CN205356398U - Network security system - Google Patents

Network security system Download PDF

Info

Publication number
CN205356398U
CN205356398U CN201521057027.0U CN201521057027U CN205356398U CN 205356398 U CN205356398 U CN 205356398U CN 201521057027 U CN201521057027 U CN 201521057027U CN 205356398 U CN205356398 U CN 205356398U
Authority
CN
China
Prior art keywords
module
processing module
command module
virus
connects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201521057027.0U
Other languages
Chinese (zh)
Inventor
毛弋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing College of Electronic Engineering
Original Assignee
Chongqing College of Electronic Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing College of Electronic Engineering filed Critical Chongqing College of Electronic Engineering
Priority to CN201521057027.0U priority Critical patent/CN205356398U/en
Application granted granted Critical
Publication of CN205356398U publication Critical patent/CN205356398U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application discloses network security system includes: computer terminal, data service ware, information processing module, command module and leak restoration module, the data service ware includes data collection station, computer terminal with data collection station connects, the data service ware with information processing module connects, information processing module with command module connects, command module with computer terminal connects, command module with the leak is restoreed the module and is connected, the leak restore the module with computer terminal connects. The application provides a network security system can monitor network health status, can in time discern virus, takes precautionary measures, prevents the invasion in advance, and taking precautions againt calamity perhaps makes its harmfulness fully reduce at least, is effective replenishment of preventing hot wall and anti -virus software.

