Security event processing system and method based on computer network information

A computer network and security event technology, applied in the field of computer network-based information security event processing systems, can solve the problems of inability to accurately determine the type of security events, complex structure, and difficulty in network security operation and maintenance.

Inactive Publication Date: 2021-02-09
YANTAI NANSHAN UNIV
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional information security event processing methods cannot accurately determine the type of security event when an information security event occurs, and cannot know the occurrence of a security event at the first time, which makes it difficult to effectively handle security events
[0003] At the same time, there are more and more potential hidden dangers and loopholes in network and information system security, and the subsequent alarm information also increases rapidly, which brings great difficulties to the company's network security operation and maintenance. There are many network devices and complex structures. A large amount of alarm information will be generated; viewing the alarm requires a large workload, which brings great work pressure to the network security operation and maintenance personnel
[0004] Through the above analysis, the existing problems and defects of the existing technology are: the existing security network information is massive, the processing complexity is high, and the processing efficiency is low, which leads to low security event analysis efficiency, cannot accurately determine the type of security event, and cannot be effectively processed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security event processing system and method based on computer network information
  • Security event processing system and method based on computer network information
  • Security event processing system and method based on computer network information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0062] Aiming at the problems existing in the prior art, the present invention provides a computer network-based information security event processing system and method. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] like figure 1 As shown, the computer network-based information security event processing system provided by the embodiment of the present invention includes:

[0064] The network monitoring module 1 is connected with the central control module 5, and is used for utilizing the network security equipment to monitor the computer network security in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer security, and discloses a security event processing system and method based on computer network information. The system comprises a network monitoring module, a data acquisition module, a data mining module, a data processing module, a central control module, an information security evaluation module, an event analysis module, an event processing module, a data storage module, an alarm module and a display module. According to the system, most invalid and repeated information in the network security information can be filtered, the information processing efficiency and the information availability are improved, and the security event analysis and processing efficiency is effectively improved; meanwhile, real-time high-speed analysisand merging processing of the security events and presetting of merging logic of the merging events can be achieved, unified management of the security events is facilitated, and the security of computer network information is greatly improved; in addition, the security events are accurately analyzed and processed, and efficient execution of a network security function is ensured.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a computer network-based information security event processing system and method. Background technique [0002] At present, with the continuous improvement of informatization, network and information security have increasingly become an important part of the network development of various organizations and institutions. Information security has been paid more and more attention by governments at all levels and various industries. Emergency response to information security incidents As the last resort of information security packaging work, it has become more and more important. In the initial stage of information security construction, network security products have begun to be widely used. Traditional information security event processing methods cannot accurately determine the type of security event when an information security event occurs, and cannot kno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1425H04L63/1433H04L63/20G06F18/23G06F18/24
Inventor 王吉昌隋晓媛房洪杰王佐兵肖富来姜启武常轩豪
Owner YANTAI NANSHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products