[go: up one dir, main page]

CN111049853A - A Security Authentication System Based on Computer Network - Google Patents

A Security Authentication System Based on Computer Network Download PDF

Info

Publication number
CN111049853A
CN111049853A CN201911354579.0A CN201911354579A CN111049853A CN 111049853 A CN111049853 A CN 111049853A CN 201911354579 A CN201911354579 A CN 201911354579A CN 111049853 A CN111049853 A CN 111049853A
Authority
CN
China
Prior art keywords
network
module
data
authentication system
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911354579.0A
Other languages
Chinese (zh)
Inventor
张海飞
吴芳
钱兰美
雷丽婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANTONG INSTITUTE OF TECHNOLOGY
Original Assignee
NANTONG INSTITUTE OF TECHNOLOGY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANTONG INSTITUTE OF TECHNOLOGY filed Critical NANTONG INSTITUTE OF TECHNOLOGY
Priority to CN201911354579.0A priority Critical patent/CN111049853A/en
Publication of CN111049853A publication Critical patent/CN111049853A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明涉及计算机网络技术领域,且公开了一种基于计算机网络的安全认证系统,包括安全系统、认证系统和数据库,安全系统和认证系统均与数据库通讯连接;安全系统包括数据包捕获模块、数据分析模块和报警处理模块;数据包捕获模块对整个网络的数据包进行收集并进行分析,以判断是否为异常行为。该基于计算机网络的安全认证系统,通过安全系统对计算机内部的各种数据包进行收集,并利用数据分析模块对其进行收集到的有关系统、网络、数据及用户活动的状态和行为信息,被送到检测引擎,进行分析对比,当检测到数据异常,报警处理模块重新配置路由器或防火墙、终止进程、切断连接、改变文件属性,并进行告警,如此保护个人信息安全。

Figure 201911354579

The invention relates to the technical field of computer networks, and discloses a security authentication system based on a computer network, including a security system, an authentication system and a database, wherein the security system and the authentication system are both connected in communication with the database; Analysis module and alarm processing module; the data packet capture module collects and analyzes the data packets of the entire network to judge whether it is abnormal behavior. The computer network-based security authentication system collects various data packets inside the computer through the security system, and uses the data analysis module to collect the state and behavior information about the system, network, data and user activities, which are collected by the data analysis module. It is sent to the detection engine for analysis and comparison. When abnormal data is detected, the alarm processing module reconfigures the router or firewall, terminates the process, cuts off the connection, changes the file attributes, and generates an alarm, thus protecting the security of personal information.

