Method for monitoring network border security

A network boundary and security monitoring technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of inability to process and locate security events, single-handedly understand the monitoring information of users, application systems or traffic, etc.

Inactive Publication Date: 2010-03-10
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security of the network border is very important to the interconnection and intercommunication of the network. Monitoring the network border is an effective method to ensure the security of th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring network border security
  • Method for monitoring network border security
  • Method for monitoring network border security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0021] Such as figure 1 As shown, a network boundary security monitoring method, a security monitoring system is set in the network boundary between networks, and the security monitoring system includes corresponding monitoring modules for monitoring the flow, users and application systems of the network boundary, and will The monitoring module monitors the network border traffic, user and application system information for correlation analysis, and can obtain all monitoring information of network border traffic, user and application system information through one of the traffic, user or application system information.

[0022] Such as figure 2 As shown, in one embodiment of the present invention, the security monitoring system includes an app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for monitoring network border security, which monitors traffic, users and application systems of a network border respectively through a monitoring module. The information of the traffic, the users and the application systems of the network border acquired by the monitoring module is subjected to association analysis, and other monitoring information of the networkborder can be associated through information of the traffic, the users or the application systems; a relatively complete monitoring system is formed by association monitoring among the traffic, the users and the application systems of the network border; and more complete monitoring information can be acquired by associating relationships among the traffic, the users and the application systems and starting from the traffic, the users or the application systems. The method particularly has great assistance to security event processing and positioning so as to achieve aims of the invention.

Description

technical field [0001] The invention relates to a safety monitoring method, in particular to a network border safety monitoring method suitable for the field of computer information safety. Background technique [0002] At present, the traditional network management system only cares about network hardware and traffic information, while the application system itself only cares about its own business; Network information security. Therefore, the security of the network border is particularly important to the interconnection of the network. It is necessary to ensure that the external network cannot be invaded, and to prevent the leakage of internal information; moreover, while ensuring the normal interaction of services, it is also necessary to have a strict monitoring function. . [0003] The security of the network border is very important to the interconnection and intercommunication of the network. Monitoring the network border is an effective method to ensure the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L12/56
Inventor 邹翔欧阳满周国勇倪力舜朱政洪王刚尹晚成王福王佳潘志毅李欣沈寒辉袁艺芳刘欣
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products