CN111343194A - Camera violation identification method, system and equipment and computer storage medium - Google Patents

Camera violation identification method, system and equipment and computer storage medium Download PDF

Info

Publication number
CN111343194A
CN111343194A CN202010157794.8A CN202010157794A CN111343194A CN 111343194 A CN111343194 A CN 111343194A CN 202010157794 A CN202010157794 A CN 202010157794A CN 111343194 A CN111343194 A CN 111343194A
Authority
CN
China
Prior art keywords
target
camera
behavior information
target behavior
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010157794.8A
Other languages
Chinese (zh)
Other versions
CN111343194B (en
Inventor
贺亚
张兴彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN202010157794.8A priority Critical patent/CN111343194B/en
Publication of CN111343194A publication Critical patent/CN111343194A/en
Application granted granted Critical
Publication of CN111343194B publication Critical patent/CN111343194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Studio Devices (AREA)

Abstract

The application discloses a camera violation identification method, a system, equipment and a computer storage medium, which are used for acquiring data of data packets of a target camera; analyzing target behavior information to be executed by the target camera based on the data packet data; and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal. According to the method and the device, the target behavior information to be executed by the target camera can be analyzed and obtained, the legality of the target camera is judged based on the safety of the target behavior information, the purpose of carrying out violation identification on the camera according to the behavior information of the target camera is achieved, and therefore even if the camera is hijacked, whether the camera violates rules or not can be judged according to the behavior information of the camera, and the problem of violation operation caused by the fact that the camera is hijacked can be solved. The camera violation identification system, the camera violation identification device and the computer-readable storage medium solve the corresponding technical problems.

Description

Camera violation identification method, system and equipment and computer storage medium
Technical Field
The present application relates to the field of camera security technologies, and in particular, to a method, a system, a device, and a computer storage medium for identifying a violation of a camera.
Background
With the development of networks and the popularization of cameras, users hope to eliminate security problems by means of the cameras on one hand, and bring convenience to scientific research, education, medical treatment, public security, traffic and the like, and worry about new security problems brought by the cameras on the other hand, for example, the cameras are attacked by DDos (distributed initiative of service attack) to form a botnet network, privacy disclosure is caused, and the like, so how to solve the security problems of the cameras becomes crucial.
The existing camera safety technology comprises content encryption, protocol authentication, asset identification and the like, can well distinguish illegal camera access, solves the safety problem of the camera from an entrance, but cannot solve the illegal calling problem caused by the clamping of the camera.
In summary, how to solve the problem of illegal calling of the camera is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a camera violation identification method which can solve the technical problem of how to solve the problem of camera violation calling to a certain extent. The application also provides a camera violation identification system, equipment and a computer-readable storage medium.
In order to achieve the above purpose, the present application provides the following technical solutions:
a camera violation identification method comprises the following steps:
acquiring data packet of a target camera;
analyzing target behavior information to be executed by the target camera based on the data packet data;
and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
Preferably, the analyzing the target behavior information to be executed by the target camera based on the packet data includes:
detecting a trigger event in the data packet data according to an authentication data stream;
and performing behavior detection on the trigger event to obtain the target behavior information.
Preferably, the analyzing the target behavior information to be executed by the target camera based on the packet data includes:
identifying a control instruction in the data packet data;
and analyzing the control instruction to obtain the target behavior information.
Preferably, the determining whether the target behavior information is safe includes:
judging whether the target behavior information belongs to a preset violation behavior information base or not;
if the target behavior information belongs to the preset violation behavior information base, judging that the target behavior information is unsafe;
if the target behavior information does not belong to the preset violation behavior information base, judging that the target behavior information is safe;
the preset violation information base is a rule base for storing predefined violation information.
Preferably, the determining whether the target behavior information is safe includes:
combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera;
analyzing the target behavior track to obtain a target behavior result of the target camera;
combining the target behavior track and the target behavior result into a target behavior rule of the target camera;
judging whether the target behavior rule belongs to a preset violation rule base or not;
if the target behavior rule belongs to the preset violation rule base, judging that the target behavior information is unsafe;
if the target behavior rule does not belong to the preset violation rule base, judging that the target behavior information is safe;
the preset rule base of the violation behaviors is a rule base for storing predefined rule of the violation behaviors.
Preferably, the combining the target behavior information according to the generation sequence of the target behavior information to obtain the target behavior track of the target camera includes:
obtaining stored historical behavior information;
and combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera.
Preferably, the combining the target behavior trajectory and the target behavior result into the target behavior rule of the target camera includes:
acquiring a historical behavior track and a corresponding historical behavior result;
combining the historical behavior track and the target behavior track to obtain a combined behavior track;
merging the historical behavior result and the target behavior result to obtain a combined behavior result;
and combining the combined behavior track and the combined behavior result into the target behavior rule.
Preferably, the determining whether the target behavior information is safe includes:
judging whether the target camera has the authority of executing the target behavior information;
if the target camera does not have the authority of executing the target behavior information, judging that the target behavior information is unsafe;
and if the target camera has the authority of executing the target behavior information, judging that the target behavior information is safe.
