Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A comprehensive monitoring system and method for illegal outreach

A comprehensive monitoring system and outreach technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to monitor off-network outreach, weak real-time performance, complex program structure, etc., and achieve the effect of avoiding monitoring and illegal access to the Internet

Active Publication Date: 2021-12-21
中国人民解放军63891部队
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Intranet sending packet detection mode cannot monitor off-network and outreach behaviors
The program structure of the currently public client monitoring solution is relatively complex, the real-time performance is weak, and it cannot solve the problem of external connection after bypassing the monitoring by modifying the IP address, MAC address and closing the monitoring client.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A comprehensive monitoring system and method for illegal outreach
  • A comprehensive monitoring system and method for illegal outreach

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides a comprehensive monitoring system for illegal outreach, including an intranet support and guarantee platform, a monitoring client service module, and an extranet detector;

[0037] Described intranet support guarantee platform is used for storing the binding information between the model of monitored intranet computer, IP address and MAC address, configures the monitoring strategy of monitoring client service module and will monitor strategy through intranet and corresponding The monitoring client service module synchronizes, and receives and manages alarm information; the monitoring strategy includes the length of interval between each monitoring, the legal IP address and MAC address of the intranet computer where the monitoring client service module is located, and external network detection address of the device;

[0038] The monitoring client service module is installed in the monitored intranet computer, and is used to try to connect to the...

Embodiment 2

[0044]This embodiment provides a method for comprehensive monitoring, blocking and warning of illegal outreach by using the system described in Embodiment 1, such as figure 1 shown, including the following steps:

[0045] S1. Install a monitoring client service module on the monitored intranet computer, install an external network detector on the Internet server, and deploy an intranet support guarantee platform on the intranet;

[0046] S2, storing the binding information between the models, IP addresses and MAC addresses of all monitored intranet computers in the intranet support guarantee platform;

[0047] S3, configure the monitoring strategy of each monitoring client service module in the intranet support guarantee platform, and the monitoring strategy is synchronized with the corresponding monitoring client service module through the intranet; the monitoring strategy includes the duration of the interval between each monitoring , the address of the external network det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal outreach comprehensive monitoring system and a method thereof. The system mainly includes an internal network support guarantee platform, a monitoring client service module, and an external network detector; in the method, the monitoring client service module and the external network detector are used With the illegal outreach monitoring technology, real-time monitoring of the illegal outreach behavior of intranet computers can be completely unaffected by the way of accessing the Internet; the method of monitoring IP address and MAC address modification solves the problem of users modifying IP and MAC addresses Access to the Internet leads to inaccurate alarm information; the use of master-slave process protection technology prevents intranet users from shutting down the process of monitoring the client service module, effectively avoiding behaviors that evade monitoring and illegal access to the Internet.

Description

technical field [0001] The invention relates to the field of computer network information security, in particular to a system and method for preventing illegal outreach of intranet computers. Background technique [0002] At present, the daily office work of party and government agencies, military departments, and enterprises has introduced an information-based and networked office model. In order to ensure the effectiveness and security of information sharing at the same time, these departments have established their own internal networks, using physical isolation from the Internet to prevent information leakage and block attacks from the Internet. However, due to reasons such as low security awareness of intranet users and lax implementation of the management system, it often happens that intranet users intentionally or unintentionally conduct illegal outreach, such as connecting to the Internet through a wireless network card through Wifi, using a USB network card to acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/30H04L63/108H04L67/025H04L67/1095
Inventor 黄志英刘强关卿介玺齐伟伟
Owner 中国人民解放军63891部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products