CN209299296U - A kind of Intranet threat detection apparatus - Google Patents
A kind of Intranet threat detection apparatus Download PDFInfo
- Publication number
- CN209299296U CN209299296U CN201920289473.6U CN201920289473U CN209299296U CN 209299296 U CN209299296 U CN 209299296U CN 201920289473 U CN201920289473 U CN 201920289473U CN 209299296 U CN209299296 U CN 209299296U
- Authority
- CN
- China
- Prior art keywords
- data
- search engine
- information
- intranet
- detection apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of Intranet threat detection apparatus, and data invasion search engine, data processor and data storage device, data collector are provided in network security protection shell ontology;Data processor is sent in the information that data invasion search engine receives data collector, data processor includes secure verification module, comparing unit, secure verification module receives data and invades the received information of search engine, and output controls signal accordingly afterwards compared with a reference value in secure verification module by the data invasion received information of search engine, comparing unit is with the control signal received and corresponding corresponding alarm unit.Whole device is acquired by the data of advanced row data collector, and suspicious data are subjected to secondary comparison when data appearance exception, then by data processor according to preliminary search in search engine is invaded, in secondary compare, the information being on the hazard directly is shown by the instruction of alarm unit.
Description
Technical field
The utility model belongs to network security monitoring device technical field, and in particular to a kind of Intranet threat detection apparatus.
Background technique
With the continuous development of present science and technology, personal information is more and more important in the colleague that internet develops rapidly, network
Safety refers to that the data in the hardware, software and its system of network system are protected, not because accidentally or the reason of malice
And by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
Especially in present enterprise's production, innovative technology enterprise all exist during development core technology at
Core technology achievement is realized conversion achievement, is the important channel of enterprise development by fruit.But the present more more and more universal in networking
It, most of Data attacks using enterprise network vulnerable to outside or inside can not be detected and be safeguarded in time, to enterprise
Industry brings huge economic loss.Using high-end data processing and protection wall system, and bring to the development at enterprise's initial stage huge
Big economic pressures.
Utility model content
In view of the deficiencies of the prior art, the purpose of this utility model is to provide a kind of Intranet threat detection apparatus, solve
Enterprise network exists in the prior art vulnerable to external or internal Data attack, can not be detected and be safeguarded in time.
The purpose of this utility model can be achieved through the following technical solutions:
A kind of Intranet threat detection apparatus, including network security protection shell ontology, and in the network security protection shell sheet
It is provided with data invasion search engine, data processor and data storage device, data collector in vivo;
It is provided with data collector at the top of the network security protection shell ontology, invading search engine in the data will
The information that data collector receives is sent to data processor, and the data processor includes secure verification module, comparison list
Member, the secure verification module receives the data and invades the received information of search engine, and data invasion retrieval is drawn
Holding up received information, output controls signal, the comparing unit accordingly afterwards compared with a reference value in the secure verification module
The control signal received is transmitted and is stored in the control signal and corresponding corresponding alarm unit, the comparing unit that receive
Data storage.
Further, the data collector is the input terminal of information, and with external mainframe network data communication.
Further, a reference value in the secure verification module adjusts numerical value area by external data programming
Between size.
Further, the alarm unit includes photoelectric switch and the warning lamp for being coupled to photoelectric switch,
The control information that the photoelectric switch receives comparing unit carries out on-off control, the warning lamp to corresponding photoelectricity every
It leaves and closes and make flashing lamp alarm signal.
Further, the alarm unit further includes that device is shown in acoustic alarm.
The utility model has the beneficial effects that
1, whole device is acquired by the data of advanced row data collector, and suspicious data are drawn according to invasion retrieval
Middle preliminary search is held up, when the result of retrieval does not constitute a threat to, direct output information when data appearance exception, then passes through data
Processor carries out secondary comparison, in secondary compare, directly passes through the information for indicating display and being on the hazard of alarm unit.
