Network security defense disposing system

A network security and disposal system technology, applied in transmission systems, electrical components, etc., can solve problems such as hidden dangers in network security, and achieve the effect of ensuring safety and preventing dangerous situations

Inactive Publication Date: 2017-07-21
北京金钻芯科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a network security defense and disposal system, which overcomes the problem of relatively large hidden dangers in network security in the prior art, and realizes the defense and disposal of network threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security defense disposing system
  • Network security defense disposing system
  • Network security defense disposing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0034] In the present invention, unless stated otherwise, the used orientation words such as "up, down, left, right" usually refer to figure 1 Up and down and left and right are shown. "Inner and outer" refer to the inner and outer on the specific outline. "Far and near" refer to far and near relative to a certain component.

[0035] The present invention provides a network security defense disposal system, the network security defense disposal system includes: a data collection terminal, a security assessment module and a disposal module; wherein, the data collection terminal collects network events, system operation data and equipment operation data , to ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security defense disposing system. The system comprises a data acquisition end, a safety evaluation module and a disposing module, wherein the data acquisition end is used for acquiring a network event, system running data and equipment operation data so as to obtain original data; the security evaluation module is configured to connected with the data acquisition end so as to normalize multivariate data of the network event, the system running data and the equipment operation data, and performing security evaluation to obtain an evaluation weight and an evaluation level; the disposing module is configured to connect with the security evaluation module so as to perform the security disposing according to the evaluation level. The network security defense disposing system overcomes a problem that the network security has great hidden danger in the prior art, and the defense and the disposing of the network threat are realized.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network security defense and disposal system. Background technique [0002] With the development of network technology and the popularization of hacker attack technology, the threats faced by the network are increasing day by day. Although network devices are equipped with security protection facilities such as firewalls and intrusion detection systems, there will still be some network threat events that escape the security protection facilities and threaten the network. For these network threat events that escape the security protection facilities, users cannot find them in time, nor can they deal with them in a timely manner, resulting in a high degree of network threat to users and great potential safety hazards. Network threat events are events that affect network security. , For example: denial of service, worm outbreak, server penetration, brute force cr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 邱亮伍颜晖鲁瑞瑞
Owner 北京金钻芯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products