Preferably, the determining whether the target camera has the authority to execute the target behavior information includes:
identifying a user name in the data packet data;
judging whether the user name has the authority of controlling the target camera to execute the target behavior information;
if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information;
and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
Preferably, after the target camera is judged to be legal, the method further includes:
allowing the target camera to execute the target behavior information;
after the determination that the target camera is violated, the method further includes:
and prohibiting the target camera from executing the unsafe target behavior information.
A camera violation identification system, comprising:
the first acquisition module is used for acquiring data packet data of the target camera;
the first analysis module is used for analyzing target behavior information to be executed by the target camera based on the data packet;
and the first judgment module is used for judging whether the target behavior information is safe or not, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
A camera violation identification device, comprising:
a memory for storing a computer program;
and the processor is used for realizing the steps of the camera violation identification method when the computer program is executed.
A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the camera violation identification method according to any one of the above.
According to the camera violation identification method, data of data packets of a target camera are obtained; analyzing target behavior information to be executed by the target camera based on the data packet data; and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal. According to the method and the device, the target behavior information to be executed by the target camera can be obtained through analysis based on the data packet data of the target camera, the legality of the target camera is judged based on the safety of the target behavior information, the purpose of carrying out violation identification on the camera according to the behavior information of the target camera is achieved, and therefore even if the camera is hijacked, whether the camera violates rules or not can be judged according to the behavior information of the camera, and the problem of violation operation caused by the fact that the camera is hijacked can be solved. The camera violation identification system, the camera violation identification device and the computer-readable storage medium solve the corresponding technical problems.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a first flowchart of a method for identifying a violation of a camera according to an embodiment of the present disclosure;
FIG. 2 is a first flowchart illustrating an embodiment of the present application for determining whether target behavior information is safe;
FIG. 3 is a second flowchart illustrating determining whether target behavior information is safe according to an embodiment of the present disclosure;
FIG. 4 is a third flowchart illustrating determining whether target behavior information is safe according to an embodiment of the present disclosure;
FIG. 5 is a frame diagram of camera violation identification in an actual application scenario;
fig. 6 is a schematic structural diagram of a camera violation identification system according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a camera violation identification device according to an embodiment of the present application;
fig. 8 is another schematic structural diagram of a camera violation identification device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the development of the network and the popularization of the camera, a user hopes to eliminate the safety problem by means of the camera on one hand, and brings convenience to scientific research, education, medical treatment, public security, traffic and the like, and on the other hand, worrys about new safety problems brought by the camera, for example, the camera is attacked by DDos to form a botnet, privacy disclosure is caused, and the like, so that how to solve the safety problem of the camera becomes crucial. The DDos attack refers to a distributed denial server attack, and refers to that a plurality of attackers in different positions simultaneously attack one or a plurality of targets; botnets refer to a one-to-many controllable network formed between a controller and an infected host by infecting a large number of hosts with viruses using one or more means of propagation. The existing camera safety technology comprises content encryption, protocol authentication, asset identification and the like, can well distinguish illegal camera access, solves the safety problem of the camera from an entrance, but cannot solve the illegal calling problem caused by the clamping of the camera. The camera violation identification method can solve the problem of violation calling of the camera.
Referring to fig. 1, fig. 1 is a first flowchart of a method for identifying camera violations according to an embodiment of the present disclosure.
The camera violation identification method provided by the embodiment of the application can comprise the following steps:
step S101: and acquiring data packet data of the target camera.
In practical application, data packet data of a target camera can be obtained first, and the installation position of the target camera and the type of the acquired data can be determined according to actual needs, for example, the target camera can be a monitoring camera installed by a company, a camera installed in a garden, and the like; the content of the packet data may include authentication information, behavior information, and the like of the target camera, where the authentication information may include an IP, a port, an area, an authentication user name, an authentication password, and the like, and the behavior information may include left rotation, right rotation, power-on, recording, and the like, which may all be determined according to actual needs.
And in a specific application scene, the data packet data of the target camera can be acquired by means of libpcap or winpcap and the like. The libpcap is a network data packet capturing function packet under the unix/linux platform, provides a user-level network data packet capturing interface independent of a system, and fully considers the portability of an application program; a wincap (windows packet capture) is a free and public network access system under a windows platform, the purpose of the project of developing the wincap is to provide the capability of accessing the network bottom layer for a win32 application program, and the wincap is used for direct network programming under the windows system.
Step S102: and analyzing target behavior information to be executed by the target camera based on the data packet data.
In practical application, after the target camera is clamped, when an attacker needs to acquire data which is not acquired originally by the target camera through the target camera, new data packet data needs to be sent to the target camera, and the target camera is controlled to execute new behaviors through the data packet data, so that target behavior information to be executed by the target camera can be analyzed based on the data packet data after the data packet data of the target camera is acquired. The type of the target behavior information may be determined according to actual needs, for example, the target behavior information may be left rotation, right rotation, power on, power off, recording, data access, data upload, data download, and the like.
Step S103: judging whether the target behavior information is safe, if so, executing step S104; if not, go to step S105.
Step S104: and judging that the target camera is legal.