Description

Network safety system
Technical field
The application belongs to computer network field, specifically, relates to a kind of network safety system.
Background technology
Development along with computer technology Yu the network communications technology, computer network and the work of modern, life contact also increasingly closer, computer network is in the extensive use of every field, drastically increase our work efficiency, the life making us is more abundant convenient, meanwhile, we are also increasing to the dependence of computer network.In recent years, as the Internet fast development of global network, it makes the exchange of people shorten the distance of the time and space, spans the boundary of region, and the activity of human society is created unprecedented tremendous influence.But Internet is while bringing big advantages to human society, also the activities of hacker in computer network society and computer virus invasion and attack are brought, owing to Internet communication speed is fast, route of transmission is difficult to control to, hacker and virus bring huge loss to numerous computer users, the stolen event of topsecret papers of U.S. Department of Defense, virus CIH, " love bug " virus, WSCRIPT/KAK virus malignant viruses etc. bring huge loss to social each industry, in order to for this phenomenon, software company releases anti-one after another, antivirus software and firewall software, but the function with software realization after all can be leaky, the high chi in road, evil spirit is high one zhang, new virus, new assault still can constantly occur.In prior art, connect the computer of network, often as be subject to coming the signal of automatic network, program, or receive the network data comprising virus, or meet with illegal invasion and cause that system is interfered, What is more causes the collapse of system, and therefore designing and develop a kind of Computer Network Security System becomes need at that time.
Utility model content
In view of this, technical problems to be solved in this application are that prior art can not identify virus before entering terminal containing viral network data in time and adopt an effective measure.
In order to solve above-mentioned technical problem, this application discloses a kind of network safety system, it is characterised in that including: terminal, data server, message processing module, command module and leak repair module;Described data server is connected with described terminal, and described data server is connected with described message processing module, and described message processing module is connected with described command module, and described command module is connected with described terminal;Described command module is connected with described leak repair module, and described leak repair module is connected with described terminal.
Further, described data server includes memorizer and data acquisition unit, and described memorizer is connected with described data acquisition unit.
Further, described message processing module includes message handler and information feedback device, and described message handler is connected with described information feedback device.
Further, described command module includes signal picker, and described signal picker is connected with the described information feedback device in described message processing module.
Further, in described signal picker, integrated circuit is monolithic integrated optical circuit.
Further, described memorizer is mechanical hard disk or solid state hard disc.
Compared with prior art, the application can obtain and include techniques below effect:
1) the computer virus storehouse that the application can be stored by memorizer, compares, and identifies abnormal, when running into suspicious data, stops transmission immediately, forbids performing.
2) the application when finding to there is system vulnerability, can start leak repair module, system repaired in time.
3) the application can identify in time and take preventive measures virus, stops invasion in advance, prevents trouble before it happens, or at least makes its hazardness fully reduce, and is effectively supplementing of fire wall and anti-virus software.
Certainly, the arbitrary product implementing the application must be not necessarily required to reach all the above technique effect simultaneously.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, and the schematic description and description of the application is used for explaining the application, is not intended that the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the schematic diagram of the embodiment of the present application network safety system.
Detailed description of the invention
Describe presently filed embodiment in detail below in conjunction with drawings and Examples, thereby the application how application technology means are solved technical problem and reaches the process that realizes of technology effect and can fully understand and implement according to this.
This application discloses a kind of network safety system, as it is shown in figure 1, include: terminal 100, data server 200, message processing module 300, command module 400 and leak repair module 500.Described data server 200 is connected with described terminal 100, described data server 200 is connected with described message processing module 300, described message processing module 300 is connected with described command module 400, and described command module 400 is connected with described terminal 100;Described command module 400 is connected with described leak repair module 500, and described leak repair module 500 is connected with described terminal 100.
Described data server 200 includes data acquisition unit 210 and memorizer 220, and described memorizer 220 is connected with described data acquisition unit 210.Memorizer 220 can be mechanical hard disk or solid state hard disc.
Memorizer 220 storage has computer virus storehouse, computer virus refers to establishment or the destruction computer function inserted in computer program or damages data, affect computer to use, and can one group of computer instruction of self replication or program code, described computer virus storehouse is made up of the condition code of the Virus Sample collected, condition code is then the difference that virus analysis engineer finds with proprietary software from Virus, intercepts one section of program code being similar to " search key word ".
Described message processing module 300 includes message handler 310 and information feedback device 320, and described message handler 310 is connected with described information feedback device 320.
In the present embodiment, described data server 200 gathers the network data being about to enter terminal 100 by described data acquisition unit 210, the Virus Info sample then passed through in the computer virus storehouse of contrast network data and memorizer 220 storage contrasts, and recognition result is sent to described message processing module 300.
Described message handler 310 in described message processing module 300 receives the recognition result sent by described data server 200, and according to recognition result analysis identification network data, judge result, and will determine that result inputs the described information feedback device 320 being arranged in described message processing module 300;Data without virus, to containing virulent data signal an alert, are sent safety signal, and warning information or safety information are sent to described command module 400 by described information feedback device 320.
In the present embodiment, as shown in Figure 1, described command module 400 includes signal picker 410, described command module 400 makes operational order according to the signal that the described message processing module 300 collected by described signal picker 410 sends, and operational order inputs described terminal 100, and suspicious network data are taken measures by described terminal 100 after receiving warning message, stop transmission immediately, forbid performing, stop invasion, prevent trouble before it happens.
Described signal picker 410 is monolithic integrated optical circuit.Integrated circuit or title microcircuit, microchip, chip are that one (mainly includes semiconductor device circuit in electronics, also passive device etc. is included) mode of miniaturization, and it is normally manufactured on semiconductor wafer surface, this state circuit manufacture integrated circuit in semiconductor chip surface also known as thin film integrated circuit.It is little that integrated circuit has volume, lightweight, lead-out wire and pad are few, life-span is long, and reliability is high, the advantages such as performance is good, cost is low simultaneously, being easy to large-scale production integrated circuit to assemble electronic equipment, its packaging density can improve tens times to several thousand times than transistor, and the stable work time of equipment is also greatly improved.The present embodiment adopts monolithic integrated optical circuit, i.e. thin film integrated circuit.
In the present embodiment, described signal picker 410 in described command module 400 is after collecting the virus alert signal sent by described message processing module 300, described command module 400 also can send operational order, and operational order is inputted described leak repair module 500, described leak repair module 500 can repair, after starting, the system vulnerability that the virus having been found that on described terminal 100 is corresponding according to operational order, it is perfectly safe to accomplish, leakage detection is filled a vacancy.
System vulnerability refers to application software or the operating system software defect in logical design or mistake, utilized by illegal person, implant the mode such as wooden horse, virus by network attack or control whole computer, steal the capsule information in computer and information, even destroy system.At different types of soft and hardware equipment, between the different editions of equipment of the same race, between the different system being made up of distinct device, and homogeneous system is under the different conditions that arranges, and all can there is each different security breaches problems.
A kind of network safety system that the application provides, it is possible to by the computer virus storehouse that memorizer 220 stores, compare, identifies abnormal, when running into suspicious data, stops transmission immediately, forbids performing;When finding to there is system vulnerability, leak repair module 500 can also be started, system repaired in time;Described network safety system can identify in time and take preventive measures virus, stops invasion in advance, prevents trouble before it happens, or at least makes its hazardness fully reduce, and is effectively supplementing of fire wall and anti-virus software.
It can further be stated that, term " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that include one to be the commodity of example key element or system not only includes those key elements, but also include other key elements not having clear and definite example to go out, or also include the key element intrinsic for this commodity or system.When there is no more restriction, statement " including ... " key element limited, it is not excluded that there is also other identical element in the commodity including described key element or system.
Described above illustrate and describes some preferred embodiments of the application, but as previously mentioned, it is to be understood that the application is not limited to form disclosed herein, it is not to be taken as the eliminating to other embodiments, and can be used for other combinations various, amendment and environment, and in application contemplated scope described herein, can be modified by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change are without departing from spirit and scope, then all should in the protection domain of the application claims.

