Security system for computer network

A computer network and security system technology, applied in the field of computer network security systems, can solve the problems of inability to adapt, prevent suspicious intruders and the rapid and widespread spread of viruses, so as to ensure normal supply, improve network immunity, and effectively control hazards. range effect

Inactive Publication Date: 2016-03-23
XIAN UNIV OF SCI & TECH
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Firstly, the method of centralized control seems powerless for the current distributed network environment; secondly, the network has isomorphism, which cannot prev

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system for computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] Such as figure 1 As shown, the embodiment of the present invention provides a computer network security system, including a host, a virtual switch, a core physical switch and a bypass firewall, the host is connected to the virtual switch through a virtual network card, and the virtual switch is connected to the core physical switch through a trunk channel , one output end of the core physical switch is connected to the server through an optical fiber, and the other end is connected to the trust interface of the bypass firewall through a trunk channel, and the untrust interface of the bypass firewall is connected to the server through an o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security system for a computer network. The security system comprises a host, a virtual switch, a core physical switch and a bypass firewall, wherein encryption modules are respectively arranged in the host and the virtual switch; an identity verification module is also arranged in the virtual switch; a key of each encryption module is updated once at each access; the security system further comprises a virus characteristic matching module, a port audit module, a traffic statistics module, a network anomaly assessment module, a virus isolation module, an emergency channel module, a restoration module and a data isolation uploading module, According to the security system, the network traffic is monitored and audited, so that the network is maintained in good condition; through analysis and memory of an unknown invasion behavior, the network immunocompetence is improved; the key is updated once at each access, so that the security of the network is further improved, and meanwhile, the system has data protection capability, so that a condition that a user is away from a computer to cause information loss is also avoided.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a security system for computer networks. Background technique [0002] With the rapid development of computer technology and network, computer has become an indispensable tool in people's work, study and life. Similarly, the development of computer networks has also brought hidden dangers to the security of users' computer information. Network information theft, information attacks, virus transmission, etc. exist and occur all the time. [0003] Network security is a key issue that has been studied in the field of computer network and its application. However, the traditional network security theory and technology have the following three insurmountable defects. Firstly, the method of centralized control seems powerless for the current distributed network environment; secondly, the network has isomorphism, which cannot prevent suspicious intruders and viruses from spreading rapi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/08H04L63/14
Inventor 冯健史丹丹南天柱
Owner XIAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products