Step S105: and judging that the target camera is illegal.
In practical application, if the target camera is not clamped, the behavior information executed by the target camera belongs to safety information, and if the target camera is clamped, the behavior information executed by the target camera belongs to dangerous information, so that after the target behavior information is analyzed, whether the target behavior information is safe or not can be judged, if the target behavior information is safe, the target camera can be judged to be legal, and correspondingly, if the target behavior information is dangerous, the target camera can be judged to be illegal. It should be noted that at the target behavior information
According to the camera violation identification method, data of data packets of a target camera are obtained; analyzing target behavior information to be executed by the target camera based on the data packet data; and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal. According to the method and the device, the target behavior information to be executed by the target camera can be obtained through analysis based on the data packet data of the target camera, the legality of the target camera is judged based on the safety of the target behavior information, the purpose of carrying out violation identification on the camera according to the behavior information of the target camera is achieved, and therefore even if the camera is hijacked, whether the camera violates rules or not can be judged according to the behavior information of the camera, and the problem of violation operation caused by the fact that the camera is hijacked can be solved.
In the method for identifying camera violation provided in the embodiment of the present application, when protecting a target camera, the authority of a user for operating the target camera is authenticated, for example, IP authentication, user name and password authentication, and at this time, only data passing authentication can be executed by the camera, so that a process of target behavior information to be executed by the target camera is analyzed based on data packet data, which may specifically be: detecting a trigger event in the data packet according to the authentication data stream; and performing behavior detection on the trigger event to obtain target behavior information. It should be noted that, since the trigger event in the packet data is detected according to the authentication data stream, and then the trigger event is subjected to behavior detection to obtain the target behavior information, and the authentication data stream is used for authenticating the authority of the user to operate the target camera, the trigger event is an event that can be executed by the target camera satisfying the authentication, and the security of the target camera can be further ensured.
In the method for identifying the violation of camera provided by the embodiment of the application, since the user and the like control the target camera to execute the corresponding behavior through the control instruction, the process of analyzing the target behavior information to be executed by the target camera based on the data packet can specifically be as follows: identifying a control instruction in the data packet; and analyzing the control command to obtain target behavior information.
In practical applications, in order to improve the analysis efficiency of the target behavior information, a snort frame may be written, and the control command may be analyzed based on the snort frame to obtain the corresponding target behavior information.
Referring to fig. 2, fig. 2 is a first flowchart illustrating determining whether target behavior information is safe according to an embodiment of the present application.
In the method for identifying the violation of camera provided by the application, the step of judging whether the target behavior information is safe may specifically be:
step S201: judging whether the target behavior information belongs to a preset violation behavior information base or not; if the target behavior information belongs to the preset violation information base, step S202 is executed, and if the target behavior information does not belong to the preset violation information base, step S203 is executed.
Step S202: and judging that the target behavior information is unsafe.
Step S203: judging the safety of target behavior information; the preset violation information base is a rule base for storing predefined violation information.
In practical application, predefined violation information can be directly stored in a preset violation information base, so that when target behavior information to be executed is newly generated by a target camera, the target behavior information can be directly matched with the preset violation information base, if the target behavior information belongs to the preset violation information base, the target behavior information can be judged to be unsafe, correspondingly, if the target behavior information does not belong to the preset violation information base, the target behavior information can be judged to be safe, and the like. It should be noted that, in practical applications, a preset safety behavior information base in which predefined safety behavior information is stored may be further provided, whether the target behavior information belongs to the preset safety behavior information base is determined, if the target behavior information belongs to the preset safety behavior information base, the target behavior information is determined to be safe, and if the target behavior information does not belong to the preset safety behavior information base, the target behavior information is determined to be unsafe, and the like. In addition, the quantity of behavior information contained in the target behavior information can be counted, whether the counted value is larger than the preset executable behavior quantity of the camera or not is judged, if yes, the target behavior information is judged to be unsafe, and if not, the target behavior information is judged to be safe and the like.
In a specific application scenario, the predefined violation information in the preset violation information base may be defined by the user himself, for example, the user may add the violation information identified by the user himself to the preset violation information base, and so on.
Referring to fig. 3, fig. 3 is a second flowchart illustrating determining whether target behavior information is safe according to an embodiment of the present application.
In the method for identifying the violation of camera provided by the application, the step of judging whether the target behavior information is safe may specifically be:
step S301: and combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera.
In practical application, a phenomenon that a single piece of target behavior information belongs to safety behavior information, but after the target behavior information is combined, a behavior track of a target camera is in violation may exist, for example, a user allows the target camera to rotate left or right, but after the combined target behavior track rotates left for 30 degrees and then rotates right for 30 degrees, the target camera may have a monitoring dead angle, which may bring a safety problem to the user, so the target behavior information may be combined according to a generation sequence of the target behavior information to obtain the target behavior track of the target camera.
Step S302: and analyzing the target behavior track to obtain a target behavior result of the target camera.
In practical application, after the target behavior track is obtained, the target behavior track can be analyzed to obtain a target behavior result of the target camera, so that a user and the like can determine the behavior track of the target camera according to the target behavior result.
Step S303: and combining the target behavior track and the target behavior result into a target behavior rule of the target camera.
Step S304: judging whether the target behavior rule belongs to a preset violation rule base or not; if the target behavior rule belongs to the preset violation rule base, step S305 is executed, and if the target behavior rule does not belong to the preset violation rule base, step S306 is executed.
Step S305: and judging that the target behavior information is unsafe.
Step S306: judging the safety of target behavior information; the preset rule base of the violation behaviors is a rule base for storing the predefined rule of the violation behaviors.
In practical application, after a target behavior result is obtained, the target behavior trajectory and the target behavior result can be combined into a target behavior rule of a target camera, whether the target behavior rule belongs to a preset violation rule base or not is judged, if the target behavior rule belongs to the preset violation rule base, the target behavior information is judged to be unsafe, and correspondingly, if the target behavior rule does not belong to the preset violation rule base, the target behavior information is judged to be safe and the like. It should be noted that, in practical applications, a preset security behavior rule base storing predefined security behavior rules may also be set, whether the target behavior rule belongs to the preset security behavior rule base is determined, if the target behavior rule belongs to the preset security behavior rule base, the target behavior information is determined to be safe, and if the target behavior rule does not belong to the preset security behavior rule base, the target behavior information is determined to be unsafe, and the like.
In practical application, if only the target behavior information is combined, the combined target behavior trajectory may not represent the complete behavior trajectory of the target camera, so the process of combining the target behavior information according to the generation sequence of the target behavior information to obtain the target behavior trajectory of the target camera may specifically be: obtaining stored historical behavior information; and combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera. That is, the corresponding target behavior track can be generated according to the stored historical behavior information and the newly acquired target behavior information, so that the integrity of the generated target behavior track is ensured, and the accuracy of subsequent judgment on whether the target camera violates rules is further ensured. It should be noted that the number of the acquired historical behavior information may be determined according to actual needs, for example, behavior information acquired within a preset time period before the current time may be used as the historical behavior information.
In practical application, for complex illegal operations, the complexity of the behavior track executed by the target camera is also correspondingly improved, and in order to identify such illegal operations, the generated single behavior tracks can be combined to obtain track information capable of more accurately reflecting the behavior of the target camera, so the step of combining the target behavior track and the target behavior result into the target behavior rule of the target camera can be specifically as follows: acquiring a historical behavior track and a corresponding historical behavior result; combining the historical behavior track and the target behavior track to obtain a combined behavior track; merging the historical behavior result and the target behavior result to obtain a combined behavior result; and combining the combined behavior track and the combined behavior result into a target behavior rule.
Referring to fig. 4, fig. 4 is a third flowchart for determining whether the target behavior information is safe according to the embodiment of the present application.
In the method for identifying the violation of camera provided by the application, the step of judging whether the target behavior information is safe may specifically be:
step S401: judging whether the target camera has the authority of executing the target behavior information; if the target camera does not have the authority to execute the target behavior information, step S402 is executed, and if the target camera has the authority to execute the target behavior information, step S403 is executed.
Step S401: and judging that the target behavior information is unsafe.
Step S402: and judging the safety of the target behavior information.
In practical application, for the same camera, when the permissions of the users are different, the types of behavior information that the users can execute by using the camera are also different, so that whether the target camera has the permission to execute the target behavior information can be judged, if the target camera does not have the permission to execute the target behavior information, the target behavior information can be judged to be unsafe, and correspondingly, if the target camera has the permission to execute the target behavior information, the target behavior information can be judged to be safe and the like. In addition, the process of determining whether the target camera has the authority to execute the target behavior information may specifically be: identifying a user name in the data packet data; judging whether the user name has the authority of controlling the target camera to execute the target behavior information; if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information; and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
In the camera violation identification method provided by the application, in order to ensure the safety of the target camera, the target camera can be allowed to execute target behavior information after the target camera is judged to be legal; accordingly, after the target camera is determined to be in violation, the target camera may be prohibited from executing unsafe target behavior information.
In practical application, after the target camera violation is determined, corresponding alarm information can be sent to inform a user of the target camera violation and the like. The type of the alarm information can be determined according to actual needs, such as voice information, light information and the like.
In addition, it should be noted that the camera violation identification method provided by the present application can be combined with methods of content encryption, protocol authentication, asset identification, and the like of a camera in the prior art, so as to further enhance security management of the camera. Referring to fig. 5, fig. 5 is a frame for identifying violation of camera in an actual application scenario, where in fig. 5, the frame includes a module responsible for access authentication, an authentication server responsible for whether the camera is accessed based on a violation invoking policy, an alarm system responsible for alarm, an intrusion detection system responsible for intrusion detection, and a behavior engine responsible for generating behavior rules; the module responsible for access authentication is connected with the authentication server through a video network; predefined behavior rules are stored in the behavior rule base; predefined feature information is stored in the feature rule base, the feature information may include general features such as IP, port, area, user name, password, etc. of the camera, and may also include predefined behavior information, etc., and in practical application, the feature rule base may be written based on snort rules, and the snort rules may be divided into two logical parts: the rule head comprises the action, the protocol, the source and target IP addresses, the network mask and the source and target port information of the rule, the rule option part comprises the content of the alarm message and the specific part of the packet to be checked, and a plurality of characteristic rules can be flexibly combined to form a rule linked list so as to form stronger characteristic rules; the illegal calling policy may include a feature illegal calling policy, a behavior illegal calling policy, and the like, where the feature illegal calling policy stores feature information of a camera that is not allowed to access the network, and the behavior illegal calling policy stores a behavior rule of a camera that is not allowed to access the network, and the like.
