Cloud monitoring based network information security identification method and cloud device

A technology for network information and security identification, which is applied in the field of network information security identification based on cloud monitoring and cloud equipment, which can solve the problems of insufficient security monitoring and inability to fully and effectively protect user security, and achieve diverse security identification objects Security, comprehensive network security monitoring, and the effect of protecting security

Active Publication Date: 2014-06-25
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the existing network security monitoring is not comprehensive en

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud monitoring based network information security identification method and cloud device
  • Cloud monitoring based network information security identification method and cloud device
  • Cloud monitoring based network information security identification method and cloud device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0053] like figure 1 As shown in FIG. 1 , it is a schematic flowchart of a cloud monitoring-based network information security authentication method provided by Embodiment 1 of the present invention. The execution subject of the method described in Embodiment 1 may be a cloud device (also called a cloud server or a cloud scanning and killing serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud monitoring based network information security identification method and a cloud device. The method comprises that the cloud device receives security identification requirements carrying network information and client identification, which are uploaded by a client; the cloud device inquires whether the client identification is in a preset identification blacklist; the cloud device feeds back to the client that the identification result is safe false identification information if the client identification is in the preset identification blacklist; the cloud device performs safety identification on the network information and feeds back the identification result to the client if the client identification is not in the preset identification blacklist. According to the method and the cloud device, false identification information is fed back to the client in the preset identification blacklist, so that hackers of the client think that the uploaded malicious network information safety identification result is safe, the problem that identification determination missing of malicious network information of the cloud device caused by the fact that the hackers bypass the cloud device safety identification method in the prior art can be effectively solved, and the determination missing rate of malicious network information is reduced.

Description

technical field [0001] The invention relates to the field of network security, in particular to a cloud monitoring-based network information security identification method and cloud equipment. Background technique [0002] A malicious program (commonly called a virus) is any program deliberately created to perform unauthorized and often harmful actions. Malicious programs include: computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses, Trojan horses, crimeware, spyware, and adware. Malicious websites are illegal websites with viruses, worms and Trojan horses that intentionally perform malicious tasks on a computer system. Malicious websites usually have a common feature. They are usually in the form of a certain web page that allows people to browse the content of the page normally, and at the same time illegally obtain various data in the user's computer. Malicious website is exactly a piece of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 魏自立杨康
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products