Figure 201911354579

Description

Security authentication system based on computer network
Technical Field
The invention relates to the technical field of computer networks, in particular to a security authentication system based on a computer network.
Background
With the rapid development of computer networks, the big data era is fortuitous, and under the circumstances, big data is widely applied to the production and life of people, so as to provide strong technical support for the prosperity and development of various industries, and while providing convenient and efficient network service for the development of computers, big data also poses potential threats to network systems, thus initiating the wide discussion of computer network security, and analyzing and making precautionary measures for potential threats to computer network security are urgent.
Big data are applied to various industries, and a plurality of actual network security problems are faced in the using process of the big data, the phenomena of data theft and website attack are endless, the situation is not optimistic, in addition, because human factors also generate a plurality of system bugs in the using process of a program, the defects and the bugs have strong destructiveness, lawless persons often steal user information by utilizing the defects and the bugs to cause a larger security problem, and therefore a security authentication system based on a computer network is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a security authentication system based on a computer network.
The invention provides the following technical scheme: a security authentication system based on a computer network comprises a security system, an authentication system and a database, wherein the security system and the authentication system are in communication connection with the database;
the safety system comprises a data packet capturing module, a data analysis module and an alarm processing module;
the data packet capturing module collects and analyzes data packets of the whole network to judge whether the data packets are abnormal behaviors, and the IDS uses the original network packets as an information source to monitor and analyze all network cards working in a hybrid mode in real time and transmit the network cards through a shared network;
the data analysis module comprises a pattern matching module, a statistical analysis unit and an integrity analysis unit, wherein the pattern matching module compares the collected information with a known network intrusion and system misuse pattern database, the statistical analysis unit creates a statistical table according to a system object and counts a plurality of measurement attributes in normal use, the average value of the measurement attributes is used for comparing with the behaviors of a network and a system, and the integrity analysis unit pays attention to whether the content and the attribute of a certain file and a directory are changed;
the alarm processing module records the analysis result in a log file, generates a corresponding report and triggers an alarm;
the authentication system comprises a system management module, a grouping module, an auditing control module and a width management module, wherein the system management module automatically searches IP addresses and machine names in a local area network, the grouping module groups machines and formulates different control strategies according to working requirements, the auditing control module audits and controls network users according to MAC addresses and account passwords, the width management module groups the users and the users or sets the bandwidth of the network access according to application categories, and the bandwidth is preferentially used by high-priority personnel or application when the network is congested.
Preferably, a network adapter is arranged in the data packet capturing module and is used for monitoring and analyzing all communication transmitted through the network in real time.
Preferably, the alarm processing module triggers an alarm and sends a page or email to a system administrator and modifies the intrusion detection system or target system, such as terminating a process, disconnecting an attacker's network connection, or changing a firewall configuration.
Preferably, the data packet capturing module mainly captures data of a host operating system layer, network data, application data and data sent by the target machine.
Preferably, the database is internally divided into two parts, one part is used for the security system to store the detected abnormal data, and the other part is used for the authentication system to collect the IP address and the machine name in the local area network.
Preferably, the authentication system further comprises an encryption module, which encrypts data of information transmitted in the network to protect security of the information.
Preferably, the grouping module is divided into an IP control unit, an MAC control unit, an account control unit and a hybrid control unit, the IP control unit performs network control in a machine IP address mode, the MAC control unit performs network control in a machine MAC address mode, the account control unit performs network control in an internet access account mode, and the hybrid control unit performs network control in an IP control mode and an account control mode.
Compared with the prior art, the invention has the following beneficial effects:
the security authentication system based on the computer network collects various data packets in the computer through a security system, and state and behavior information related to system, network, data and user activities, which is collected by a data analysis module, is sent to a detection engine for analysis and comparison, and when data abnormity is detected, an alarm processing module reconfigures a router or a firewall, terminates a process, cuts off connection, changes file attributes and gives an alarm, so that personal information security is protected;
