CN113692180A - Network information safety management device - Google Patents

Network information safety management device Download PDF

Info

Publication number
CN113692180A
CN113692180A CN202110874673.XA CN202110874673A CN113692180A CN 113692180 A CN113692180 A CN 113692180A CN 202110874673 A CN202110874673 A CN 202110874673A CN 113692180 A CN113692180 A CN 113692180A
Authority
CN
China
Prior art keywords
network
node
heat dissipation
network information
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110874673.XA
Other languages
Chinese (zh)
Other versions
CN113692180B (en
Inventor
张静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Polytechnic
Original Assignee
Dongguan Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Polytechnic filed Critical Dongguan Polytechnic
Priority to CN202110874673.XA priority Critical patent/CN113692180B/en
Publication of CN113692180A publication Critical patent/CN113692180A/en
Application granted granted Critical
Publication of CN113692180B publication Critical patent/CN113692180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K7/00Constructional details common to different types of electric apparatus
    • H05K7/20Modifications to facilitate cooling, ventilating, or heating
    • H05K7/2029Modifications to facilitate cooling, ventilating, or heating using a liquid coolant with phase change in electronic enclosures
    • H05K7/20318Condensers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K7/00Constructional details common to different types of electric apparatus
    • H05K7/14Mounting supporting structure in casing or on frame or rack
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K7/00Constructional details common to different types of electric apparatus
    • H05K7/20Modifications to facilitate cooling, ventilating, or heating
    • H05K7/20009Modifications to facilitate cooling, ventilating, or heating using a gaseous coolant in electronic enclosures
    • H05K7/20136Forced ventilation, e.g. by fans
    • H05K7/20181Filters; Louvers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • Thermal Sciences (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Cooling Or The Like Of Electrical Apparatus (AREA)

Abstract

The invention relates to the technical field of network information security, in particular to a network information security management device. Including network rack body, the both sides of network rack body all have opening one, the both sides of network rack body all have radiator unit, radiator unit includes the loop bar, there is radiator fan in the loop bar, the both sides of network rack body all have fixed frame, there is connecting plate one fixed frame top, there is the heating panel in the fixed frame, there is connecting plate two the heating panel top, connect through the fastener of auto-lock between connecting plate one and the connecting plate two, there is network information management platform in the network rack body, the node by the invasion in the neighbour's figure of route node gathers, merge the invasion node that all detect into set I, accomplish network information safety control. The invention provides a network information safety management device which can dissipate heat, is convenient for replacing and cleaning heat dissipation components, and has the functions of detecting an invasive node merging set, avoiding the mutual infection among nodes and damaging a network.