2, the original part that the entire detection device of the present apparatus passes through is less, is substantially shorter corresponding time and the data of detection
The corresponding frequencies of processor, improve the service life of data processor, while also substantially increasing effectiveness of retrieval.
Detailed description of the invention
In order to illustrate the embodiment of the utility model or the technical proposal in the existing technology more clearly, below will be to embodiment
Or attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, for ordinary skill people
For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the overall structure diagram of the utility model embodiment.
Specific embodiment
The following will be combined with the drawings in the embodiments of the present invention, carries out the technical scheme in the embodiment of the utility model
Clearly and completely describe, it is clear that the described embodiments are only a part of the embodiments of the utility model, rather than whole
Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are without creative efforts
All other embodiment obtained, fall within the protection scope of the utility model.
As shown in Figure 1, the present embodiment provides a kind of Intranet threat detection apparatus, including network security protection shell ontology, and
Be provided in network security protection shell ontology data invasion search engine 11, data processor 12 and data storage device 13,
Data collector 14.
Data collector 14 is provided at the top of network security protection shell ontology, data collector 14 is the input of information
End, and the mainframe network data communication with outside.In the information that data invasion search engine 11 receives data collector 14
Preliminary search retrieval is carried out, and the information after the data information for having conflict search retrieval is sent to data processor 12, it will
The information not conflicted directly exports, without the processing of data processor 12.
Data processor 12 includes secure verification module 121, comparing unit 122, and secure verification module 121 receives data and enters
Information after invading 11 preliminary search of search engine, and will be in the information and secure verification module 121 of data invasion search engine 11
A reference value export corresponding control signal more afterwards, a reference value in secure verification module 121 passes through according to the actual needs
External data programming adjusts numerical intervals size, the information a reference value timely adjustment to facilitate operation personnel to invasion.When
When there is threat information, comparing unit 122 is with the control signal received and corresponding corresponding alarm unit 123, comparing unit 122
The control signal received is transmitted and be stored in data storage 13, when the information of processing is non-threat information, is directly exported
Information, data storage 13 can store number and the display time that Intranet threatens invasion in real time, make log recording.
Further, alarm unit 123 includes photoelectric switch and the warning lamp for being coupled to photoelectric switch, light
It is electrically isolated switch comparison and carries out on-off control compared with the control information that unit 122 receives, warning lamp is to corresponding photoelectric switch
Cut-off and make flashing lamp alarm signal, pass through light signal.
Further, alarm unit 123 further includes that device is shown in acoustic alarm, can remind in time staff by voice signal.
Whole device is acquired by the data of advanced row data collector, and by suspicious data according to invasion search engine
Middle preliminary search, when the result of retrieval does not constitute a threat to, direct output information, when data appearance exception, then by data
The secondary comparison of device is managed, in secondary compare, the information being directly on the hazard by the instruction display of alarm unit is substantially increased
Effectiveness of retrieval.
In the description of this specification, the description of reference term " one embodiment ", " example ", " specific example " etc. means
Particular features, structures, materials, or characteristics described in conjunction with this embodiment or example are contained at least one of the utility model
In embodiment or example.In the present specification, schematic expression of the above terms be not necessarily referring to identical embodiment or
Example.Moreover, particular features, structures, materials, or characteristics described can be in any one or more embodiment or examples
In can be combined in any suitable manner.
Basic principles, main features, and advantages of the present invention has been shown and described above.Current row
The technical staff of industry is described in above embodiments and description it should be appreciated that the present utility model is not limited to the above embodiments
Only illustrate the principles of the present invention, on the premise of not departing from the spirit and scope of the utility model, the utility model is also
It will have various changes and improvements, these various changes and improvements fall within the scope of the claimed invention.
