CN113395694A - Intelligent security defense system and defense method based on 5G and local area base station - Google Patents

Intelligent security defense system and defense method based on 5G and local area base station Download PDF

Info

Publication number
CN113395694A
CN113395694A CN202110699706.1A CN202110699706A CN113395694A CN 113395694 A CN113395694 A CN 113395694A CN 202110699706 A CN202110699706 A CN 202110699706A CN 113395694 A CN113395694 A CN 113395694A
Authority
CN
China
Prior art keywords
module
information
defense
local
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110699706.1A
Other languages
Chinese (zh)
Other versions
CN113395694B (en
Inventor
林章文
孙瑞贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Knet Technology Co ltd
Original Assignee
Shenzhen Knet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Knet Technology Co ltd filed Critical Shenzhen Knet Technology Co ltd
Priority to CN202110699706.1A priority Critical patent/CN113395694B/en
Publication of CN113395694A publication Critical patent/CN113395694A/en
Application granted granted Critical
Publication of CN113395694B publication Critical patent/CN113395694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an intelligent security defense system and a defense method based on a 5G and local area base station, which comprise a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module. The system is provided with a monitoring module and a detection module, whether the system is abnormal or not can be found in time through the monitoring module, the active defense effect can be achieved by matching with a filtering firewall and an encryption module, the normal operation of the whole system can be ensured through the detection module, accidents such as data damage, stealing, losing and the like can be prevented, and AI security and protection early warning can be provided based on big data through the AI calculation module; the invention is designed with an emergency defense module, when the system is seriously invaded, the encrypted information of the system can be transferred to the remote control module through the local data packaging module and the local data transferring module, and the local data is deleted through the local data deleting module, so that the leakage of the system data is prevented.