Description

Network information safety management device
Technical Field
The invention relates to the technical field of network information security, in particular to a network information security management device.
Background
The network information safety is a comprehensive subject related to various subjects such as computer science, network technology, communication technology, cryptographic technology, information safety technology, application mathematics, number theory, information theory and the like, and mainly refers to that hardware, software and data in a network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates without interruption of network service, and a network cabinet is one device in the network information safety management.
With the continuous development of computer networks, network information is a multi-hop temporary wireless mobile centerless network formed by a group of nodes carrying wireless transceiver equipment. The network can be rapidly established at any time and any place, the framework support of the existing network infrastructure is not needed, the network information is easily attacked by various viruses due to the property, the attacks can utilize numerous technologies such as immune authentication and encryption and the like to destroy a routing mechanism as an attack target, a false path shorter than an actual path can be formed, the routing mechanism realized by means of the distance between nodes is interfered, and the network is finally damaged, so that the network information safety management is an effective way for solving the problems, and the method is significant.
Disclosure of Invention
The invention provides a network information safety management device which can dissipate heat, is convenient for replacing and cleaning heat dissipation components, and has the functions of detecting an invasive node merging set, avoiding the mutual infection among nodes and damaging a network.
The technical scheme adopted by the invention is as follows: a network information security management apparatus, characterized in that: the network cabinet comprises a network cabinet body, wherein both sides of the network cabinet body are provided with a first opening, both sides of the network cabinet body are provided with a heat dissipation assembly at the first opening, the heat dissipation assembly comprises a loop bar arranged in the first opening, a heat dissipation fan penetrates through the loop bar, both sides of the network cabinet body are provided with a fixed frame at the first opening, the top of the fixed frame is provided with a first connecting plate, a heat dissipation plate is inserted in the fixed frame in a sliding manner, a cooling circulation pipe and a condenser are embedded on the heat dissipation plate, the heat dissipation plate is provided with a plurality of through holes, one side of the heat dissipation plate is provided with a filter screen frame, the top of the heat dissipation plate is provided with a second connecting plate, the first connecting plate and the second connecting plate are connected through a self-locking fastener, a network information management platform is arranged in the network cabinet body, and routing nodes are arranged in the network information management platform, and summarizing the invaded nodes in the neighbor number of the routing nodes, wherein the invaded nodes are suspicious nodes, and merging all the detected invaded nodes into a set I to ensure that other network nodes normally operate and complete the network information security management.
The network cabinet is characterized in that a door is hinged to one side of the network cabinet body, a handle is arranged on one side of the door, universal wheels are arranged at the bottom of the network cabinet body, and locking structures are arranged on the universal wheels.
The two sides of the network cabinet body are located above the opening, the motors are arranged on the two sides of the network cabinet body, one end of an output shaft of each motor penetrates through the network cabinet body, and one end of the output shaft of each motor is connected with the corresponding cooling fan through a connecting band.
The cooling circulation pipe is connected with the condenser.
The self-locking fastener comprises a fastening column inserted in the first connecting plate and the second connecting plate, the top of the fastening column is in threaded connection with a threaded column, the top of the threaded column is in threaded connection with an auxiliary hand, movable rods are arranged in the fastening column, the threaded column and the auxiliary hand, support arms for controlling the movable rods are arranged on two sides of the fastening column, support plates for supporting the support arms are sleeved on the movable rods, and sliding blocks are sleeved on the threaded columns.
The fastening column, the threaded column and the auxiliary hand are all internally provided with movable rod grooves for the movable rods to penetrate through, the fastening column is internally provided with a movable groove for the movable rods to move, the fastening column is connected with the supporting arm through a rotating shaft, and two sides of the fastening column are respectively provided with a second opening for the supporting arm to rotate around the rotating shaft.
The movable rod is sleeved with a spring at a movable rod groove of the fastening column, one end of the spring is connected with the supporting sheet, and the other end of the spring is connected with the movable rod groove of the fastening column.
The network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network to be N, the node arrangement range to be L multiplied by L, and R representing the communication radius of the node; psi for networksAverage node density, utilization
Figure BDA0003190166850000021
Performing calculation according to
Figure BDA0003190166850000022
The neighbor number C of each node can be obtained2X ψ; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
S3: using Sum ═ C (P)SD(0))+C(PSD(1))+…+C(PSD(n)) calculating a solution average
Figure BDA0003190166850000023
And when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
The invention has the beneficial effects that:
the invention has the advantage that the heat dissipation assembly is arranged to play a role in heat dissipation, and the self-locking fastener is used for connecting the first connecting plate and the second connecting plate, so that the heat dissipation plate and the filter screen frame in the heat dissipation assembly can be replaced and cleaned conveniently.
According to the invention, the network nodes affected by the intrusion are inquired by the initial node according to the neighbor number information of each routing node, and the network nodes affected by the intrusion are gathered, so that the mutual infection among the nodes is avoided, other network nodes operate normally, and the high-speed information network safety management is completed.
