Monitoring system and method for monitoring computer network security

A technology of computer network and monitoring system, which is applied in the field of computer network to achieve the effect of high practicability, safety and comprehensive protection

Pending Publication Date: 2020-06-19
SHANDONG VOCATIONAL COLLEGE OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it will inevitably attract various human attacks from all over the world. In recent years, computer network security issues have attracted increasing attention. A monitoring computer network security monitoring system is needed to ensure computer network security and prevent criminals from using the network unreasonably.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them.

[0020] A monitoring system for monitoring computer network security, comprising: a safety monitoring module, an anomaly analysis module, a monitoring processing module, and a computer, wherein the computer is electrically connected to the safety monitoring module, the anomaly analysis module, and a monitoring terminal module in turn, and the computer There is a camera module on it,

[0021] The safety monitoring module is used to monitor and count network traffic, monitor and count online behavior, monitor and count access to confidential information or access to mobile hard disk interfaces;

[0022] The abnormal analysis module is used to analyze whether the network traffic is abnormal, analyze whether there is an online behavior that aff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a monitoring system and method for monitoring computer network security. The system comprises a security monitoring module, an exception analysis module, a monitoring processing module, a computer and a security monitoring module, and is used for monitoring and counting network traffic, monitoring and counting internet surfing behaviors and monitoring and counting access conditions of confidential information or mobile hard disk interface access conditions; the exception analysis module is used for analyzing whether the network flow is exceptional or not, analyzing whether Internet surfing behaviors influencing the network environment exist or not, and analyzing whether access to confidential information or access to a mobile hard disk interface is normal access ornot; and the monitoring processing module is used for determining network flow, internet surfing behaviors and confidential information or a management and control scheme of a mobile hard disk interface according to a result obtained by analysis of the anomaly analysis module. According to the invention, the network flow, the internet surfing behavior, the confidential information access or the mobile hard disk interface access are monitored at the same time, the comprehensive protection of the computer network security is achieved, and the practicability is very high.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a monitoring system and method for monitoring computer network security. Background technique [0002] Computer network refers to the connection of multiple computers with independent functions in different geographical locations and their external devices through communication lines, and realizes resource sharing and information sharing under the management and coordination of network operating systems, network management software and network communication protocols. delivered computer system. [0003] With the rapid development of computer technology, computer networks have become an important guarantee for social development, and a lot of them are sensitive information, even state secrets. Therefore, it will inevitably attract various human attacks from all over the world. In recent years, computer network security issues have increasingly attracted people's attenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/81G06F21/78
CPCG06F21/78G06F21/81H04L63/1425
Inventor 马晓刚
Owner SHANDONG VOCATIONAL COLLEGE OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products