Unlock instant, AI-driven research and patent intelligence for your innovation.

Monitoring system and method for illegal access of network terminal to local area network

A technology for illegal access and network terminals, which is applied in the field of monitoring systems for network terminals illegally accessing LANs. It can solve problems such as occupying large port information and chaotic asset management of operation and maintenance personnel, and achieve accurate alarms, timely maintenance of the LAN network environment, and The effect of ensuring high efficiency

Inactive Publication Date: 2020-03-27
GUANGZHOU YUENENG INFORMATION TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When an external terminal device is connected, the operation and maintenance personnel cannot immediately perceive whether the terminal device is illegally connected. If a large number of terminal devices are connected illegally, a large amount of port information will be occupied. If the investigation is not carried out in time If it is not processed, it will cause asset management confusion to the operation and maintenance personnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring system and method for illegal access of network terminal to local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, a monitoring method for illegally accessing a local area network by a network terminal, the specific steps are:

[0032] Build a syslog log server and configure the IP address of the syslog log server;

[0033] The terminal device is connected to the LAN switch, and the switch generates corresponding log information and pushes the log information to the syslog log server;

[0034] The syslog log server saves the received log information to the MySQL database;

[0035] Configure the device information keywords that need to extract terminal devices in the syslog log server. The device information keywords include physical addresses, IP addresses and other related information;

[0036] Perform data cleaning and analysis on the log information according to the configured device information. The specific steps are:

[0037] According to the configured device information keywords, retrieve the entire log information, and extract the corresponding...

Embodiment 2

[0047] A monitoring system for network terminals illegally accessing a local area network, using a distributed deployment architecture, deploying different services on multiple servers, using a reverse proxy mechanism to ensure load balancing between servers, and effectively improving performance.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring method for illegal access of a network terminal to a local area network, and the method specifically comprises the steps: building a syslog log server, and configuring an IP address of the log server; connecting the terminal equipment to the local area network switch, and enabling the switch to generate corresponding log information and push the log informationto the log server; enabling the log server to store the received log information into a database; configuring equipment information keywords of the terminal equipment to be extracted in the log server; performing data cleaning analysis on the log information according to the configured equipment information; judging whether the access terminal equipment is illegally accessed or not according to adata analysis result; and if the accessed terminal device is an illegally accessed terminal device, generating alarm information. The invention further discloses a monitoring system for realizing themonitoring method, the illegally accessed network terminal equipment is discovered in time, the operation and maintenance personnel are helped to quickly locate the physical position information of the illegally accessed network terminal equipment, and the working efficiency is improved.

Description

technical field [0001] The invention relates to a monitoring system and a method, in particular to a monitoring system and a method for illegally accessing a local area network by a network terminal. Background technique [0002] In order to ensure the safe operation of the network information system, ensure the security of network information data, and prevent illegal outreach and intrusion on the network, referring to the requirements of the "Classified Protection" of the State Secrecy Bureau, the focus is on solving the security control of illegal access to the information system, including timely alarming of illegal access, Timely positioning and effective control. When an external terminal device is connected, the operation and maintenance personnel cannot immediately perceive whether the terminal device is illegally connected. If a large number of terminal devices are connected illegally, a large amount of port information will be occupied. If the investigation is not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L29/08
CPCH04L63/1425H04L63/20H04L63/30H04L41/06H04L67/1001
Inventor 张雪良李强潘扬桦蔡学峰黄顺
Owner GUANGZHOU YUENENG INFORMATION TECH CO LTD