Network security inspection tour system and inspection tour method
A network security and patrol inspection system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of fewer monitoring personnel, more security equipment, and low efficiency in troubleshooting hidden dangers and loopholes, so as to eliminate unnecessary interference Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] refer to figure 1 , shows a structural block diagram of a network security inspection system 100 in an embodiment of the present invention. The system 100 includes a ledger establishment module 110, a network security device monitoring information acquisition module 120, a device judgment module 130, a scanning module 140, a port detection module 150, a management personnel determination module 160 and a patrol information sending module 170;
[0051] In specific applications, the embodiments of the present invention can be applied to the network security management of enterprises and institutions, and can also be applied to other network systems that require network security management, and the embodiments of the present invention do not limit the specific applications.
[0052] The ledger information base building module 110 is used to build the ledger information base.
[0053] In the embodiment of the present invention, the ledger information database includes the ...
Embodiment 2
[0076] refer to figure 2 , shows a structural block diagram of a network security inspection system 200 in an embodiment of the present invention. The system 200 includes a ledger establishment module 210, a network security device monitoring information acquisition module 220, a secondary filtering module 230, a device judgment module 240, a scanning module 250, a port detection module 260, a management personnel determination module 270, and a patrol information sending module. module 170 and security processing module 290;
[0077] Ledger information base building module 210, used to set up ledger information base;
[0078] In the embodiment of the present invention, the ledger information base includes the device IP ledger and the device port ledger; the device IP ledger includes: the device IP address, the device name, the address segment to which the device IP address belongs, the device IP The area of the device, the physical location of the device IP deployment, t...
Embodiment 3
[0126] refer to image 3 , shows a structural diagram of a network security inspection system in an embodiment of the present invention. The system first establishes the initial ledger library in the database: using the sorting script compiled by the embodiment of the present invention, according to the format of the database table, sort out the non-standard format in the equipment ledger and port ledger sorted out manually into a standardized format. Secondly, update and supplement the initial ledger database by means of data collection. The data collection includes collecting device or / and port information detected by each network security device and server, terminal and network device information collected by network scanning tools. Device information or / and port information. Specifically: use the collected device information or / and port information as keywords, perform device or / and port fingerprint identification in the device or / and port fingerprint database, and ident...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


