Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security operation and maintenance management system based on bastion host

An operation and maintenance management and network security technology, applied in the field of operation and maintenance management, can solve problems such as inability to judge accounts, unfavorable operation and maintenance personnel operations, affecting normal work, etc., to prevent system freezes, ensure system security, and benefit effect of operation

Active Publication Date: 2021-09-07
珠海市鸿瑞信息技术股份有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The bastion host can implement a series of functions such as account management, identity authentication, resource authorization, access control, and operation audit. The machine controls the server host, which can audit the entire operation behavior of character strings, graphics, file transfers, databases, etc.; through equipment video recording, the operation and maintenance personnel can monitor in real time various operations performed by the operation and maintenance personnel on the operating system, security equipment, network equipment, database, etc. However, due to the different habits of each operation and maintenance personnel, the operation steps are different, and the content in the operation and maintenance process is also different, so in the same scene of the bastion machine, there will be a lot of inconvenience. For example, the operation and maintenance personnel need to open many pages to search Search, two consecutive operations need to be opened on two pages, and then clicked with the interface cursor, which is not conducive to the operation of the operation and maintenance personnel, and is prone to freezes, affecting normal work
[0004] Moreover, once the user account information is stolen, the server can be controlled through the bastion host to change the host information and steal business secrets. The server cannot judge whether the account is operated by a real operation and maintenance personnel, so it cannot respond in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security operation and maintenance management system based on bastion host
  • Network security operation and maintenance management system based on bastion host
  • Network security operation and maintenance management system based on bastion host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] In this embodiment one:

[0099] The operation and maintenance personnel A is set up, and the login account is used for operation and maintenance operations;

[0100] The operation and maintenance data acquisition storage unit retrieves the log files of the operation and maintenance personnel A during the operation and maintenance operation, and regularly samples the position coordinates and sliding curves of the cursor clicked by the operation and maintenance personnel on the interface during the operation and maintenance process, records the position coordinates and samples Time, regularly sample all objects that exist in the operation and maintenance scene presented on the interface when the operation and maintenance personnel operate, read the object list; store the above data;

[0101] The operation and maintenance operation recording unit extracts the recorded operation and maintenance operation process data from the structured data storage file; the operation env...

Embodiment 2

[0106] In this second embodiment:

[0107] The system detects that the operation and maintenance personnel A has logged in, and the scene replacement unit replaces the scene;

[0108] The time management unit records the operation and maintenance personnel A in the operation and maintenance scene H 1 The operation and maintenance operation time under ;

[0109] It is found that its time is t 1 , t 2 , t 3 , t 4 , t 5 ;

[0110] where t 1 , t 2 , t 3 , t 4 , t 5 Both exceed the average operating time t 0 ;

[0111] Set N as the timeout threshold; N=3;

[0112] Therefore, it is considered that there is an abnormal situation in this operation, and the operation and maintenance security management module will issue an early warning and send relevant early warning information to the administrator terminal.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security operation and maintenance management system based on a bastion host, and belongs to the technical field of operation and maintenance management. The system comprises an operation and maintenance personnel security authentication layer, an operation and maintenance data acquisition layer, an operation and maintenance data storage, analysis and processing layer and an operation and maintenance process security management layer. The operation and maintenance personnel safety certification layer is used for carrying out safety certification login of operation and maintenance personnel; the operation and maintenance data acquisition layer is used for acquiring data in an operation and maintenance process; the operation and maintenance data storage, analysis and processing layer is used for storing, analyzing and processing data generated in an operation and maintenance process and optimizing an operation and maintenance scene; the operation and maintenance process safety management layer is used for monitoring and early warning abnormal behaviors occurring in the operation and maintenance process. According to the invention, the operation and maintenance scene can be optimized, the method is more suitable for the operation and maintenance operation of each operation and maintenance person, and safe operation and maintenance management can be carried out according to the change of the time interval in the operation and maintenance operation.

Description

technical field [0001] The invention relates to the technical field of operation and maintenance management, in particular to a network security operation and maintenance management system based on a bastion host. Background technique [0002] The bastion host is in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, various technical means are used to monitor and record the operation and maintenance personnel's attention to the servers, network equipment, and security in the network. Operational behaviors of equipment, databases and other equipment for centralized alarm, timely processing and audit determination. [0003] The bastion host can implement a series of functions such as account management, identity authentication, resource authorization, access control, and operation audit. The machine controls the server host, which can audit the entire operation behavior of character strings, gra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/20
Inventor 刘智勇陈良汉张洪峰
Owner 珠海市鸿瑞信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products