Description

Intelligent security defense system and defense method based on 5G and local area base station
Technical Field
The invention relates to a security defense system, in particular to an intelligent security defense system and a defense method based on a 5G and local area base station, and belongs to the technical field of network defense systems.
Background
The network defense system is a system which ensures that hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates and network service is not interrupted, and the security defense system based on the 5G and the local area base station is continuously developed along with popularization of the local area network and the 5G.
However, most of the existing network defense systems based on 5G and local area base stations are passively defended through firewalls and are not flexible enough, so that the defense effect is poor.
Disclosure of Invention
The invention aims to provide an intelligent security defense system and a defense method based on 5G and local area base stations in order to solve the problems.
The intelligent security defense system based on the 5G and local area base stations comprises a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module.
Preferably, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Preferably, the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module.
Preferably, the detection module comprises a disinfection module and a test module.
Preferably, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module.
Preferably, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Preferably, the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarming module, the remote control module is connected with the information sending module inside the system management module through the internal information receiving module, and the remote control module is connected with the instruction receiving module inside the system management module through the internal instruction sending module.
Preferably, the emergency defense module includes a local data packing module, a local data deleting module and a local data transferring module.
An intelligent security defense method based on 5G and a local area base station comprises the following steps:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Preferably, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of implementing data parsing, processing, and execution.
The invention has the beneficial effects that:
1. the system is provided with a monitoring module and a detection module, the performance of data, access information, local information and hardware of the system is monitored, whether the system is abnormal or not can be found in time, the system can play an active defense effect by matching with a filtering firewall and an encryption module, the normal operation of the whole system can be ensured by regularly performing software antivirus and software test, accidents such as data damage, stealing, loss and the like are prevented, and AI security and protection early warning can be provided based on big data by arranging an AI calculation module;
2. the invention is designed with an emergency defense module, when the system is seriously invaded, the encrypted information of the system can be transferred to the remote control module in time by arranging the local data packaging module and the local data transferring module, and the local data is completely deleted by the local data deleting module, so that the leakage of the system data is prevented.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic diagram of a network management module according to the present invention;
FIG. 3 is a schematic diagram of the steps of the method of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
Referring to fig. 1-3, the intelligent security defense system based on 5G and local area base stations includes a network management module, an encryption module, a detection module, a monitoring module, a system management module, a filtering firewall, a remote control module, and an emergency defense module, wherein the network management module, the encryption module, the detection module, the monitoring module, the filtering firewall, the remote control module, and the emergency defense module are all connected to the system management module.
Specifically, the network management module includes a network access module and a network monitoring module, and the network access module includes a 5G network access module and a local area network access module.
Specifically, the encryption module includes an access information encryption module, a data transmission encryption module, and a local information encryption module.
Specifically, the detection module comprises a disinfection module and a test module.
Specifically, the monitoring module includes a data transmission monitoring module, an access information monitoring module, a local information monitoring module, and a hardware monitoring module.
Specifically, the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, wherein the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
Specifically, the remote control module includes information receiving module, instruction sending module, information storage module and early warning and alarm module, the remote control module is connected with the inside information sending module of system management module through inside information receiving module, the remote control module is connected with the inside instruction receiving module of system management module through inside instruction sending module.
Specifically, the emergency defense module includes a local data packing module, a local data deleting module, and a local data transferring module.
The intelligent security defense method based on the 5G and the local area base station comprises the following steps of:
and S1, initializing the system, wherein the network management module accesses the 5G network or the local area network through the network access module, and the defense system performs initialization configuration.
And S2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the condition of personnel accessing the system, whether the local information is normal and whether the hardware performance is normal in real time through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module, and the network monitoring module also monitors the accessed 5G network and the local area network.
And S3, identifying the monitoring information, wherein the monitoring module and the network monitoring module can send all monitored information to the system management module, the information feedback module in the system management module can send the information to the AI computing module after receiving the information, and the AI computing module can analyze and identify the monitoring information, judge whether abnormal conditions exist, and send all the received information and the judgment structure to the local storage module in the system management module for local information storage.
S4, defensive measures, when the monitoring information shows abnormal conditions, the system management module sends information to the filtering firewall through the information sending module, the remote control module and the encryption module, the filtering firewall can filter visitors, the remote control module can give an early warning and an alarm to background personnel through the early warning and alarm module after receiving the information through the information receiving module, the background personnel can give an instruction to the system management module through the instruction sending module to carry out bug repair, and the encryption module can sequentially carry out secondary encryption on the information of the access information, the data transmission and the local storage through the access information encryption module, the data transmission encryption module and the local information encryption module after receiving the information.
And S5, emergency defense, wherein when the system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of the remote control module through the local data transfer module, and then deletes all the important data of the system through the local data deletion module.
And S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
Specifically, the AI calculation module in S3 provides AI security warning, AI intelligent edge calculation, big data analysis, and processes of data parsing, processing, and execution.
The system is designed with a monitoring module and a detection module, the monitoring module can monitor the performance of data, access information, local information and hardware of the system through an internal data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module, ensures that the abnormality of the system can be found in time, can play an active defense effect by matching with a filtering firewall and an encryption module, can regularly disinfect and test software contained in the system through a disinfection module and a test module in the detection module, and can timely repair the bug through a remote control module, thereby ensuring the normal operation of the whole system, preventing the system data from being damaged, stolen, lost and other accidents, and providing AI security early warning, AI intelligent edge calculation, big data analysis, data analysis and the like through the arrangement of an AI calculation module, The process of processing and executing, thereby ensuring the accurate judgment of the defense system information; the invention is designed with an emergency defense module, when the system is seriously invaded, all encrypted important information can be packaged and backed up through a local data packaging module arranged in the emergency defense module, the packaged data can be timely transferred to a background of a remote control module through the local data packaging module arranged in the emergency defense module, and the local data is completely deleted through a local data deleting module, so that the system data is prevented from being maliciously leaked or tampered by hackers.

Claims (10)