Drawings
Fig. 1 is a schematic diagram of an overall structure of a network information security management apparatus according to the present invention.
Fig. 2 is a side view of a network information security management apparatus according to the present invention.
Fig. 3 is a schematic diagram of a heat dissipation plate structure of a network information security management apparatus according to the present invention.
Fig. 4 is a schematic structural diagram of a self-locking fastener of a network information security management apparatus according to the present invention.
(1, network cabinet body; 2, heat dissipation component; 3, self-locking fastener; 1.1, door; 1.2, handle; 1.3, universal wheel; 2.1, heat dissipation fan; 2.2, motor; 2.3, connecting belt; 2.4, fixed frame; 2.5, connecting plate I; 2.6, heat dissipation plate; 2.7, cooling circulation pipe; 2.8, condenser; 2.9, through hole; 2.10, filter screen frame; 2.11, connecting plate II; 3.1, fastening column; 3.2, threaded column; 3.3, auxiliary hand; 3.4, movable rod; 3.5, supporting arm; 3.6, movable groove; 3.7, spring; 3.8, slide block)
Detailed Description
A network information security management apparatus, characterized in that: the network cabinet comprises a network cabinet body 1, wherein both sides of the network cabinet body 1 are provided with a first opening, both sides of the network cabinet body 1 at the first opening are provided with heat dissipation assemblies 2, each heat dissipation assembly 2 comprises a loop bar arranged in the first opening, a heat dissipation fan 2.1 penetrates through the loop bar, both sides of the network cabinet body 1 at the first opening are provided with fixed frames 2.4, the top of each fixed frame 2.4 is provided with a first connecting plate 2.5, each fixed frame 2.4 is provided with a heat dissipation plate 2.6 in a sliding insertion manner, each heat dissipation plate 2.6 is provided with a cooling circulation pipe 2.7 and a condenser 2.8 in an embedding manner, each heat dissipation plate 2.6 is provided with a plurality of through holes 2.9, one side of each heat dissipation plate 2.6 is provided with a filter screen frame 2.10, the top of each heat dissipation plate 2.6 is provided with a second connecting plate 2.11, the first connecting plate 2.5 and the second connecting plate 2.11 are connected through self-locking fasteners 3, a network information management platform is arranged in the network cabinet body 1, routing nodes are arranged in the network information management platform, invaded nodes in the neighbor number of the routing nodes are collected, the invaded nodes are suspicious nodes, all detected invaded nodes are combined into the set I, mutual infection among the nodes is avoided, other network nodes can normally operate, and network information safety management is completed.
The network cabinet is characterized in that a door 1.1 is hinged to one side of the network cabinet body 1, a handle 1.2 is arranged on one side of the door 1.1, universal wheels 1.3 are arranged at the bottom of the network cabinet body 1, and locking structures are arranged on the universal wheels 1.3.
The utility model discloses a network cabinet, including network cabinet body 1, cooling fan 2.1, motor 2.2, the output shaft one end of motor runs through network cabinet body 1, the output shaft one end of motor is connected through connecting band 2.3 with cooling fan 2.1.
The cooling circulation pipe 2.7 is interconnected with the condenser 2.8.
The self-locking fastener 3 comprises a fastening column 3.1 inserted into a first connecting plate 2.5 and a second connecting plate 2.11, the top of the fastening column 3.1 is in threaded connection with a threaded column 3.2, the top of the threaded column 3.2 is in threaded connection with an auxiliary hand 3.3, movable rods 3.4 are arranged in the fastening column 3.1, the threaded column 3.2 and the auxiliary hand 3.3, supporting arms 3.5 for controlling the movable rods 3.4 are arranged on two sides of the fastening column 3.1, the movable rods 3.4 are sleeved with supporting pieces for supporting the supporting arms 3.5, and sliding blocks 3.8 are sleeved on the supporting pieces on the threaded column 3.2.
The fastening column 3.1, the threaded column 3.2 and the auxiliary hand 3.3 are all internally provided with movable rod grooves for the movable rods 3.4 to penetrate through, the fastening column 3.1 is internally provided with movable grooves 3.6 for the movable rods 3.4 to move, the fastening column 3.1 is connected with the supporting arms 3.5 through rotating shafts, and two sides of the fastening column 3.1 are both provided with openings II for the supporting arms 3.5 to rotate around the rotating shafts.
The movable rod 3.4 is sleeved with a spring 3.7 at the position of a movable rod groove of the fastening column 3.1, one end of the spring 3.7 is connected with a supporting sheet, and the other end of the spring 3.7 is connected with the movable rod groove of the fastening column 3.1.
The network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network to be N, the node arrangement range to be L multiplied by L, and R representing the communication radius of the node; psi represents the average node density of the network, using
Figure BDA0003190166850000041
Performing calculation according to
Figure BDA0003190166850000042
The neighbor number C of each node can be obtained2X ψ; due to the special attribute of network intrusion, when the node is influenced by the intrusion, the node covered by the other end of the intrusion is regarded as a neighbor of the node; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
S3: using Sum ═ C (P)SD(0))+C(PSD(1))+…+C(PSD(n)) calculating a solution average
Figure BDA0003190166850000043
And when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
The invention has the advantages that the heat dissipation effect is achieved through the arrangement of the heat dissipation component 2, the self-locking fastener 3 is used for connecting the first connecting plate 2.5 and the second connecting plate 2.11, the heat dissipation plate 2.6 and the filter screen frame 2.10 in the heat dissipation component 2 are convenient to replace and clean, the motor 2.2 is started, so the connecting belt 2.3 is driven to rotate, the heat dissipation fan 2.1 is driven to rotate, the network information management platform is dissipated, the network information management platform is protected, the temperature reduction circulating pipe 2.7 is driven to reduce the temperature through the through hole 2.9 on the heat dissipation plate 2.6 and the condenser 2.8, the heat dissipation effect is accelerated, the condenser 2.8 drives the temperature reduction circulating pipe 2.7 to reduce the temperature so that the temperature reduction circulation is carried out, if the heat dissipation plate 2.6 and the filter screen frame 2.10 need to be replaced and cleaned, the first connecting plate 2.5 and the second connecting plate 2.11 can be separated through the self-locking fastener 3, the sliding block 3.8 is firstly rotated towards the auxiliary hand 3.3 on the threaded column 3.2, then the supporting arm 3.5 rotates around the rotating shaft to the fastening column 3.1, the self-locking fastener 3 is taken out from the first connecting plate 2.5 and the second connecting plate 2.11 through the auxiliary hand 3.3, the supporting arm 3.5 on the self-locking fastener 3 takes the supporting sheet as a fulcrum, the movable rod 3.4 is lifted upwards, the pressure is relieved through the spring 3.7, and then the heat dissipation plate 2.6 is taken out from the fixed frame 2.4 in a sliding mode.