Claims (6)

1. a network safety system, it is characterised in that including: terminal, data server, message processing module, command module and leak repair module;Described data server is connected with described terminal, and described data server is connected with described message processing module, and described message processing module is connected with described command module, and described command module is connected with described terminal;Described command module is connected with described leak repair module, and described leak repair module is connected with described terminal.
2. network safety system as claimed in claim 1, it is characterised in that described data server includes memorizer and data acquisition unit, and described memorizer is connected with described data acquisition unit.
3. network safety system as claimed in claim 2, it is characterised in that described message processing module includes message handler and information feedback device, and described message handler is connected with described information feedback device.
4. network safety system as claimed in claim 3, it is characterised in that described command module includes signal picker, and described signal picker is connected with described information feedback device.
5. network safety system as claimed in claim 4, it is characterised in that in described signal picker, integrated circuit is monolithic integrated optical circuit.
6. network safety system as claimed in claim 5, it is characterised in that described memorizer is mechanical hard disk or solid state hard disc.
CN201521057027.0U 2015-12-17 2015-12-17 Network security system Expired - Fee Related CN205356398U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201521057027.0U CN205356398U (en) 2015-12-17 2015-12-17 Network security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201521057027.0U CN205356398U (en) 2015-12-17 2015-12-17 Network security system

Publications (1)

Publication Number Publication Date
CN205356398U true CN205356398U (en) 2016-06-29

Family

ID=56168507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201521057027.0U Expired - Fee Related CN205356398U (en) 2015-12-17 2015-12-17 Network security system

Country Status (1)

Country Link
CN (1) CN205356398U (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131020A (en) * 2016-07-17 2016-11-16 合肥赑歌数据科技有限公司 The module of a kind of firewall virtualization and management method
CN106503524A (en) * 2016-10-31 2017-03-15 辽东学院 A kind of computer network security guard system
CN106534177A (en) * 2016-12-08 2017-03-22 武汉万千无限科技有限公司 Multifunctional computer network safety control system
CN107395410A (en) * 2017-07-14 2017-11-24 太仓诚泽网络科技有限公司 Network security warning system
CN109547425A (en) * 2018-11-13 2019-03-29 衡阳师范学院 A kind of information security of computer network monitor system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131020A (en) * 2016-07-17 2016-11-16 合肥赑歌数据科技有限公司 The module of a kind of firewall virtualization and management method
CN106503524A (en) * 2016-10-31 2017-03-15 辽东学院 A kind of computer network security guard system
CN106503524B (en) * 2016-10-31 2019-03-15 辽东学院 A kind of computer network security guard system
CN106534177A (en) * 2016-12-08 2017-03-22 武汉万千无限科技有限公司 Multifunctional computer network safety control system
CN107395410A (en) * 2017-07-14 2017-11-24 太仓诚泽网络科技有限公司 Network security warning system
CN109547425A (en) * 2018-11-13 2019-03-29 衡阳师范学院 A kind of information security of computer network monitor system

Similar Documents

Publication Publication Date Title
CN205356398U (en) Network security system
US11321464B2 (en) Method and system for generating cognitive security intelligence for detecting and preventing malwares
Lee et al. An effective security measures for nuclear power plant using big data analysis approach
US9838405B1 (en) Systems and methods for determining types of malware infections on computing devices
US20120192278A1 (en) Unauthorized process detection method and unauthorized process detection system
CN111274583A (en) Big data computer network safety protection device and control method thereof
US10356113B2 (en) Apparatus and method for detecting abnormal behavior
CN105704146A (en) System and method for SQL injection prevention
CN110535857B (en) Method and device for protecting network attack
CN103795735A (en) Safety device, server and server information safety achieving method
US20160340055A1 (en) Systems and methods for detecting a security breach in an aircraft network
WO2016014014A1 (en) Remedial action for release of threat data
CN113872965B (en) SQL injection detection method based on Snort engine
EP3767913A1 (en) Systems and methods for correlating events to detect an information security incident
CN114268452A (en) Network security protection method and system
CN116094817A (en) Network security detection system and method
KR101688632B1 (en) Method and apparatus for detecting loading of library
KR101444250B1 (en) System for monitoring access to personal information and method therefor
Wu et al. Intrusion detection of cyber-physical attacks in manufacturing systems: A review
KR101889503B1 (en) Method and apparatus for providing flight data protection
US11449618B2 (en) Active testing of access control policy
CN106899977B (en) Abnormal flow detection method and device
CN109299610A (en) Dangerous sensitizing input verifies recognition methods in Android system
US20180052998A1 (en) Fine-Grained Analysis and Prevention of Invalid Privilege Transitions
KR20190020523A (en) Apparatus and method for detecting attack by using log analysis

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160629

Termination date: 20161217

CF01 Termination of patent right due to non-payment of annual fee