1. An intelligent security defense method based on 5G and a local area base station is characterized in that: the method comprises the following steps:
s1, initializing the system, wherein the network management module accesses the 5G network or the network of the local base station through the network access module, and the defense system performs initialization configuration;
s2, active defense, wherein the monitoring module monitors the data transmission condition of the system, the personnel access condition of the system, whether the local information is normal and whether the hardware performance is normal through the data transmission monitoring module, the access information monitoring module, the local information monitoring module and the hardware monitoring module in real time, and the network monitoring module also monitors the accessed 5G network or the local base station network;
s3, identifying monitoring information, wherein the monitoring module and the network monitoring module send all monitored information to the system management module, an information feedback module in the system management module receives the information and sends the information to the AI computing module, the AI computing module analyzes and identifies the monitoring information, judges whether abnormal conditions exist or not, and sends all the received information and judgment results to a local storage module in the system management module for local information storage;
s4, defense measures are taken, when monitoring information shows abnormal conditions, a system management module sends information to a filtering firewall, a remote control module and an encryption module through an information sending module, the filtering firewall can filter visitors, the remote control module carries out early warning and alarming on background personnel through an early warning and alarming module after receiving the information through an information receiving module, the background personnel issue instructions to the system management module through an instruction sending module to carry out bug repairing, and the encryption module carries out secondary encryption on access information, data transmission and locally stored information in sequence through an access information encryption module, a data transmission encryption module and a local information encryption module after receiving the information;
s5, emergency defense, wherein when a system is seriously invaded, the system management module drives the emergency defense module to start emergency defense measures, the emergency defense module firstly packages important data contained in the system through an internal local data packaging module, then sends the packaged data to a background of a remote control module through a local data transfer module, and then deletes all the important data of the system through a local data deletion module;
and S6, daily detection, wherein the antivirus module in the detection module is used for scanning all data packets of the system to detect whether the system has invading viruses, if the system has viruses, the antivirus module can carry out antivirus treatment on the viruses, and the test module in the detection module is used for carrying out function test on software and programs contained in the system to repair bugs possibly existing in time, so that the whole defense system can be ensured to maintain a normal defense process.
2. The intelligent security defense method based on 5G and local area base stations as claimed in claim 1, wherein: the AI calculation module in the S3 provides AI security early warning, AI intelligent edge calculation, big data analysis, and realizes the processes of data analysis, processing and execution.
3. A 5G and lan base station based intelligent security defense system for implementing 5G and lan base station based intelligent security defense of claim 1, characterized in that: including network management module, cryptographic module, detection module, monitoring module, system management module, filtering firewall, remote control module and emergency defense module, network management module, cryptographic module, detection module, monitoring module, filtering firewall, remote control module and emergency defense module all are connected with system management module.
4. The system of claim 3, wherein the smart security defense system comprises: the network management module comprises a network access module and a network monitoring module, and the network access module comprises a 5G network access module and a local area network access module.
5. The system of claim 3, wherein the smart security defense system comprises: the encryption module comprises an access information encryption module, a data transmission encryption module and a local information encryption module.
6. The system of claim 3, wherein the smart security defense system comprises: the detection module comprises a disinfection module and a test module.
7. The system of claim 3, wherein the smart security defense system comprises: the monitoring module comprises a data transmission monitoring module, an access information monitoring module, a local information monitoring module and a hardware monitoring module.
8. The system of claim 3, wherein the smart security defense system comprises: the system management module comprises an information feedback module, an information sending module, an AI computing module, an instruction receiving module and a local storage module, wherein the information feedback module, the information sending module, the instruction receiving module and the local storage module are all connected with the AI computing module, the network management module, the encryption module, the detection module and the monitoring module are all connected with the system management module through the information feedback module, the encryption module, the filtering firewall, the remote control module and the emergency defense module are all connected with the system management module through the information sending module, and the instruction receiving module is connected with the remote control module.
9. The system of claim 3, wherein the smart security defense system comprises: the remote control module comprises an information receiving module, an instruction sending module, an information storage module and an early warning and alarming module, the remote control module is connected with the information sending module inside the system management module through the inside information receiving module, and the remote control module is connected with the instruction receiving module inside the system management module through the inside instruction sending module.
10. The system of claim 3, wherein the smart security defense system comprises: the emergency defense module comprises a local data packing module, a local data deleting module and a local data transferring module.
CN202110699706.1A 2021-06-23 2021-06-23 Intelligent security defense system and method based on 5G and local base station Active CN113395694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699706.1A CN113395694B (en) 2021-06-23 2021-06-23 Intelligent security defense system and method based on 5G and local base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699706.1A CN113395694B (en) 2021-06-23 2021-06-23 Intelligent security defense system and method based on 5G and local base station

Publications (2)

Publication Number Publication Date
CN113395694A true CN113395694A (en) 2021-09-14
CN113395694B CN113395694B (en) 2023-07-07