Claims (5)
1. a kind of Intranet threat detection apparatus, which is characterized in that including network security protection shell ontology, and in the network security
Data invasion search engine (11), data processor (12) and data storage device (13), data are provided in protective shell ontology
Collector (14);
It is provided with data collector (14) at the top of the network security protection shell ontology, invades search engine in the data
(11) information that data collector (14) receives is sent to data processor (12), the data processor (12) includes peace
Full authentication module (121), comparing unit (122), the secure verification module (121) receive the data and invade search engine
(11) received information, and the data are invaded into search engine (11) received information and the secure verification module (121)
Interior a reference value exports corresponding control signal more afterwards, and the comparing unit (122) is with the control signal that receives and mutually copes with
The control signal received is transmitted and is stored in data storage device by the alarm unit (123) answered, the comparing unit (122)
(13)。
2. Intranet threat detection apparatus according to claim 1, which is characterized in that the data collector (14) is information
Input terminal, and with external mainframe network data communication.
3. Intranet threat detection apparatus according to claim 1, which is characterized in that in the secure verification module (121)
A reference value numerical intervals size is adjusted by external data programming.
4. Intranet threat detection apparatus according to claim 1, which is characterized in that the alarm unit (123) includes light
It is electrically isolated switch and is coupled to the warning lamp of photoelectric switch, the photoelectric switch receives comparing unit (122)
The control information arrived carries out on-off control, described to make flashing lamp alarm signal to cut-offfing for corresponding photoelectric switch.
5. Intranet threat detection apparatus according to claim 1, which is characterized in that the alarm unit (123) further includes
Device is shown in acoustic alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201920289473.6U CN209299296U (en) | 2019-03-07 | 2019-03-07 | A kind of Intranet threat detection apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201920289473.6U CN209299296U (en) | 2019-03-07 | 2019-03-07 | A kind of Intranet threat detection apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN209299296U true CN209299296U (en) | 2019-08-23 |
Family
ID=67643195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201920289473.6U Expired - Fee Related CN209299296U (en) | 2019-03-07 | 2019-03-07 | A kind of Intranet threat detection apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN209299296U (en) |
-
2019
- 2019-03-07 CN CN201920289473.6U patent/CN209299296U/en not_active Expired - Fee Related
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN204992327U (en) | Theftproof block terminal with digital record function | |
CN202189447U (en) | Security monitoring system in hotel modernization management | |
CN202004790U (en) | Network security detection and monitoring auditing system | |
CN101673447A (en) | Guard and alarm system, family gateway and guard and alarm method | |
CN209299296U (en) | A kind of Intranet threat detection apparatus | |
CN203149755U (en) | An unattended alarm prompting device | |
CN107493258A (en) | A kind of intruding detection system based on network security | |
CN202331656U (en) | Smart protection control system of ATM machine | |
CN205193979U (en) | High voltage distributor box monitored control system | |
CN204348013U (en) | A kind of burglar alarm supervising device of door and window passive infrared detection | |
CN206584461U (en) | A kind of ATM intelligent alarm system for ensureing municipal public safety | |
CN111371750A (en) | Intrusion prevention system and intrusion prevention method based on computer network | |
CN205845275U (en) | A kind of warning system of self-service terminal machine | |
CN115037536A (en) | Big data-based security and protection information management early warning platform capable of preventing data loss | |
CN202217347U (en) | All-around intelligent monitoring device for automatic teller machine (ATM) of bank | |
CN108768996A (en) | A kind of detection guard system of SQL injection attack | |
CN106934955A (en) | A kind of ATM intelligent alarm system for ensureing municipal public safety | |
CN207352677U (en) | A kind of human face recognition door lock | |
CN203733253U (en) | Self-service bank safety protection system | |
CN209182687U (en) | Smart profile supervisory systems | |
CN204331982U (en) | Intelligent safety and defence system | |
CN209353992U (en) | A kind of intelligent anti-theft door safety device | |
CN207216810U (en) | The intelligent anti-intrusion robbing device of bank | |
CN203433564U (en) | Household intelligent access control system | |
CN215679229U (en) | Network public opinion and risk information monitoring device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190823 |
|
CF01 | Termination of patent right due to non-payment of annual fee |