Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Implementation method of security event monitoring in security center system

A security center, security event technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of asynchronous monitoring, information blockage, information cannot be shared, etc., to achieve the effect of broad application prospects

Inactive Publication Date: 2009-12-16
网经科技(苏州)有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Because the traditional information security management is a terminal device, one device can only manage the specified network segment, and the security policy is set by the local administrator, so the information is relatively blocked. For multiple monitoring devices, the information cannot be shared, and human resources are seriously wasted. If it is not synchronized, there will be serious information security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of security event monitoring in security center system
  • Implementation method of security event monitoring in security center system
  • Implementation method of security event monitoring in security center system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The implementation method of security event monitoring in the security center system uses SOCKET to realize the server / client two-way connection technology, and the processing of data services is divided into two categories: the server issues security policies, and the client receives security policies from the server. Report the local security policy to the server. When the terminal triggers a security event, it will report the triggered security event in real time.

[0027] The design framework of the distributed network behavior real-time monitoring system based on the B / S model, the monitoring equipment reports security events to the security center in real time, the security center issues security policies to the monitoring equipment, and the security center analyzes the security events and notifies the relevant management personnel. Multiple monitoring devices are connected to the security center, and the security event monitoring is divided into two parts. One is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a design framework of a distributed network behavior real time monitoring system based on a B / S model in which a plurality of monitoring devices are connected with a security center, the security event monitoring is divided into two parts, and the security center is configured with security strategy which is issued to the monitoring devices and self-defines an alarm manner; the monitoring devices monitor the network behavior of a user in real time, and security event and local security strategy are submitted to the security center in real time; the security center analyzes the security event and informs a manager in a mail / short message way so as to realize the real time monitoring of the network behavior of the user. The invention adopts a remote communication way to realize the management of the security center on the monitoring devices, and collectedly manage the security event of the monitoring devices, thus realizing the security event monitoring of the security center on the plural monitoring devices.

Description

technical field [0001] The invention relates to a method for analyzing and processing network data, in particular to a method for realizing security event monitoring, and belongs to the technical field of network management systems. Background technique [0002] With the rapid development of the Internet, there are more and more network applications, and some key services of most enterprises are also provided through the Internet. A major feature of the Internet is its openness, which poses a serious threat to the security of services on the Internet. In order to ensure healthy and orderly development, it is necessary to provide a strong guarantee on network security. [0003] Because the traditional information security management is a terminal device, one device can only manage the specified network segment, and the security policy is set by the local administrator, so the information is relatively blocked. For multiple monitoring devices, the information cannot be shared...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06H04W4/12
Inventor 党俭文孙希律刘继明
Owner 网经科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products