According to the invention, the network nodes affected by the intrusion are inquired by the initial node according to the neighbor number information of each routing node, and the network nodes affected by the intrusion are gathered, so that the mutual infection among the nodes is avoided, other network nodes operate normally, and the high-speed information network safety management is completed.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A network information security management apparatus, characterized in that: the heat dissipation device comprises a network cabinet body (1), wherein both sides of the network cabinet body (1) are provided with a first opening, both sides of the network cabinet body (1) are provided with a first opening and are provided with heat dissipation assemblies (2), each heat dissipation assembly (2) comprises a loop bar arranged in the first opening, a heat dissipation fan (2.1) penetrates through the loop bar, both sides of the network cabinet body (1) are provided with a fixed frame (2.4) at the first opening, the top of the fixed frame (2.4) is provided with a first connecting plate (2.5), the fixed frame (2.4) is provided with a heat dissipation plate (2.6) in a sliding insertion manner, the heat dissipation plate (2.6) is provided with a cooling circulation pipe (2.7) and a condenser (2.8) in an embedding manner, the heat dissipation plate (2.6) is provided with a plurality of through holes (2.9), one side of the heat dissipation plate (2.6) is provided with a filter screen frame (2.10), the top of the heat dissipation plate (2.6) is provided with a second connecting plate (2.11), fastener (3) through the auto-lock are connected between connecting plate one (2.5) and connecting plate two (2.11), be equipped with network information management platform in network cabinet body (1), be equipped with routing node in the network information management platform, gather the node invaded in routing node's the neighbour's figure, the node of invasion is suspicious node, merges all intrusion nodes that detect to set I in, makes other network node normal operating, accomplishes network information security management.
2. The network information security management apparatus according to claim 1, wherein: the network cabinet is characterized in that one side of the network cabinet body (1) is hinged to be provided with a door (1.1), one side of the door (1.1) is provided with a handle (1.2), the bottom of the network cabinet body (1) is provided with universal wheels (1.3), and the universal wheels (1.3) are provided with locking structures.
3. The network information security management apparatus according to claim 1, wherein: the utility model discloses a network cabinet, including network cabinet body (1), the both sides of network cabinet body (1) are located opening one top and all are equipped with motor (2.2), network cabinet body (1) is run through to the output shaft one end of motor, the output shaft one end of motor is connected through connecting band (2.3) with radiator fan (2.1).
4. The network information security management apparatus according to claim 1, wherein: the cooling circulation pipe (2.7) is connected with the condenser (2.8).
5. The network information security management apparatus according to claim 1, wherein: the self-locking fastener (3) comprises a fastening column (3.1) inserted into a first connecting plate (2.5) and a second connecting plate (2.11), the top of the fastening column (3.1) is in threaded connection with a threaded column (3.2), the top of the threaded column (3.2) is in threaded connection with an auxiliary hand (3.3), movable rods (3.4) are arranged in the fastening column (3.1), the threaded column (3.2) and the auxiliary hand (3.3), support arms (3.5) for controlling the movable rods (3.4) are arranged on two sides of the fastening column (3.1), support plates for supporting the support arms (3.5) are sleeved on the movable rods (3.4), and sliding blocks (3.8) are sleeved on the threaded columns (3.2).
6. The network information security management apparatus according to claim 5, wherein: the movable rod groove for the movable rod (3.4) to penetrate through is formed in each of the fastening column (3.1), the threaded column (3.2) and the auxiliary hand (3.3), the moving groove (3.6) for the movable rod (3.4) to move is formed in each fastening column (3.1), the fastening columns (3.1) and the supporting arms (3.5) are connected through rotating shafts, and two openings for the supporting arms (3.5) to surround the rotating shafts to rotate are formed in two sides of each fastening column (3.1).
7. The network information security management apparatus according to claim 6, wherein: the movable rod (3.7) is sleeved at a movable rod groove of the fastening column (3.1) on the movable rod (3.4), one end of the spring (3.7) is connected with the supporting sheet, and the other end of the spring (3.7) is connected with the movable rod groove of the fastening column (3.1).
8. The network information security management apparatus according to claim 1, wherein: the network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network as N, distributing the nodesSetting range is L multiplied by L, and R represents communication radius of the node; psi represents the average node density of the network, using
Figure FDA0003190166840000021
Performing calculation according to
Figure FDA0003190166840000022
The neighbor number C of each node can be obtained2X ψ; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
S3: using Sum ═ C (P)SD(0))+C(PSD(1))+…+C(PSD(n)) calculating a solution average
Figure FDA0003190166840000023
And when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
CN202110874673.XA 2021-07-30 2021-07-30 Network information security management device Active CN113692180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110874673.XA CN113692180B (en) 2021-07-30 2021-07-30 Network information security management device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110874673.XA CN113692180B (en) 2021-07-30 2021-07-30 Network information security management device

