Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security inspection tour system and inspection tour method

A network security and patrol inspection system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of fewer monitoring personnel, more security equipment, and low efficiency in troubleshooting hidden dangers and loopholes, so as to eliminate unnecessary interference Effect

Inactive Publication Date: 2019-04-16
国网陕西省电力公司信息通信公司
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network security personnel are faced with problems such as a large number of security devices, few monitoring personnel, a high rate of device false alarms, and low efficiency in troubleshooting hidden dangers and loopholes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security inspection tour system and inspection tour method
  • Network security inspection tour system and inspection tour method
  • Network security inspection tour system and inspection tour method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] refer to figure 1 , shows a structural block diagram of a network security inspection system 100 in an embodiment of the present invention. The system 100 includes a ledger establishment module 110, a network security device monitoring information acquisition module 120, a device judgment module 130, a scanning module 140, a port detection module 150, a management personnel determination module 160 and a patrol information sending module 170;

[0051] In specific applications, the embodiments of the present invention can be applied to the network security management of enterprises and institutions, and can also be applied to other network systems that require network security management, and the embodiments of the present invention do not limit the specific applications.

[0052] The ledger information base building module 110 is used to build the ledger information base.

[0053] In the embodiment of the present invention, the ledger information database includes the ...

Embodiment 2

[0076] refer to figure 2 , shows a structural block diagram of a network security inspection system 200 in an embodiment of the present invention. The system 200 includes a ledger establishment module 210, a network security device monitoring information acquisition module 220, a secondary filtering module 230, a device judgment module 240, a scanning module 250, a port detection module 260, a management personnel determination module 270, and a patrol information sending module. module 170 and security processing module 290;

[0077] Ledger information base building module 210, used to set up ledger information base;

[0078] In the embodiment of the present invention, the ledger information base includes the device IP ledger and the device port ledger; the device IP ledger includes: the device IP address, the device name, the address segment to which the device IP address belongs, the device IP The area of ​​the device, the physical location of the device IP deployment, t...

Embodiment 3

[0126] refer to image 3 , shows a structural diagram of a network security inspection system in an embodiment of the present invention. The system first establishes the initial ledger library in the database: using the sorting script compiled by the embodiment of the present invention, according to the format of the database table, sort out the non-standard format in the equipment ledger and port ledger sorted out manually into a standardized format. Secondly, update and supplement the initial ledger database by means of data collection. The data collection includes collecting device or / and port information detected by each network security device and server, terminal and network device information collected by network scanning tools. Device information or / and port information. Specifically: use the collected device information or / and port information as keywords, perform device or / and port fingerprint identification in the device or / and port fingerprint database, and ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security inspection tour system and inspection tour method. The system includes a machine account information library establishment module, a network security equipment detection information acquiring module, an equipment determining module, a scanning module, a port detection module, a manager determining module and an inspection tour information sending module. Through integrating information of monitoring of deployed security equipment and information of autonomic scanning as mutual complementing, the system comprehensively monitors security hidden troublesand external attack information of network and information systems; and carries out secondary filtering of hidden trouble vulnerability and the attack information at the same time, can quickly locatevalid security alarming information and vulnerability information, and can eliminate unnecessary interference. The system adopts a timed task inspection tour, and automatically outputs a result; and regularly and automatically uses high-risk port information, existing vulnerability ports and other information to form a statistical report form, and automatically sends the same to a manager througha manner of a short message, WeChat or a mail.

Description

technical field [0001] The invention relates to the technical field of software, in particular to a network security inspection system and inspection method. Background technique [0002] With the increase of information network assets, there are more and more hidden dangers and loopholes in the network and information systems, and more and more attacks. Many enterprises have deployed a large number of network security equipment and systems to detect hidden dangers and loopholes and monitor external attacks. Network security personnel are faced with problems such as a large number of security devices, few monitoring personnel, a high rate of device false alarms, and low efficiency in troubleshooting hidden dangers and vulnerabilities. Contents of the invention [0003] The present invention provides a network security inspection system, the system comprising: [0004] The ledger information base building module is used to build the ledger information base; [0005] The n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/0245H04L63/1416H04L63/1433H04L63/1466
Inventor 苏江郭云涛刘莹赵永柱房涛胡鑫裴瑛慧陈刚杨启龙苏晗王晓明任晓龙杨海文刘圣龙李祉岐牛德玲
Owner 国网陕西省电力公司信息通信公司