According to the camera violation identification framework shown in fig. 5, in practical application, the camera violation identification method provided by the present application may include the following steps:
the authentication server acquires data of the camera data packet based on the libpcap or the winpcap, wherein the data of the data packet comprises IP (Internet protocol), port, area, user name, password and behavior information of the camera;
analyzing the data packet data through an intrusion detection system snort to obtain data characteristics;
matching the obtained data characteristics with the characteristic rule base through snort to obtain behavior information;
if the matching is successful, triggering an event for detecting the behavior information, and sending the information and the event obtained through snort matching to a behavior engine;
if the matching fails, sending data information obtained through snort analysis, such as IP, ports, areas, user names, passwords and the like, to an authentication server;
the behavior engine stores the received information and events to a local database, describes a behavior set of the camera according to past data in the local database to form a behavior track, and sends the behavior track to a behavior rule base;
the behavior engine carries out rule matching on the behavior track by means of a behavior rule base to obtain a behavior rule;
the behavior engine sends the obtained behavior rules to an authentication server;
the authentication server determines whether the camera behavior is in compliance according to the violation calling strategy; if so, releasing the compliance operation; if not, intercepting the operation which is not in compliance and informing an alarm system to alarm.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a camera violation identification system according to an embodiment of the present disclosure.
The camera violation identification system provided by the embodiment of the application can include:
a first obtaining module 101, configured to obtain data packet data of a target camera;
the first analysis module 102 is configured to analyze target behavior information to be executed by a target camera based on the data packet;
the first judging module 103 is configured to judge whether the target behavior information is safe, determine that the target camera is legal if the target behavior information is safe, and determine that the target camera is illegal if the target behavior information is not safe.
In an exemplary embodiment of the present disclosure, a camera violation identification system includes:
a first detection unit for detecting a trigger event in the packet data according to the authentication data stream;
and the second detection unit is used for carrying out behavior detection on the trigger event to obtain target behavior information.
In an exemplary embodiment of the present disclosure, a camera violation identification system includes:
the first identification unit is used for identifying a control instruction in the data packet;
and the first analysis unit is used for analyzing the control command to obtain the target behavior information.
The camera violation identification system provided by the embodiment of the application, the first judgment module may include:
the first judgment unit is used for judging whether the target behavior information belongs to a preset violation behavior information base or not; if the target behavior information belongs to a preset violation behavior information base, judging that the target behavior information is unsafe; if the target behavior information does not belong to the preset violation behavior information base, judging the safety of the target behavior information; the preset violation information base is a rule base for storing predefined violation information.
The camera violation identification system provided by the embodiment of the application, the first judgment module may include:
the first combination sub-module is used for combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera;
the first analysis submodule is used for analyzing the target behavior track to obtain a target behavior result of the target camera;
the second combination sub-module is used for combining the target behavior track and the target behavior result into a target behavior rule of the target camera;
the first judgment submodule is used for judging whether the target behavior rule belongs to a preset violation rule base or not; if the target behavior rule belongs to a preset violation rule base, judging that the target behavior information is unsafe; if the target behavior rule does not belong to the preset violation rule base, judging the safety of the target behavior information; the preset rule base of the violation behaviors is a rule base for storing the predefined rule of the violation behaviors.
According to the system for identifying the violation of camera provided by the embodiment of the application, the first combination module may include:
the first acquisition unit is used for acquiring the stored historical behavior information;
and the first combination unit is used for combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera.
According to the camera violation identification system provided by the embodiment of the application, the second combination sub-module can comprise:
the second acquisition unit is used for acquiring a historical behavior track and a corresponding historical behavior result;
the second combination unit is used for combining the historical behavior track and the target behavior track to obtain a combined behavior track;
the first merging unit is used for merging the historical behavior result and the target behavior result to obtain a combined behavior result;
and the third combination unit is used for combining the combined behavior track and the combined behavior result into a target behavior rule.
The camera violation identification system provided by the embodiment of the application, the first judgment module may include:
the second judgment submodule is used for judging whether the target camera has the authority of executing the target behavior information; if the target camera does not have the authority of executing the target behavior information, judging that the target behavior information is unsafe; and if the target camera has the authority of executing the target behavior information, judging the safety of the target behavior information.
In the system for identifying camera violation provided in the embodiment of the present application, the second determining submodule may include:
the second identification unit is used for identifying a user name in the data packet data;
the second judgment unit is used for judging whether the user name has the authority of controlling the target camera to execute the target behavior information; if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information; and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
The camera violation identification system provided by the embodiment of the application can further include:
the first setting module is used for allowing the target camera to execute the target behavior information after the first judging module judges that the target camera is legal;
and the second setting module is used for forbidding the target camera to execute unsafe target behavior information after the first judging module judges that the target camera violates the rules.