Publications (2)

Publication Number Publication Date
CN113692180A true CN113692180A (en) 2021-11-23
CN113692180B CN113692180B (en) 2023-08-15

Family

ID=78578477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110874673.XA Active CN113692180B (en) 2021-07-30 2021-07-30 Network information security management device

Country Status (1)

Country Link
CN (1) CN113692180B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753462A (en) * 2010-01-19 2010-06-23 中国人民解放军信息工程大学 Method and device for realizing multi-next-hop routes
CN103118412A (en) * 2013-02-27 2013-05-22 山东大学 Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
CN103491129A (en) * 2013-07-05 2014-01-01 华为技术有限公司 Service node configuration method and service node pool logger and system
CN108391406A (en) * 2018-04-18 2018-08-10 深圳市晓控通信科技有限公司 A kind of heat radiating type network cabinet of the easy access based on Internet of Things
CN109951981A (en) * 2019-04-22 2019-06-28 彭伶铭 A kind of control cabinet with anti-theft function
WO2020108320A1 (en) * 2018-11-28 2020-06-04 苏州墨仁光电科技有限公司 Power supply of transmission line foreign matter laser-clearing instrument
CN211297314U (en) * 2020-01-09 2020-08-18 河南杨金高科技创业园发展有限公司 Network information safety management device
CN212208080U (en) * 2020-05-11 2020-12-22 晋中学院 Portable computer network safety controller
CN112234553A (en) * 2020-12-14 2021-01-15 烟台工程职业技术学院(烟台市技师学院) Locking equipment convenient to maintenance
CN112599995A (en) * 2021-01-27 2021-04-02 杭州云蕊电子商务有限公司 Self-locking connecting device for fire-proof power supply line
CN112911849A (en) * 2020-12-28 2021-06-04 上海郡雅生物科技有限公司 5G communication and information storage device based on industrial internet and use system thereof