Family

ID=77623561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699706.1A Active CN113395694B (en) 2021-06-23 2021-06-23 Intelligent security defense system and method based on 5G and local base station

Country Status (1)

Country Link
CN (1) CN113395694B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157462A (en) * 2021-11-23 2022-03-08 四川邮电职业技术学院 Computer network information safety control system and method
CN114525745A (en) * 2022-03-03 2022-05-24 谢文武 Intelligent intrusion defense detection system based on block chain
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712427A (en) * 2018-05-23 2018-10-26 北京国信安服信息安全科技有限公司 A kind of network security method and system of dynamic Initiative Defense
CN110381008A (en) * 2018-04-13 2019-10-25 武汉梓金山科技有限公司 A kind of Dynamic Defense System of Network Security and method based on big data
CN112149090A (en) * 2020-09-16 2020-12-29 山东大学 Computer network safety protection system based on data cloud
US20210051467A1 (en) * 2019-08-14 2021-02-18 Blackberry Limited Different profiles for selecting different network interfaces for communications of an electronic device
CN112464235A (en) * 2020-11-26 2021-03-09 西京学院 Computer network safety control system and control method
CN112615842A (en) * 2020-12-11 2021-04-06 黑龙江亿林网络股份有限公司 Network security implementation system and method based on big data platform
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381008A (en) * 2018-04-13 2019-10-25 武汉梓金山科技有限公司 A kind of Dynamic Defense System of Network Security and method based on big data
CN108712427A (en) * 2018-05-23 2018-10-26 北京国信安服信息安全科技有限公司 A kind of network security method and system of dynamic Initiative Defense
US20210051467A1 (en) * 2019-08-14 2021-02-18 Blackberry Limited Different profiles for selecting different network interfaces for communications of an electronic device
CN112149090A (en) * 2020-09-16 2020-12-29 山东大学 Computer network safety protection system based on data cloud
CN112464235A (en) * 2020-11-26 2021-03-09 西京学院 Computer network safety control system and control method
CN112615842A (en) * 2020-12-11 2021-04-06 黑龙江亿林网络股份有限公司 Network security implementation system and method based on big data platform
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157462A (en) * 2021-11-23 2022-03-08 四川邮电职业技术学院 Computer network information safety control system and method
CN114525745A (en) * 2022-03-03 2022-05-24 谢文武 Intelligent intrusion defense detection system based on block chain
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Also Published As

Publication number Publication date
CN113395694B (en) 2023-07-07

Similar Documents

Publication Publication Date Title
CN113395694B (en) Intelligent security defense system and method based on 5G and local base station
CN110233817B (en) Container safety system based on cloud computing
CN113596028B (en) Method and device for handling network abnormal behaviors
CN112968885B (en) Edge computing platform safety protection method and device
CN112653654A (en) Security monitoring method and device, computer equipment and storage medium
CN112597462A (en) Industrial network safety system
CN107122685A (en) A kind of big data method for secure storing and equipment
CN101719846A (en) Security monitoring method, device and system
CN114006748A (en) Network security comprehensive monitoring method, system, equipment and storage medium
CN112217803A (en) Real-time network security threat early warning analysis method and device
CN111786986A (en) Numerical control system network intrusion prevention system and method
CN110708340A (en) Enterprise private network security supervision system
CN106650338A (en) Method and system for preventing software from being anti-debugged
CN116708157A (en) Computer security operation and maintenance service system
CN116566687A (en) Early warning treatment system and method based on network attack recognition behavior
Ye et al. Research on network security protection strategy
Salah et al. Surviving cyber warfare with a hybrid multiagent-base intrusion prevention system
CN108985051A (en) A kind of intrusion prevention method and system of Behavior-based control tracking
CN113783875A (en) Fire protection system for network information security and use method thereof
CN114398642A (en) Enterprise economic management information safety system
Chung et al. Machine learning in the hands of a malicious adversary: a near future if not reality
Yao Research on computer database intrusion detection technology based on virtualization technology
CN207612279U (en) A kind of food processing factory's network security management system
CN113542186A (en) Monitoring system based on network security and early warning method thereof
CN112565246A (en) Network anti-attack system and method based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant