Network topology checking method and system thereof

A technology of network topology and information system, applied in the field of network topology investigation method and system thereof, can solve problems such as breakthrough of physical isolation defense line, generation of hidden dangers of information security of business system, generation of illegal outreach of business system, etc.

Active Publication Date: 2016-03-30
GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to management and technical reasons, various illegal outreach occurred in the business generation system, and...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network topology checking method and system thereof
  • Network topology checking method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In the actual operation process, the specific implementation method is as follows:

[0046] 1) The system administrator provides the initial information system asset list of the information system (including the account information of the device, and the user name and password information of the device), and provides the preliminary information system asset list to Network topology checking software or network topology checking device or network topology checking system;

[0047] 2) Network topology checking software or network topology checking device or network topology checking system divides the preliminary information system asset list provided by the information system into three categories: network equipment, network security equipment and host.

[0048] 3) The network topology checking software or network topology checking device or network topology checking system obtains the configuration of network equipment and network security equipment. The way of transmi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network topology checking method and a system thereof. Based on the method and the system, the network connection condition of an information system can be effectively and quickly ascertained. Meanwhile, a real topological graph that is consistent with the operation condition of the system is automatically generated. Moreover, the illegal dial-up condition of the information system is effectively found out. Operation, maintenance and test staffs are facilitated to quickly locating a potential safety hazard of the system so as to ensure the security of the information system. The method comprises the steps of asset importation, equipment classification, configuration acquisition and automatic parsing, boundary definition, equipment viability scanning, equipment login verification, equipment external connection status test, information summarizing and report generation. The system comprises an asset importing and equipment classifying module, a configuration acquiring and automatic parsing module, a boundary defining module, an equipment viability scanning module, an equipment login verifying module, an equipment external connection status testing module, and an information summarizing and report generating module.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network topology checking method and system thereof. Background technique [0002] In recent years, network security issues have become increasingly prominent, and hacker intrusions and network attacks are increasing. With the continuous popularization of computer network technology, the public uses computers more and more. In particular, the construction of public information infrastructure has promoted government and enterprise Increasingly relying on various information systems, some businesses and systems related to the national economy and the people’s livelihood have encountered unprecedented security challenges, such as the WikiLeaks website leaking a large amount of government confidential information; The website was attacked and the information of more than 6 million users was leaked. These accidents fully illustrate the importance of network security to cou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/12H04L41/14H04L63/02
Inventor 胡朝辉梁智强江泽鑫林丹生黄曙陈炯聪李闯伍晓泉
Owner GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products