The application also provides camera violation identification equipment and a computer-readable storage medium, which have corresponding effects of the camera violation identification method provided by the embodiment of the application. Referring to fig. 7, fig. 7 is a schematic structural diagram of a camera violation identification device according to an embodiment of the present disclosure.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program:
acquiring data packet of a target camera;
analyzing target behavior information to be executed by the target camera based on the data packet data;
and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: detecting a trigger event in the data packet according to the authentication data stream; and performing behavior detection on the trigger event to obtain target behavior information.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: identifying a control instruction in the data packet; and analyzing the control command to obtain target behavior information.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: judging whether the target behavior information belongs to a preset violation behavior information base or not; if the target behavior information belongs to a preset violation behavior information base, judging that the target behavior information is unsafe; if the target behavior information does not belong to the preset violation behavior information base, judging the safety of the target behavior information; the preset violation information base is a rule base for storing predefined violation information.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera; analyzing the target behavior track to obtain a target behavior result of the target camera; combining the target behavior track and the target behavior result into a target behavior rule of the target camera; judging whether the target behavior rule belongs to a preset violation rule base or not; if the target behavior rule belongs to a preset violation rule base, judging that the target behavior information is unsafe; if the target behavior rule does not belong to the preset violation rule base, judging the safety of the target behavior information; the preset rule base of the violation behaviors is a rule base for storing the predefined rule of the violation behaviors.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: obtaining stored historical behavior information; and combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: acquiring a historical behavior track and a corresponding historical behavior result; combining the historical behavior track and the target behavior track to obtain a combined behavior track; merging the historical behavior result and the target behavior result to obtain a combined behavior result; and combining the combined behavior track and the combined behavior result into a target behavior rule.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: judging whether the target camera has the authority of executing the target behavior information; if the target camera does not have the authority of executing the target behavior information, judging that the target behavior information is unsafe; and if the target camera has the authority of executing the target behavior information, judging the safety of the target behavior information.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: identifying a user name in the data packet data; judging whether the user name has the authority of controlling the target camera to execute the target behavior information; if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information; and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
The camera violation identification device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: after judging that the target camera is legal, allowing the target camera to execute target behavior information; and after the target camera is judged to be illegal, prohibiting the target camera from executing unsafe target behavior information.
Referring to fig. 8, another camera violation identification device provided in the embodiment of the present application may further include: an input port 203 connected to the processor 202, for transmitting externally input commands to the processor 202; a display unit 204 connected to the processor 202, for displaying the processing result of the processor 202 to the outside; and the communication module 205 is connected with the processor 202 and is used for realizing communication between the camera violation identification device and the outside. The display unit 204 may be a display panel, a laser scanning display, or the like; the communication method adopted by the communication module 205 includes, but is not limited to, mobile high definition link technology (HML), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), and wireless connection: wireless fidelity technology (WiFi), bluetooth communication technology, bluetooth low energy communication technology, ieee802.11s based communication technology.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps:
acquiring data packet of a target camera;
analyzing target behavior information to be executed by the target camera based on the data packet data;
and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: detecting a trigger event in the data packet according to the authentication data stream; and performing behavior detection on the trigger event to obtain target behavior information.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: identifying a control instruction in the data packet; and analyzing the control command to obtain target behavior information.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: judging whether the target behavior information belongs to a preset violation behavior information base or not; if the target behavior information belongs to a preset violation behavior information base, judging that the target behavior information is unsafe; if the target behavior information does not belong to the preset violation behavior information base, judging the safety of the target behavior information; the preset violation information base is a rule base for storing predefined violation information.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera; analyzing the target behavior track to obtain a target behavior result of the target camera; combining the target behavior track and the target behavior result into a target behavior rule of the target camera; judging whether the target behavior rule belongs to a preset violation rule base or not; if the target behavior rule belongs to a preset violation rule base, judging that the target behavior information is unsafe; if the target behavior rule does not belong to the preset violation rule base, judging the safety of the target behavior information; the preset rule base of the violation behaviors is a rule base for storing the predefined rule of the violation behaviors.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: obtaining stored historical behavior information; and combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: acquiring a historical behavior track and a corresponding historical behavior result; combining the historical behavior track and the target behavior track to obtain a combined behavior track; merging the historical behavior result and the target behavior result to obtain a combined behavior result; and combining the combined behavior track and the combined behavior result into a target behavior rule.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: judging whether the target camera has the authority of executing the target behavior information; if the target camera does not have the authority of executing the target behavior information, judging that the target behavior information is unsafe; and if the target camera has the authority of executing the target behavior information, judging the safety of the target behavior information.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: identifying a user name in the data packet data; judging whether the user name has the authority of controlling the target camera to execute the target behavior information; if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information; and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: after judging that the target camera is legal, allowing the target camera to execute target behavior information; and after the target camera is judged to be illegal, prohibiting the target camera from executing unsafe target behavior information.
The computer-readable storage media to which this application relates include Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage media known in the art.
For a description of relevant parts in the camera violation identification system, the camera violation identification device, and the computer-readable storage medium provided in the embodiments of the present application, reference is made to detailed descriptions of corresponding parts in the camera violation identification method provided in the embodiments of the present application, and details are not repeated here. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (13)

1. A camera violation identification method is characterized by comprising the following steps:
acquiring data packet of a target camera;
analyzing target behavior information to be executed by the target camera based on the data packet data;
and judging whether the target behavior information is safe, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
2. The method of claim 1, wherein the analyzing target behavior information to be executed by the target camera based on the packet data comprises:
detecting a trigger event in the data packet data according to an authentication data stream;
and performing behavior detection on the trigger event to obtain the target behavior information.
3. The method of claim 1, wherein the analyzing target behavior information to be executed by the target camera based on the packet data comprises:
identifying a control instruction in the data packet data;
and analyzing the control instruction to obtain the target behavior information.
4. The method of claim 1, wherein the determining whether the target behavior information is safe comprises:
judging whether the target behavior information belongs to a preset violation behavior information base or not;
if the target behavior information belongs to the preset violation behavior information base, judging that the target behavior information is unsafe;
if the target behavior information does not belong to the preset violation behavior information base, judging that the target behavior information is safe;
the preset violation information base is a rule base for storing predefined violation information.
5. The method of claim 1, wherein the determining whether the target behavior information is safe comprises:
combining the target behavior information according to the generation sequence of the target behavior information to obtain a target behavior track of the target camera;
analyzing the target behavior track to obtain a target behavior result of the target camera;
combining the target behavior track and the target behavior result into a target behavior rule of the target camera;
judging whether the target behavior rule belongs to a preset violation rule base or not;
if the target behavior rule belongs to the preset violation rule base, judging that the target behavior information is unsafe;
and if the target behavior rule does not belong to the preset violation rule base, judging that the target behavior information is safe.
6. The method according to claim 5, wherein the combining the target behavior information according to the generation order of the target behavior information to obtain the target behavior track of the target camera comprises:
obtaining stored historical behavior information;
and combining the historical behavior information and the target behavior information according to the generation sequence of the historical behavior information and the target behavior information to obtain a target behavior track of the target camera.
7. The method of claim 5 or 6, wherein the combining the target behavior track and the target behavior result into the target behavior rule of the target camera comprises:
acquiring a historical behavior track and a corresponding historical behavior result;
combining the historical behavior track and the target behavior track to obtain a combined behavior track;
merging the historical behavior result and the target behavior result to obtain a combined behavior result;
and combining the combined behavior track and the combined behavior result into the target behavior rule.
8. The method of claim 1, wherein the determining whether the target behavior information is safe comprises:
judging whether the target camera has the authority of executing the target behavior information;
if the target camera does not have the authority of executing the target behavior information, judging that the target behavior information is unsafe;
and if the target camera has the authority of executing the target behavior information, judging that the target behavior information is safe.
9. The method of claim 8, wherein the determining whether the target camera has the right to execute the target behavior information comprises:
identifying a user name in the data packet data;
judging whether the user name has the authority of controlling the target camera to execute the target behavior information;
if the user name has the authority for controlling the target camera to execute the target behavior information, judging that the target camera has the authority for executing the target behavior information;
and if the user name does not have the authority for controlling the target camera to execute the target behavior information, judging that the target camera does not have the authority for executing the target behavior information.
10. The method of claim 1, wherein after determining that the target camera is legal, further comprising:
allowing the target camera to execute the target behavior information;
after the determination that the target camera is violated, the method further includes:
and prohibiting the target camera from executing the unsafe target behavior information.
11. A camera violation identification system, comprising:
the first acquisition module is used for acquiring data packet data of the target camera;
the first analysis module is used for analyzing target behavior information to be executed by the target camera based on the data packet;
and the first judgment module is used for judging whether the target behavior information is safe or not, if so, judging that the target camera is legal, and if not, judging that the target camera is illegal.
12. A camera violation identification device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the camera violation identification method according to any one of claims 1-10 when executing the computer program.
13. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the camera violation identification method according to any one of claims 1 to 10.