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753462A (en) * 2010-01-19 2010-06-23 中国人民解放军信息工程大学 Method and device for realizing multi-next-hop routes
CN103118412A (en) * 2013-02-27 2013-05-22 山东大学 Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
CN103491129A (en) * 2013-07-05 2014-01-01 华为技术有限公司 Service node configuration method and service node pool logger and system
CN108391406A (en) * 2018-04-18 2018-08-10 深圳市晓控通信科技有限公司 A kind of heat radiating type network cabinet of the easy access based on Internet of Things
WO2020108320A1 (en) * 2018-11-28 2020-06-04 苏州墨仁光电科技有限公司 Power supply of transmission line foreign matter laser-clearing instrument
CN109951981A (en) * 2019-04-22 2019-06-28 彭伶铭 A kind of control cabinet with anti-theft function
CN211297314U (en) * 2020-01-09 2020-08-18 河南杨金高科技创业园发展有限公司 Network information safety management device
CN212208080U (en) * 2020-05-11 2020-12-22 晋中学院 Portable computer network safety controller
CN112234553A (en) * 2020-12-14 2021-01-15 烟台工程职业技术学院(烟台市技师学院) Locking equipment convenient to maintenance
CN112911849A (en) * 2020-12-28 2021-06-04 上海郡雅生物科技有限公司 5G communication and information storage device based on industrial internet and use system thereof
CN112599995A (en) * 2021-01-27 2021-04-02 杭州云蕊电子商务有限公司 Self-locking connecting device for fire-proof power supply line

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
KUI SUN: "Flexible Catch Claw-type Space Debris Capture Mechanism Based on Constant Torque Spring Deployment", 2020 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION(ICMA), pages 683 - 687 *
巩凤芝: "自卸汽车后板锁紧机构剖析", 中国新科技新产品, pages 50 - 51 *
豆琼森;侯永涛;李文龙;赵连星;: "一种液压汽车减震弹簧的拆装工具的设计", no. 14 *

Also Published As

Publication number Publication date
CN113692180B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
US9019911B2 (en) System and method for centralized station management
Aggarwal et al. Securing IoT devices using SDN and edge computing
EP1705863A1 (en) Method and apparatus for traffic control of dynamic denial of service attacks within a communications network
US11425152B2 (en) Physical and network security system and mehtods
CA2586034A1 (en) Service processor gateway system and appliance
Singh et al. Study of cyber attacks on cyber-physical system
Zhou et al. Evolving defense mechanism for future network security
JP4581104B2 (en) Network security system
CN105610874A (en) Local area network security management system
CN113692180A (en) Network information safety management device
KR101006372B1 (en) System and method for sifting out the malicious traffic
Oo et al. Effective detection and mitigation of SYN flooding attack in SDN
KR20140078329A (en) Method and apparatus for defensing local network attacks
GB2406746A (en) Responding to Network intrusions
Ali et al. Security at the Internet of Things
Adil et al. Ai-driven eec for healthcare iot: Security challenges and future research directions
CN109101093A (en) A kind of deashing dust-extraction unit for main frame
CN109104725B (en) Method for preventing united network attack in tactical mobile ad hoc network
CN213991035U (en) Industrial Internet of things security gateway device
Yun et al. Design and Implementation of Power Network Security Protection System Based on Internet of Things
CN116991946A (en) Real-time-based data acquisition system
CN117879966A (en) Cloud platform intelligent data safety protection system and application
CN115021953B (en) Network security monitoring device
CN218630681U (en) Industrial firewall policy configuration distribution server
CN211427339U (en) Computer network information safety system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant