Network security monitoring method, computer equipment and computer readable storage medium

A network security and network application technology, which is applied in the field of computer network information security, can solve problems such as information leakage, and achieve the effect of reducing harm

Active Publication Date: 2020-05-08
SURFILTER NETWORK TECH +1
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a network security monitoring method, computer equipment and computer-readable storage medium to solve or partially solve the problem in the prior art that it is difficult to completely eliminate intentional or unintentional network information leakage from the outside and inside, resulting in information leakage technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method, computer equipment and computer readable storage medium
  • Network security monitoring method, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0070] refer to figure 1 , figure 1 It is a schematic flowchart of an embodiment of the network security monitoring method of the present invention. In one embodiment, the network security monitoring method includes:

[0071] Step S10, detecting whether there is a network information leakage event, and the network information leakage event includes any of the following:

[0072] Shared network events, unauthorized outreach event...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security monitoring method, computer equipment and a computer readable storage medium. Whether a shared network event, an unauthorized external connection event, an unauthorized internal connection event, an information leakage event based on a simple mail transmission protocol, an information leakage event based on a file transmission type network application andan information leakage event based on a document sharing type network application exist or not is detected, thus the network information leakage event recognition mode and method are perfected, the detected network information leakage events are notified to a network security management terminal, a user of the network security management terminal can process the network information leakage eventsin time, and harm caused by information leakage is reduced.

Description

technical field [0001] The present application relates to the technical field of computer network information security, in particular to a network security monitoring method, computer equipment and a computer-readable storage medium. Background technique [0002] With the rapid development of network technologies such as cloud computing, mobile Internet, and Internet of Things, the network connections between people and people, people and things, and things and things are growing explosively. Enterprises, governments, education, medical care, scientific research institutes and other industries are in full swing to promote Internet and mobile. From IoT security systems to collaborative office and IT systems that support business operations are generally interconnected, which means that every connection to this complex Individuals in network facilities are transmitting and recording important information and data. The two sides of things determine that while information shari...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20
Inventor 张天奇黄吉星陈浪刘永强周勇林沈智杰景晓军
Owner SURFILTER NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products