the system management module in the authentication system automatically searches IP addresses and machine names in a local area network, and meanwhile, system management personnel can manually maintain and manage the searched machine information, so that the information security of users is protected, and under the action of the grouping module, machines are grouped to formulate different control strategies according to working requirements, so that the machines of the users can be flexibly controlled to surf the internet in the local area network, and the network is controlled through four auditing modes in the auditing control module, so that gaps exposed by personal information are reduced, finally, the encryption module is utilized to carry out data encryption on the transmitted information and protect the security of the information, and the security authentication capability of the network is further improved.
Drawings
FIG. 1 is a schematic structural view of the present invention;
FIG. 2 is a schematic diagram of a data analysis module according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described below clearly and completely with reference to the accompanying drawings of the embodiments of the present disclosure. It is to be understood that the described embodiments are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the disclosure without any inventive step, are within the scope of protection of the disclosure.
To maintain the following description of the embodiments of the present disclosure clear and concise, detailed descriptions of known functions and known components are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
Referring to fig. 1-2, a security authentication system based on a computer network includes a security system, an authentication system and a database, wherein the security system and the authentication system are both connected to the database in a communication manner.
The safety system comprises a data packet capturing module, a data analysis module and an alarm processing module.
The data packet capturing module collects and analyzes data packets of the whole network to judge whether the data packets are abnormal behaviors, and the IDS uses the original network packets as an information source to monitor and analyze all network cards working in a hybrid mode in real time and transmit the network cards through a shared network.
The data analysis module comprises a pattern matching module, a statistical analysis unit and an integrity analysis unit, wherein the pattern matching module compares the collected information with a known network intrusion and system misuse pattern database, the statistical analysis unit creates a statistical table according to a system object and counts a plurality of measurement attributes in normal use, the average value of the measurement attributes is used for comparing with the behaviors of a network and a system, and the integrity analysis unit pays attention to whether the content and the attribute of a certain file and a certain directory are changed.
And the alarm processing module records the analysis result in a log file, generates a corresponding report and triggers an alarm.
The authentication system comprises a system management module, a grouping module, an auditing control module and a width management module, wherein the system management module automatically searches IP addresses and machine names in a local area network, the grouping module groups machines and formulates different control strategies according to working requirements, the auditing control module audits and controls network users according to MAC addresses and account passwords, the width management module groups the users and the users or sets the bandwidth of the network access according to application categories, and the bandwidth is preferentially used by high-priority personnel or application when the network is congested.
In an alternative embodiment, a network adapter is provided within the packet capture module for real-time monitoring and analysis of all communications transmitted over the network.
In an alternative embodiment, the alarm handling module triggers an alarm and sends a page or email to the system administrator and modifies the intrusion detection system or target system, such as terminating the process, disconnecting the network connection of the attacker, or changing the firewall configuration.
In an alternative embodiment, the data packet capturing module mainly captures data of a host operating system layer, network data, application data and data sent by a target machine.
In an alternative embodiment, the database is internally divided into two parts, one part is used for storing the detected abnormal data by the security system, and the other part is used for authenticating IP addresses and machine names in the local area network collected by the system.
In an optional embodiment, the authentication system further comprises an encryption module, which performs data encryption on the information transmitted in the network to protect the security of the information.
In an optional embodiment, the packet module is divided into an IP control unit, an MAC control unit, an account control unit, and a hybrid control unit, where the IP control unit performs network control in a machine IP address manner, the MAC control unit performs network control in a machine MAC address manner, the account control unit performs network control in an internet account manner, and the hybrid control unit performs network control in two manners, i.e., IP control and account control.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and substitutions may be made by those skilled in the art within the spirit and scope of the invention, and such modifications and substitutions should also be considered to be within the scope of the invention.

Claims (7)

1.一种基于计算机网络的安全认证系统,其特征在于:包括安全系统、认证系统和数据库,安全系统和认证系统均与数据库通讯连接;1. a security authentication system based on computer network, is characterized in that: comprise security system, authentication system and database, security system and authentication system are all connected with database communication; 安全系统包括数据包捕获模块、数据分析模块和报警处理模块;The security system includes a packet capture module, a data analysis module and an alarm processing module; 数据包捕获模块对整个网络的数据包进行收集并进行分析,以判断是否为异常行为,以IDS使用原始的网络包作为信息源,对工作在混杂模式下的网卡实时监视和分析所有通过共享式网络的传输;The data packet capture module collects and analyzes the data packets of the entire network to determine whether it is an abnormal behavior. IDS uses the original network packets as the information source to monitor and analyze all network cards working in promiscuous mode in real time. network transmission; 数据分析模块包括模式匹配模块、统计分析单元、完整性分析单元,所述模式匹配模块将收集到的信息与已知的网络入侵和系统误用模式数据库进行比较,所述统计分析单元根据系统对象创建一个统计表格,统计正常使用时的若干测量属性,测量属性的平均值将被用来与网络和系统的行为进行比较,所述完整性分析单元关注某个文件和目录的内容及属性是否被更改;The data analysis module includes a pattern matching module, a statistical analysis unit, and an integrity analysis unit. The pattern matching module compares the collected information with a database of known network intrusion and system misuse patterns. The statistical analysis unit is based on system objects. A statistical table is created to count several measured attributes during normal use. The average value of the measured attributes will be used to compare with the behavior of the network and the system. The integrity analysis unit pays attention to whether the content and attributes of a certain file and directory are Change; 报警处理模块将分析结果记录在日志文件中,并产生相应的报告,触发警报;The alarm processing module records the analysis results in the log file, and generates corresponding reports to trigger alarms; 认证系统包括系统管理模块、分组模块、审计控制模块、宽度管理模块,系统管理模块对局域网内IP地址和机器名进行自动搜索,分组模块根据工作需要,对机器进行分组并制定不同的控制策略,审计控制模块将网络用户按MAC地址、帐号口令方式进行审计和控制,宽度管理模块将用户、用户分组或者应用类别来设定上网的带宽,保证优先级高的人员或应用在网络拥堵时优先使用带宽。The authentication system includes a system management module, a grouping module, an audit control module, and a width management module. The system management module automatically searches for IP addresses and machine names in the local area network. The grouping module groups machines according to work needs and formulates different control strategies. The audit control module audits and controls network users according to MAC addresses, account passwords, and the bandwidth management module sets the bandwidth of the Internet by grouping users, users or application categories to ensure that personnel or applications with high priority are used first when the network is congested. bandwidth. 2.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述数据包捕获模块内设置有网络适配器,用于实时监控和分析所有通过网络进行传输的通信。2 . The computer network-based security authentication system according to claim 1 , wherein the data packet capture module is provided with a network adapter for real-time monitoring and analysis of all communications transmitted through the network. 3 . 3.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述报警处理模块触发警报后向系统管理员发送传呼或电子邮件,并修改入侵检测系统或目标系统,如终止进程、切断攻击者的网络连接,或更改防火墙配置。3. computer network-based security authentication system according to claim 1, is characterized in that: after described alarm processing module triggers alarm, sends paging or e-mail to system administrator, and revises intrusion detection system or target system, if terminates process, cut off the attacker's network connection, or change the firewall configuration. 4.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述数据包捕获模块主要对主机操作系统层的数据、网络数据、应用程序数据和目标机发送的数据,进行捕捉。4. computer network-based security authentication system according to claim 1, is characterized in that: described data packet capture module mainly carries out the data that the data that the host operating system layer sends, network data, application program data and target machine catch. 5.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述数据库内部分为两部分,一部分用于安全系统存储检测到的异常数据,另一部分用于认证系统收集的局域网内IP地址和机器名。5. computer network-based security authentication system according to claim 1, is characterized in that: described database is divided into two parts inside, one part is used for the abnormal data that the security system stores detected, and the other part is used for the data collected by the authentication system. Intranet IP address and machine name. 6.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述认证系统还包括加密模块,将网络中传动的信息进行数据加密保护其安全性。6 . The computer network-based security authentication system according to claim 1 , wherein the authentication system further comprises an encryption module, which encrypts the information transmitted in the network to protect its security. 7 . 7.根据权利要求1所述的基于计算机网络的安全认证系统,其特征在于:所述分组模块分为IP控制单元、MAC控制单元、帐号控制单元和混合控制单元,IP控制单元机器IP地址方式进行网络控制,MAC控制单元以机器MAC地址方式进行网络控制,帐号控制单元以上网帐号方式进行网络控制,混合控制单元以IP控制和帐号控制两种方式进行网络控制。7. computer network-based security authentication system according to claim 1, is characterized in that: described grouping module is divided into IP control unit, MAC control unit, account control unit and hybrid control unit, IP control unit machine IP address mode For network control, the MAC control unit performs network control in the form of machine MAC address, the account control unit performs network control in the form of an online account, and the hybrid control unit performs network control in two ways: IP control and account control.
CN201911354579.0A 2019-12-24 2019-12-24 A Security Authentication System Based on Computer Network Pending CN111049853A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911354579.0A CN111049853A (en) 2019-12-24 2019-12-24 A Security Authentication System Based on Computer Network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911354579.0A CN111049853A (en) 2019-12-24 2019-12-24 A Security Authentication System Based on Computer Network

Publications (1)

Publication Number Publication Date
CN111049853A true CN111049853A (en) 2020-04-21

Family

ID=70239834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911354579.0A Pending CN111049853A (en) 2019-12-24 2019-12-24 A Security Authentication System Based on Computer Network

