A device for network topology troubleshooting

A network topology and network security technology, which is applied in the field of network security and can solve the problems of generating illegal outreach of business systems, breaking through the defense line of physical isolation, and generating hidden dangers of information security of business systems.

Active Publication Date: 2018-07-03
GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to management and technical reasons, various illegal outreach occurred in the business generation system, and the system was connected to the office network or even the Internet across security domains. Serious information security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device for network topology troubleshooting
  • A device for network topology troubleshooting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The purpose of the present invention is to provide a device for network topology troubleshooting. The device of the present invention can quickly and effectively ascertain the network connection status of the information system, automatically generate a topological map of the system that is true and consistent with the system's operating conditions, effectively discover illegal outreach in the information system, and assist operation and maintenance personnel and inspection personnel Quickly locate and eliminate system security risks to ensure the security of information systems.

[0029] The network topology investigation device mainly includes the following seven modules: asset import and equipment classification module, configuration acquisition and automatic analysis module, boundary definition module, equipment survivability scanning module, equipment login verification module, equipment outreach testing module, and information summary and report generation module;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of the present invention is to provide a device for network topology troubleshooting. Using this device can quickly and effectively ascertain the network connection status of the information system, automatically generate a real topological map of the system that is consistent with the system's operating conditions, effectively discover illegal outreach in the information system, and assist operation and maintenance personnel and testers to quickly Locating and eliminating system security risks to ensure the security of information systems. The steps of the network topology investigation process performed by the device of the present invention include asset import and equipment classification, configuration acquisition and automatic analysis, boundary definition, equipment survivability scanning, equipment login verification, equipment outreach testing, information summary and report generation. The device of the present invention includes an asset import and equipment classification module, a configuration acquisition and automatic analysis module, a boundary definition module, a device survivability scanning module, a device login verification module, a device outreach test module, and an information summary and report generation module.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a device for checking network topology. Background technique [0002] In recent years, network security issues have become increasingly prominent, and hacker intrusions and network attacks are increasing. With the continuous popularization of computer network technology, the public uses computers more and more. In particular, the construction of public information infrastructure has promoted government and enterprise Increasingly relying on various information systems, some businesses and systems related to the national economy and the people’s livelihood have encountered unprecedented security challenges, such as the WikiLeaks website leaking a large amount of government confidential information; The website was attacked and the information of more than 6 million users was leaked. These accidents fully illustrate the importance of network security to countries, governm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/28H04L29/06
Inventor 梁智强胡朝辉黄曙江泽鑫陈炯聪林丹生伍晓泉胡海生
Owner GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products