Computer network monitoring system

A technology of computer network and monitoring system, applied in the field of computer network, to achieve the effect of maintaining stable operation, ensuring smooth network, and improving network immunity

Inactive Publication Date: 2016-04-06
XIAN UNIV OF SCI & TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in these solutions, human intervention is required for the execution of attacks, anomaly detection, evaluation, and reconfiguration, and there are varying degrees of delay
Enhancements to adaptive response, recovery, and evolution for survivable systems have not been addressed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] Such as figure 1 As shown, the embodiment of the present invention provides a computer network monitoring system, including

[0033] Set up a transparent firewall between the computer and the server for analyzing and extracting scanning features and preventing external network scanning; the transparent firewall includes an entry network card, an exit network card, and a control network card arranged between the entry network card and the exit network card. A network bridge is formed between the entrance network card and the exit network card to realize transparent communication between the internal and external networks, and an IP addres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network monitoring system, and the system comprises a transparent firewall disposed between a computer and a server, a timing inspection tour module, an emergency module, a restoration module, and a data transfer module. The system achieves the monitoring and audit of network flow, maintains the good network state, improves the network immune capability through the analysis and memorizing of unknown behaviors, can effectively control the danger range after invasion, and guarantees the smooth network and normal providing of services. The system has the capability of autonomous restoration, maintains the stable operation of the network, has a capability of data protection, and also prevents information from being lost because a user is not in front of a computer.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a computer network monitoring system. Background technique [0002] With the rapid development of computer technology and network, computer has become an indispensable tool in people's work, study and life. Similarly, the development of computer networks has also brought hidden dangers to the security of users' computer information. Network information theft, information attacks, virus transmission, etc. exist and occur all the time. [0003] Network security is a key issue that has been studied in the field of computer network and its application. However, the traditional network security theory and technology have the following three insurmountable defects. Firstly, the method of centralized control seems powerless for the current distributed network environment; secondly, the network has isomorphism, which cannot prevent suspicious intruders and viruses from spreading rapidly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 冯健王雅姣田红鹏
Owner XIAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products