Country Status (1)

Country Link
CN (1) CN111049853A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711640A (en) * 2020-06-30 2020-09-25 郑州工业应用技术学院 A secure computer network communication system
CN111818048A (en) * 2020-07-08 2020-10-23 珠海市鸿瑞信息技术股份有限公司 Safety protection authentication system and method based on distribution network automation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6513122B1 (en) * 2001-06-29 2003-01-28 Networks Associates Technology, Inc. Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
CN103001891A (en) * 2012-11-16 2013-03-27 杭州顺网科技股份有限公司 Method for promoting integral service quality of local area network
CN103281213A (en) * 2013-04-18 2013-09-04 西安交通大学 Method for extracting, analyzing and searching network flow and content
CN104796261A (en) * 2015-04-16 2015-07-22 长安大学 Secure access control system and method for network terminal nodes
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN108600166A (en) * 2018-03-16 2018-09-28 济宁医学院 A kind of network security detection method and system
CN108833425A (en) * 2018-06-26 2018-11-16 九江职业技术学院 A kind of network safety system and method based on big data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6513122B1 (en) * 2001-06-29 2003-01-28 Networks Associates Technology, Inc. Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
CN103001891A (en) * 2012-11-16 2013-03-27 杭州顺网科技股份有限公司 Method for promoting integral service quality of local area network
CN103281213A (en) * 2013-04-18 2013-09-04 西安交通大学 Method for extracting, analyzing and searching network flow and content
CN104796261A (en) * 2015-04-16 2015-07-22 长安大学 Secure access control system and method for network terminal nodes
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN108600166A (en) * 2018-03-16 2018-09-28 济宁医学院 A kind of network security detection method and system
CN108833425A (en) * 2018-06-26 2018-11-16 九江职业技术学院 A kind of network safety system and method based on big data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711640A (en) * 2020-06-30 2020-09-25 郑州工业应用技术学院 A secure computer network communication system
CN111818048A (en) * 2020-07-08 2020-10-23 珠海市鸿瑞信息技术股份有限公司 Safety protection authentication system and method based on distribution network automation
CN111818048B (en) * 2020-07-08 2022-05-27 珠海市鸿瑞信息技术股份有限公司 Safety protection authentication system and method based on distribution network automation

Similar Documents

Publication Publication Date Title
CN110149350B (en) A method and device for analyzing network attack events associated with alarm logs
JP6894003B2 (en) Defense against APT attacks
CN115134099B (en) Network attack behavior analysis method and device based on full flow
CN103563302B (en) Networked asset information management
US7752665B1 (en) Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory
CN107395570B (en) Cloud platform auditing system based on big data management analysis
CN111245793A (en) Method and device for analyzing abnormity of network data
CN111784209A (en) An asset visualization and security operation management system
CN111628981B (en) Network security system and method capable of being linked with application system
US20190044961A1 (en) System and methods for computer network security involving user confirmation of network connections
JP5066544B2 (en) Incident monitoring device, method, and program
CN111510463B (en) Abnormal behavior recognition system
CN114553537A (en) An abnormal flow monitoring method and system for industrial Internet
CN114826880A (en) Method and system for online monitoring of data safe operation
CN111786986B (en) Numerical control system network intrusion prevention system and method
CN111049853A (en) A Security Authentication System Based on Computer Network
Skendžić et al. Management and monitoring security events in a business organization-siem system
CN118317315A (en) Fingerprint information identification technology for network access control system equipment
KR102267411B1 (en) A system for managing security of data by using compliance
CN112350864A (en) Protection method, device, equipment and computer readable storage medium for domain control terminal
Patil et al. Analysis of distributed intrusion detection systems using mobile agents
CN117792733A (en) Network threat detection method and related device
CN117609990A (en) An adaptive security protection method and device based on scene correlation analysis engine
TWM564751U (en) Hacker attack detection system
CN106993005A (en) An early warning method and system for a network server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421

RJ01 Rejection of invention patent application after publication