CN202010157794.8A 2020-03-09 2020-03-09 Camera violation identification method, system and equipment and computer storage medium Active CN111343194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010157794.8A CN111343194B (en) 2020-03-09 2020-03-09 Camera violation identification method, system and equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010157794.8A CN111343194B (en) 2020-03-09 2020-03-09 Camera violation identification method, system and equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN111343194A true CN111343194A (en) 2020-06-26
CN111343194B CN111343194B (en) 2022-11-22

Family

ID=71182199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010157794.8A Active CN111343194B (en) 2020-03-09 2020-03-09 Camera violation identification method, system and equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN111343194B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676490A (en) * 2021-09-14 2021-11-19 深信服科技股份有限公司 Mute terminal safety detection method, device, equipment and readable storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005134941A (en) * 2003-10-28 2005-05-26 Matsushita Electric Works Ltd Travel support system for emergency vehicle
US20120151606A1 (en) * 2010-12-09 2012-06-14 James Hannon Software system for denying remote access to computer cameras
CN103686081A (en) * 2013-12-03 2014-03-26 深圳如果技术有限公司 Unattended operation security and protection system
CN104361282A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Mobile terminal security protecting method and device
WO2015066389A1 (en) * 2013-11-01 2015-05-07 Jonas Arnold P Method and security system for network-enabled i/o devices
CN105262945A (en) * 2015-09-18 2016-01-20 北京奇虎科技有限公司 Signaling transmission method and device
US20180332004A1 (en) * 2017-05-15 2018-11-15 Dean Drako Camera and instrument double firewall apparatus and method of operation
CN109670431A (en) * 2018-12-11 2019-04-23 北京小马智行科技有限公司 A kind of behavioral value method and device
CN110050438A (en) * 2016-12-12 2019-07-23 华为技术有限公司 A kind of right management method, relevant device and system
CN110119657A (en) * 2018-02-07 2019-08-13 中国石油化工股份有限公司 A kind of automatic recognition system and recognition methods of communication apparatus Misuse
CN110233982A (en) * 2018-03-06 2019-09-13 北京视联动力国际信息技术有限公司 A kind of monitoring method and device based on view networking
CN110858813A (en) * 2018-12-07 2020-03-03 哈尔滨安天科技集团股份有限公司 Network camera safety detection method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005134941A (en) * 2003-10-28 2005-05-26 Matsushita Electric Works Ltd Travel support system for emergency vehicle
US20120151606A1 (en) * 2010-12-09 2012-06-14 James Hannon Software system for denying remote access to computer cameras
WO2015066389A1 (en) * 2013-11-01 2015-05-07 Jonas Arnold P Method and security system for network-enabled i/o devices
CN103686081A (en) * 2013-12-03 2014-03-26 深圳如果技术有限公司 Unattended operation security and protection system
CN104361282A (en) * 2014-10-31 2015-02-18 中国联合网络通信集团有限公司 Mobile terminal security protecting method and device
CN105262945A (en) * 2015-09-18 2016-01-20 北京奇虎科技有限公司 Signaling transmission method and device
CN110050438A (en) * 2016-12-12 2019-07-23 华为技术有限公司 A kind of right management method, relevant device and system
US20180332004A1 (en) * 2017-05-15 2018-11-15 Dean Drako Camera and instrument double firewall apparatus and method of operation
CN110119657A (en) * 2018-02-07 2019-08-13 中国石油化工股份有限公司 A kind of automatic recognition system and recognition methods of communication apparatus Misuse
CN110233982A (en) * 2018-03-06 2019-09-13 北京视联动力国际信息技术有限公司 A kind of monitoring method and device based on view networking
CN110858813A (en) * 2018-12-07 2020-03-03 哈尔滨安天科技集团股份有限公司 Network camera safety detection method and device
CN109670431A (en) * 2018-12-11 2019-04-23 北京小马智行科技有限公司 A kind of behavioral value method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李娟等: "智慧城市中物联网摄像头安全风险分析", 《信息安全与通信保密》 *
毕方全: "控制河段船舶违规航行检测方法", 《水运工程》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676490A (en) * 2021-09-14 2021-11-19 深信服科技股份有限公司 Mute terminal safety detection method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN111343194B (en) 2022-11-22

Similar Documents

Publication Publication Date Title
EP3225010B1 (en) Systems and methods for malicious code detection accuracy assurance
KR101143847B1 (en) Network security apparatus and method thereof
WO2020103454A1 (en) Defense method for configuring weak password vulnerabilities of internal and external network cameras
WO2023159994A1 (en) Operation and maintenance processing method, and terminal device
US20070294416A1 (en) Method, apparatus, and computer program product for enhancing computer network security
CN113536258A (en) Terminal access control method and device, storage medium and electronic equipment
CN114598540A (en) Access control system, method, device and storage medium
US20160373447A1 (en) Unauthorized access detecting system and unauthorized access detecting method
WO2017034072A1 (en) Network security system and security method
CN111510453A (en) Business system access method, device, system and medium
CN115001870A (en) Information security protection system, method and storage medium
CN112351017B (en) Transverse penetration protection method, device, equipment and storage medium
Flores et al. Bring your own disclosure: analysing BYOD threats to corporate information
CN113411295A (en) Role-based access control situation awareness defense method and system
CN104883364A (en) Method and device for judging abnormity of server accessed by user
CN111343194B (en) Camera violation identification method, system and equipment and computer storage medium
CN112231679B (en) Terminal equipment verification method and device and storage medium
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
CN116192497B (en) Network access and user authentication safe interaction method based on zero trust system
CN110086812B (en) Safe and controllable internal network safety patrol system and method
CN116781380A (en) Campus network security risk terminal interception traceability system
CN115694928A (en) Cloud honeypot of whole-ship computing environment, attack event perception and behavior analysis method
CN113411296B (en) Situation awareness virtual link defense method, device and system
CN115883170A (en) Network flow data monitoring and analyzing method and device, electronic equipment and storage medium
CN113206852B (en) Safety protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant