of the file data in the information data transmission processAccurate assessment and monitoring of the extent and transmission quality.
Preferably, the identification layer comprises a repair module, and the repair module repairs the information file transmitted in the analysis module, so that the information file is kept complete; the identification layer comprises an encryption module, the encryption module encrypts an information file input to each input client through a quantum key, and a decryption certificate is issued to each input client, and the decryption certificate of each input client can only decrypt the corresponding information file.
By matching encryption of the information file package and the receiving client, the situation of data package matching errors is reduced, the situation that the information file is stolen and leaked is reduced, and accurate matching of the information file and the input client and normal operation of data transmission are realized.
Compared with the prior art, the invention has the following beneficial effects:
1. in the invention, the first checking unit is used for checking the IP address and the corresponding port of the output client or the input client, judging whether the IP address and the corresponding port meet the standard and the safety range of the internet access permission, and screening and warning the abnormal client so as to facilitate the monitoring of the abnormal condition by the manager; the information file is matched with the sensitive data through the second checking unit, the values of the judging value and the guiding value are obtained according to whether the proportion of the sensitive data in the information file accords with the standard proportion of the sensitive data, and then whether the information file is continuously conveyed is judged, safety monitoring is conducted on the information file to be conveyed, confidentiality is prevented from being related to the information file, propagation is prevented from being leaked out, the information file is stolen by the outside, the confidentiality of data propagation is improved, and safety checking on a client side and the information file is achieved.
2. In the invention, the actual fluctuation value of each transmission link is used forObtaining the interference degree of each transmission link in the transmission process of the information file, and further obtaining the output fluctuation value of the information file in the transmission process from the output client to the input clientThe method comprises the steps of analyzing and calculating interference degree of an information file in a whole transmission link and fluctuation conditions of data, generating two processing instructions by judging that output fluctuation values in the information file are in the range of judging fluctuation values, sending the information file to a repair module by a second output unit when the output fluctuation values in the file are in the range of judging fluctuation values, sending the information file to an abnormal instruction by the second output unit when the output fluctuation values in the file are not in the range of judging fluctuation values, stopping information file sending, sending warning signals of information file abnormality to corresponding input clients and output clients, accurately judging the interference fluctuation conditions of the file data in the information data transmission process, accurately evaluating the data damage degree and transmission quality, and guaranteeing the accuracy and the completeness of instruction output.
In the invention, the matching encryption of the information file packet and the receiving client reduces the situation of matching errors of the data packet, reduces the situation that the information file is stolen and leaked, and realizes the accurate matching of the information file and the input client and the normal operation of data transmission.
Drawings
Fig. 1 is a schematic structural diagram of an intelligent monitoring system for network information technology according to the present invention;
FIG. 2 is a schematic diagram showing steps of an intelligent monitoring system for network information technology according to the present invention;
fig. 3 is a schematic diagram illustrating the transport between a client and a transfer station and a transmission link according to the present invention.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application and not all of the embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein.
Generally, when large enterprises or production plants are located, an area network is provided for internal staff to send and transmit network information and files, the area network comprises a plurality of network medium-access points (including routers or other network transmission devices) and data links (including cables and optical fibers and other transmission media), the staff can transmit and receive information in the area network through clients, but some factors can cause malicious access of external clients to steal or leak file information, so that security problems occur to the file information, and serious property loss can be brought to the enterprises or companies due to leakage of confidential information or malicious attacks.
In addition, the information or the file may be subjected to various interferences in the transmission process, including but not limited to data bit errors or losses possibly caused by noise interference, data quality degradation caused by signal attenuation, data transmission interruption or errors caused by transmission medium faults, disorder caused by multipath transmission, data packet loss or delay increase possibly caused by network congestion, and even data damage caused by virus or malicious attack, which all cause fluctuation of data information in the transmission process, according to monitoring of fluctuation values of the data information and selection of a transmission link, the damage degree of information data can be effectively monitored, the fluctuation of the data information caused by external factors can be reduced, the stability in the data process can be improved, and a timely feedback mechanism for damaging the file is required to be monitored in the information transmission process.
Example 1; referring to fig. 1, fig. 2 and fig. 3, an embodiment of an intelligent monitoring system for network information technology according to the present invention is further described.
Staff carries out information transfer and receipt in the regional network through the customer end, but some factors can lead to outside customer end malicious access regional network, steal or reveal file information, lead to file information to appear the security problem, need discern these customer ends, confidential information reveal or the malicious attack that receives all probably brings serious property loss for enterprise or company, and some inside personnel or customer end can unconsciously go out some confidential file transmission, consequently need detect the sensitive content of file information, prevent that sensitive information from being revealed carelessly.
When information data is transmitted in an area network, errors can occur in the transmission process of the data in the network due to various reasons, firstly, when the data passes a longer distance in the transmission process or passes through a plurality of relay devices, signals can be attenuated due to the limitation of transmission media, and the quality of the data is reduced; secondly, transmission media used in the network, such as cables, optical fibers, etc., may be damaged, broken or aged, etc., and when the traffic in the network exceeds the processing capacity or bandwidth limit of the network device, network congestion may occur, and these may cause loss of data packets or increase in delay, so as to affect correct transmission of data, thereby causing interruption or error in data transmission; in addition, in some networks, the data packets may be transmitted to the destination through multiple paths, which may cause that the arrival order of the data packets is inconsistent with the sending order, resulting in disorder of the data packets, so that path selection needs to be performed on the network transit station and the transmission link in the transmission process, so as to ensure that the information data is correctly transmitted to the file receiving end.
An intelligent monitoring system for network information technology comprises an application layer, a processing layer and an identification layer:
after the information file sent by the output client passes through the monitoring of the application layer, the information file is conveyed through the transfer station and the transmission link, the application layer detects the sent information file and the output client, and the proportion of sensitive data in the information file and the safety of the output client are judged;
the application layer comprises a sequence marking module, and the sequence marking module specifically marks the input client: the information file sent by the output client can be received by more than one input client, and the IP address and the corresponding port of each input client are different, so that according to the characteristics of the input clients, the input clients are traversed without repeated number marking, and one input client is set as JKH i Wherein the input client is set to JKH, i is the index of the input client JKH, i.e. JKH i Denoted input client with reference i.
Through marking each input client, the selection of the transfer station and the transmission link is realized, so that the problems of transmission medium faults caused by cable, optical fiber damage, breakage or aging and the like and the conditions of data transmission interruption or error caused by disorder caused by multipath transmission are avoided.
The application layer comprises a pre-checking module, wherein the pre-checking module is used for detecting the transmitted information file and the output client, and an existing client and a temporary client exist in the area network, and the clients risk to be registered and cheated, so that the client accessing the area network and the transmitted information file are required to be detected.
In the detection process of the output client, a first detection unit in the pre-detection module carries out verification on the IP address and the corresponding port of the output client or the input client, judges whether the IP address and the corresponding port meet the standard of allowing surfing, if the IP address and the corresponding port meet the standard of allowing surfing, the output client and the input client are indicated to be in a safe range, an instruction of allowing information file to be conveyed is issued, the information file is conveyed to a second detection unit in the pre-detection module, if the information file does not meet the standard of networking, the information file is forbidden to be conveyed, an abnormal warning signal of the output client or the input client is sent to a manager, camera shooting or positioning equipment in the regional network is started, the abnormal output client or the input client is tracked, and the manager is convenient to monitor abnormal conditions.
The second checking unit of the pre-checking module is used for monitoring the information file sent by the output client and splitting the whole information file into a plurality of subfiles, and the splitting purpose is that if one whole file packet is directly matched because the data volume of the general information file packet is larger, the large operation calculation force is occupied, the matching time is too long, so that the operation calculation force is dispersed, and the memory occupation and the matching occupation time are reduced.
In the process of matching the information data in each subfile with the sensitive data, the following formula is adopted:
judging the occupation ratio of sensitive data in the information file;
wherein,for the duty cycle value of sensitive data in the information file,representing the sub-files divided in the information file,representing non-repeated ordering labels in subfilesDenoted by the reference numeralIs used for the sub-files of (c),in order to be a sensitive database,is a correction coefficient;
if it isIs empty, thenThe method comprises the steps of carrying out a first treatment on the surface of the If it isIs not empty, thenIs thatAnd (3) withThe intersection value of (2) is atIs a ratio of the ratio of (c) to (d).
Wherein the process of matching the information file with the sensitive data is before the information file starts to be transmitted, i.e. after the first checking unit checks the output client and the input client.
The application layer comprises an output module, wherein a first judging unit in the output module is used for judging the occupation ratio value of the sensitive data in the information file, and the first judging unit is used for judging the occupation ratio value of the sensitive data in the information file according to the formula:
acquiring a judgment value, and determining whether the information file is conveyed or not according to the judgment value;
wherein,in order to determine the value of the value,in order to guide the value of the numerical value,for the ratio of standard sensitive dataThenIf (if)Then
When (when)=1, thenThe first output unit in the output module sends an instruction for normally conveying the information file to the processing layer;
when (when)=0, thenAnd (0) representing that the ratio of the sensitive data in the information file does not meet the requirement of the standard ratio of the sensitive data, a first output unit in the output module sends an abnormal warning signal of the information file, stops the instruction of file delivery, and sends the abnormal warning signal of the information file to an administrator.
Checking the IP address and the corresponding port of the output client or the input client through a first checking unit, judging whether the IP address and the corresponding port meet the standard and the safety range of allowing surfing, screening and warning the abnormal client, preventing the external client from maliciously entering the inside of the regional network, and facilitating the monitoring of the abnormal condition by a manager; the information file is matched with the sensitive data through the second checking unit, the values of the judging value and the guiding value are obtained according to whether the proportion of the sensitive data in the information file accords with the standard proportion of the sensitive data, and then whether the information file is continuously conveyed is judged, safety monitoring is carried out on the information file to be conveyed, sensitive information which relates to confidentiality and is prohibited from being propagated in the information file is prevented from being leaked out, the confidentiality of data transmission is improved, and safety checking on a client side and the information file is achieved.
Example 2; referring to fig. 1 and fig. 2, a second embodiment of the present invention further describes an intelligent monitoring system for network information technology.
When information data is transmitted in a regional network, errors can occur in the transmission process of the data in the network due to various reasons, network congestion can occur when the traffic in the network exceeds the processing capacity or bandwidth limit of network equipment, and the network congestion can cause the loss or delay increase of data packets, so that the correct transmission of the data is influenced, and the data transmission is interrupted or errors occur; in addition, in some networks, the data packets may be transmitted to the destination through multiple paths, which may cause that the arrival order of the data packets is inconsistent with the sending order, resulting in disorder of the data packets, so that path selection needs to be performed on the network transit station and the transmission link in the transmission process, so as to ensure that the information data is correctly transmitted to the file receiving end.
In addition, when data passes through a long distance or through a plurality of relay devices during transmission, signals may be attenuated due to limitations of transmission media, resulting in degradation of data quality; in addition, the transmission medium used in the network, such as a cable, an optical fiber, etc., may be damaged, broken or aged, etc., so that the information file may fluctuate due to interference in the transmission process, resulting in data loss or damage in the transmission process, and therefore, the fluctuation of the information file in the transmission process needs to be monitored.
An intelligent monitoring system for network information technology comprises a processing layer, wherein the processing layer processes data of an output fluctuation value of an information file in a transmission process, compares and judges the output fluctuation value of the information file with a judgment fluctuation value, and judges whether the information file is kept complete in the transmission process; the processing layer comprises a selection module and an analysis module, wherein the analysis module judges the conditions of disturbance fluctuation and data loss of data through the data fluctuation value of the information file, and judges whether the information file is normally output.
The selection module is used for selecting a transmission link and a network transfer site in the transmission process of the output client and each input client, the first selection unit of the selection module records the network transfer site in the regional network in real time, records the specific position of the transfer site, and selects the network transfer site according to the shortest transmission path between the output client and each input client, so that the situation that the data is attenuated due to the limitation of a transmission medium when the data is transmitted around a long transmission distance or passes through a plurality of relay devices in the transmission process is avoided, the occupation of redundant transmission links in the data transmission process is reduced, and the disorder situation when the information file is transmitted to a plurality of input clients is prevented.
The second selecting unit of the selecting module selects a plurality of transmission links between the output client and the transfer station, between the transfer station and the transfer station, and between the transfer station and the input client, wherein the selection standard of the transmission links is according to the size of the idle transmission memory, and preferably selects the transmission link with the largest idle transmission memory.
By selecting the transmission link with larger transmission residual memory, the situation that the data packet is lost or delayed to be transmitted due to network congestion when the flow in the network exceeds the processing capacity or bandwidth limit of network equipment is solved, and the situation that the data transmission is interrupted or wrong is prevented.
The transmission quantity of the information files can be duplicated in the same quantity according to the quantity of the input clients, so that the condition that one relative information file exists on the transmission link of each input client is met.
Marking a transmission link asWherein, the method comprises the steps of, wherein,representing the transmission link and,the index i representing the transmission link is the index of the input client JKH, i.eRepresenting the first input to input client labeled iAnd a plurality of transmission links.
The actual fluctuation valueThe solving process is specifically as follows:
wherein,is the noise interference valueThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for transmitting medium fault valuesThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for network congestion valuesThe weight coefficient of the weight coefficient is taken up by the weight coefficient,for the value under attackThe weight coefficient occupied, A is the correction coefficient.
By actual fluctuation values for the individual transmission linksThe interference degree of each transmission link in the transmission process of the information file is obtained, so that the loss condition of data in the information file is judged, and meanwhile, data support is provided for the calculation of the fluctuation value of the whole transmission process of the information file.
The analysis module comprises a fluctuation value calculation unit, and judges the conditions of disturbance fluctuation and data loss of data in the information file according to the formula by using the data fluctuation value of the information file in a transmission link and a transfer site:
acquiring total fluctuation values on a plurality of transmission links in the transmission process of an information file from an output client to an input client with the index of i;
wherein,representing the output fluctuation value during the transmission of an information file from an output client to an input client denoted i,representing the number of all transmission links in the transmission of an information file from an output client to an input client denoted i,reference numerals indicating the transmission links are used,representing the transfer of an information file from an output client to an input client, denoted iThe transmission link of (c) has an actual fluctuation value,representing the transfer of an information file from an output client to an input client, denoted iStandard fluctuation values possessed by the transmission link of (a).
The analysis module comprises a second judgment unit and a second output unit, wherein the second judgment unit is used for judging the fluctuation value in the information file transmitted to each input client according to the formula:
acquiring fluctuation value judgment data, and judging whether the information file is output or not;
when (when)=When the output fluctuation value in the information file is in the range of the judging fluctuation value, the information file can be repaired, and the second output unit gives an instruction for normally conveying the information file and conveys the information file to the repairing module;
when (when)=When the output fluctuation value in the information file is not in the range of the judging fluctuation value, the information file is seriously damaged and can not be repaired in the conveying process, the second output unit gives an instruction for damaging the information file, the conveying of the information file is stopped, and an abnormal warning signal of the information file is sent to the corresponding input client and the corresponding output client;
wherein,a decision value representing an input client labeled i,the fluctuation value is determined in the process of information file transmission,representing output fluctuation valueLess than or equal to the judgment fluctuation valueRepresenting output fluctuation valueGreater than the judgment fluctuation value
The invention is not limited to the embodiment, and can be applied to the transmission between a plurality of output clients and input clients, the invention only exemplifies the transmission between one output client and a plurality of input clients, when the plurality of output clients simultaneously transmit data, the plurality of output clients are only required to be split into single output clients in turn for monitoring, the monitoring process of each output client is the same as the invention, and the monitoring of the data transmission between the plurality of output clients and the input clients is realized.
In the present embodiment, by actual fluctuation values for the respective transmission linksObtaining the interference degree of each transmission link in the transmission process of the information file, and further obtaining the output fluctuation value of the information file in the transmission process from the output client to the input clientAnalyzing and calculating interference degree of an information file in the whole transmission link and fluctuation condition of data, generating two processing instructions by judging that output fluctuation values in the information file are in the range of judging fluctuation values, sending the information file to a repair module by a second output unit after the output fluctuation values in the file are in the range of judging fluctuation values, sending the information file abnormality instruction by the second output unit after the output fluctuation values in the file are not in the range of judging fluctuation values, stopping the information file transmission, and sending an information file abnormality warning signal to a corresponding inputThe client and the output client accurately evaluate the damage degree and the transmission quality of the file data through accurately judging the interference fluctuation condition of the file data in the information data transmission process, and ensure the rigor and the integrity of instruction output.
Example 3; referring to fig. 1 and fig. 2, a third embodiment of the present invention further describes an intelligent monitoring system for network information technology.
Various noise interferences exist in network transmission, such as electromagnetic interference, signal attenuation, etc., and these interferences may cause data acceptance errors or loss; when a packet is transmitted to a destination through multiple paths, the packet may arrive in an order inconsistent with the transmission order, resulting in misordering of matching the packet with the receiving client, and further, malware, viruses or network attacks may interfere with the data transmission process or damage the data, thereby causing packet matching errors, so that matching encryption is required for the file packet and the receiving client.
The intelligent monitoring system for the network information technology comprises an identification layer, wherein the identification layer comprises a restoration module and an encryption module, and the restoration module is used for restoring information files within a fluctuation value judging range and normally outputting the information files; the encryption module is used for encrypting and conveying the information file.
The identification layer comprises a repair module, and the repair module repairs the information file transmitted in the analysis module so as to keep the information file intact; the repair module comprises, but is not limited to, windows repair program, as long as the information repair required by the invention can be achieved, the system can be accessed through an API interface and the Internet, the identification layer comprises an encryption module, the encryption module encrypts the information file input into each input client through a quantum key, and the decryption certificate is issued to each input client, and the decryption certificate of each input client can only decrypt the corresponding information file.
The working process of the encryption module is specifically as follows: when the second checking unit matches the information file with the sensitive data, and the duty ratio value of the sensitive data in the information file accords with the continuous transmission standard, the encryption module can issue a decryption certificate to each input client, and can issue an encryption signature to the corresponding information file on the transmission link of each input client, wherein each decryption certificate is different, each encryption signature is different, and each decryption certificate can only decrypt the corresponding encryption signature.
By matching encryption of the information file package and the receiving client, the situation of data package matching errors is reduced, the situation that the information file is stolen and leaked is reduced, and accurate matching of the information file and the input client and normal operation of data transmission are realized.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the present invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.

Claims (10)

1. The intelligent monitoring system for the network information technology is characterized by comprising an application layer, a processing layer and an identification layer:
after the information file sent by the output client passes through the monitoring of the application layer, the information file is conveyed through the transfer station and the transmission link, the application layer detects the sent information file and the output client, and the proportion of sensitive data in the information file and the safety of the output client are judged;
the processing layer carries out data processing on the output fluctuation value of the information file in the transmission process, compares and judges the output fluctuation value of the information file with the judging fluctuation value, and judges whether the information file is kept complete in the transmission process; the processing layer comprises a selection module and an analysis module, wherein the analysis module judges the conditions of disturbance fluctuation and data loss of data through the data fluctuation value of the information file, and judges whether the information file is normally output or not;
the identification layer comprises a repair module and an encryption module, and the repair module repairs the information file within the range of the determined fluctuation value and is used for normally outputting the information file; the encryption module is used for encrypting and conveying the information file.
2. The intelligent monitoring system for network information technology according to claim 1, wherein the application layer comprises a sequence module, and the sequence module specifically performs the labeling process of the input client:
the information file sent by the output client can be received by more than one input client, and the IP address and the corresponding port of each input client are different, so that according to the characteristics of the input clients, the input clients are traversed without repeated number marking, and one input client is set as JKH i Wherein the input client is set to JKH, i is the index of the input client JKH, i.e. JKH i Denoted input client with reference i.
3. The intelligent monitoring system for network information technology according to claim 2, wherein the application layer comprises a pre-checking module, the pre-checking module is used for detecting the transmitted information file and the output client, in the detection process of the output client, a first checking unit in the pre-checking module performs checking on the IP address and the corresponding port of the output client or the input client, judges whether the IP address and the corresponding port meet the standard of allowing internet surfing, if the IP address and the corresponding port meet the standard of allowing internet surfing, an instruction of allowing information file transmission is issued, the information file is transmitted to a second checking unit in the pre-checking module, if the IP address and the corresponding port do not meet the standard of networking, the information file transmission is forbidden, and an abnormal warning signal of the output client or the input client is sent.
4. The intelligent monitoring system for network information technology according to claim 3, wherein the second checking unit of the pre-checking module is configured to monitor an information file sent by the output client, split the entire information file into a plurality of subfiles, and match information data in each subfile with sensitive data according to the formula:
judging the occupation ratio of sensitive data in the information file;
wherein,is the duty value of sensitive data in the information file, < >>Representing the sub-files divided in the information file,representing no repetition of the ranking marks in the subfiles, i.e +.>Denoted by->Subfiles of->In order to be a sensitive database,is a correction coefficient;
if it isEmpty, then->The method comprises the steps of carrying out a first treatment on the surface of the If->If not empty, then->,/>Is->And->The intersection value of (2) is +.>Is a ratio of the ratio of (c) to (d).
5. The intelligent monitoring system for network information technology according to claim 4, wherein the application layer comprises an output module, and the first judging unit in the output module is used for judging the occupation ratio value of the sensitive data in the information file according to the formula:
acquiring a judgment value, and determining whether the information file is conveyed or not according to the judgment value;
wherein,for judging the value, ++>For guiding value, < >>For the ratio of standard sensitive data, if +.>Then->,/>If->Then->;/>
When (when)=1, then->=1, which indicates that the ratio of the sensitive data in the information file meets the requirement of the standard ratio of the sensitive data, the first output unit in the output module sends the instruction for normally conveying the information file to the processing layer,
when (when)=0, then->And (0) representing that the ratio of the sensitive data in the information file does not meet the requirement of the standard ratio of the sensitive data, a first output unit in the output module sends an abnormal warning signal of the information file, stops the instruction of file delivery, and sends the abnormal warning signal of the information file to an administrator.
6. The intelligent monitoring system for network information technology according to claim 1, wherein the selection module is configured to select a transmission link and a network transit station in a transmission process of the output client and each input client, and the first selection unit of the selection module performs real-time recording on the network transit station in the area network, and performs network transit station selection according to a shortest transmission path between the output client and each input client;
the second selecting unit of the selecting module selects a plurality of transmission links between the output client and the transfer station, between the transfer station and the transfer station, and between the transfer station and the input client, wherein the selection standard of the transmission links is that the transmission link with the largest idle transmission memory is preferably selected according to the size of the idle transmission memory;
marking a transmission link asWherein->Representing a transmission link->The index indicating the transmission link i is the index of the input client JKH, i.e +.>Representing the +.f to the input client numbered i>And a plurality of transmission links.
7. The intelligent monitoring system for network information technology according to claim 1, wherein the analysis module comprises a fluctuation value calculation unit, and the information file is judged to be subject to disturbance fluctuation and data loss according to the formula by using the fluctuation value of the data of the information file in the transmission link and the transfer site:
acquiring an output fluctuation value after average processing on a plurality of transmission links in the transmission process of an information file from an output client to an input client with a reference number of i;
wherein,representing the output fluctuation value,/during transmission of an information file from an output client to an input client numbered i>Representing the number of all transmission links during the transmission of an information file from an output client to an input client numbered i,/for each transmission link>Reference numeral for indicating transmission link->Representing the transfer of an information file from an output client to an input client denoted i, denoted +.>Is a transmission link with an actual fluctuation value, < >>Representing the transfer of an information file from an output client to an input client denoted i, denoted +.>Standard fluctuation values possessed by the transmission link of (a).
8. The intelligent monitoring system for network information technology according to claim 7, wherein the analysis module comprises a second judgment unit and a second output unit, the second judgment unit is used for judging a fluctuation value in an information file transmitted to each input client according to the formula:
acquiring fluctuation value judgment data, and judging whether the information file is output or not;
when (when)=/>When the output fluctuation value in the information file is in the range of the judging fluctuation value, the information file can be repaired, and the second output unit gives an instruction for normally conveying the information file and conveys the information file to the repairing module;
when (when)=/>When the output fluctuation value in the information file is not in the range of the judging fluctuation value, the information file is seriously damaged and can not be repaired in the conveying process, the second output unit gives an instruction for damaging the information file, the conveying of the information file is stopped, and an abnormal warning signal of the information file is sent to the corresponding input client and the corresponding output client;
wherein,decision value representing the input client labeled i,/-, for>Judging fluctuation value in the process of information file transmission>Representing the output fluctuation value +.>Less than or equal to the judgment fluctuation value->,/>Representing the output fluctuation value +.>Greater than the judgment fluctuation value->
9. An intelligent monitoring system for network information technology as set forth in claim 7, wherein said actual fluctuation valueThe solving process is specifically as follows:
wherein,for noise interference value->Weight coefficient of ∈ ->For transmission medium fault value->Weight coefficient of ∈ ->For network congestion value->Weight coefficient of ∈ ->For the attacked value->The weight coefficient occupied, A is the correction coefficient.
10. The intelligent monitoring system for network information technology according to claim 1, wherein the identification layer comprises a repair module, the repair module repairs the information file transmitted in the analysis module, and the information file is kept intact by windows repair tools; the identification layer comprises an encryption module, the encryption module encrypts an information file input to each input client through a quantum key, and a decryption certificate is issued to each input client, and the decryption certificate of each input client can only decrypt the corresponding information file.
CN202311492253.0A 2023-11-10 2023-11-10 Intelligent monitoring system for network information technology Active CN117240850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311492253.0A CN117240850B (en) 2023-11-10 2023-11-10 Intelligent monitoring system for network information technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311492253.0A CN117240850B (en) 2023-11-10 2023-11-10 Intelligent monitoring system for network information technology

Publications (2)

Publication Number Publication Date
CN117240850A CN117240850A (en) 2023-12-15
CN117240850B true CN117240850B (en) 2024-02-09

Family

ID=89088371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311492253.0A Active CN117240850B (en) 2023-11-10 2023-11-10 Intelligent monitoring system for network information technology

Country Status (1)

Country Link
CN (1) CN117240850B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488100A (en) * 2015-11-18 2016-04-13 国信司南(北京)地理信息技术有限公司 Efficient detection and discovery system for secret-associated geographic data in non secret-associated environment
WO2017107896A1 (en) * 2015-12-23 2017-06-29 北京奇虎科技有限公司 Document protection method and device
CN112118462A (en) * 2020-09-27 2020-12-22 成都辰迈科技有限公司 Data acquisition method and system based on industrial internet operating system
CN116776341A (en) * 2023-04-23 2023-09-19 安徽安天利信工程管理股份有限公司 File management system for provider database

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11347843B2 (en) * 2018-09-13 2022-05-31 King Fahd University Of Petroleum And Minerals Asset-based security systems and methods
WO2021203088A1 (en) * 2020-04-03 2021-10-07 Insurance Services Office, Inc. Systems and methods for computer modeling using incomplete data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488100A (en) * 2015-11-18 2016-04-13 国信司南(北京)地理信息技术有限公司 Efficient detection and discovery system for secret-associated geographic data in non secret-associated environment
WO2017107896A1 (en) * 2015-12-23 2017-06-29 北京奇虎科技有限公司 Document protection method and device
CN112118462A (en) * 2020-09-27 2020-12-22 成都辰迈科技有限公司 Data acquisition method and system based on industrial internet operating system
CN116776341A (en) * 2023-04-23 2023-09-19 安徽安天利信工程管理股份有限公司 File management system for provider database

Also Published As

Publication number Publication date
CN117240850A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
KR102601578B1 (en) Method for protecting a network against a cyber attack
US7636942B2 (en) Method and system for detecting denial-of-service attack
CN101965573B (en) Method and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access
US8000601B2 (en) Method and apparatus for securing fiber in an optical network
CN101360015B (en) Method, system and apparatus for test network appliance
CN101521578B (en) Method for detecting computer illegal external connection in closed network
CN108494672A (en) A kind of industrial communication gateway, industrial data security isolation system and method
CN104717105B (en) A kind of industrial sensor network Data duplication detection method based on ISA100.11a standards
EP2095604A2 (en) Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis
CN105656765B (en) A kind of anti-method and system that leak of smtp protocol data based on depth content parsing
WO2021162473A1 (en) System and method for detecting intrusion into in-vehicle network
CN111031003A (en) Intelligent evaluation system of cross-network isolation safety system
KR20090037533A (en) Network risk analysis method using information hierarchy structure
US20160294848A1 (en) Method for protection of automotive components in intravehicle communication system
CN102857521A (en) Method and device for setting operation, administration and maintenance (OAM) security authentication
CN110138731A (en) A kind of network anti-attack method based on big data
CN117240850B (en) Intelligent monitoring system for network information technology
CN116455649A (en) Import and export trade data exchange system
CN105245393A (en) Method and device for testing performance of firewall
CN105656937B (en) A kind of anti-method and system that leak of http data based on depth content parsing
WO2020158383A1 (en) Communication monitor method and communication monitor device
JP7024069B2 (en) How to detect attacks on vehicle control equipment
KR102494831B1 (en) Network intrusion detection system for information processing system of nuclear power plants
Lei et al. Measuring the consistency between data and control plane in SDN
CN115174197B (en) Webshell file detection method, system, electronic equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant