Key information infrastructure abnormity monitoring method and device

A technology of infrastructure and key information, applied in the field of network security, can solve problems such as lack of supervision methods

Pending Publication Date: 2021-10-19
EVERSEC BEIJING TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, for the management of key information infrastructure, the way of certification license is usually adopted, that is, the affiliated unit of each key information infrastructure goes to the relevant regulatory agency for product filing and certif

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key information infrastructure abnormity monitoring method and device
  • Key information infrastructure abnormity monitoring method and device
  • Key information infrastructure abnormity monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Figure 1B It is a flow chart of the abnormality monitoring method for critical information infrastructure provided by Embodiment 1 of the present invention. This embodiment is applicable to monitoring the operating system connected to the key information infrastructure of the machine, and / or whether there is a dynamic operation abnormality in the operating system of the machine. To perform, the device can be implemented by hardware and / or software, and integrated in electronic equipment, typically, can be integrated in the core switch of the internal local area network, the method specifically includes the following steps:

[0028] S110. Determine whether the target operating system is a loadable operating system according to the list of loadable operating systems; wherein, the target operating system includes an operating system that accesses the key information infrastructure of the machine and / or a local operating system.

[0029] The loadable operating system is p...

Embodiment 2

[0043] figure 2 The structural block diagram of the abnormality monitoring device for key information infrastructure provided by Embodiment 2 of the present invention, which can be realized by hardware and / or software, specifically includes: a loadable operating system judging module 210, and a real-time monitoring execution module 220 and a dynamic anomaly monitoring module 230.

[0044] The loadable operating system judging module 210 is used to judge whether the target operating system is a loadable operating system according to the list of loadable operating systems; wherein, the target operating system includes an operating system and / or access to the key information infrastructure of the machine or the native operating system;

[0045] The real-time monitoring execution module 220 is configured to monitor the dynamic running information of the target operating system in real time if it is determined that the target operating system is a loadable operating system; where...

Embodiment 3

[0062] image 3 It is a schematic structural diagram of an electronic device provided by Embodiment 3 of the present invention. image 3 A block diagram of an exemplary electronic device 12 suitable for use in implementing embodiments of the invention is shown. image 3 The electronic device 12 shown is only an example, and should not limit the functions and scope of use of the embodiments of the present invention.

[0063] Such as image 3 As shown, electronic device 12 takes the form of a general-purpose computing device. Components of electronic device 12 may include, but are not limited to, one or more processors or processing units 16, system memory 28, bus 18 connecting various system components including system memory 28 and processing unit 16.

[0064]Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a key information infrastructure abnormity monitoring method and device, electronic equipment and a storage medium, and the method comprises the steps: judging whether a target operating system is a loadable operating system or not according to a loadable operating system list, wherein the target operating system comprises an operating system accessing a key information infrastructure of a local machine and/or a local operating system; if yes, monitoring the dynamic operation information of the target operation system in real time, wherein the dynamic operation information comprises subject information, object information, behavior information and/or environment information; and if it is monitored that the dynamic operation information of the target operating system is abnormal, sending a dynamic operation alarm to a supervision server of a supervision mechanism. According to the technical scheme provided by the embodiment of the invention, the dynamic operation information in the key information infrastructure is effectively monitored, and meanwhile, the communication connection with the supervision server of the supervision mechanism is established, so that the supervision mechanism can obtain the abnormal state of each key information infrastructure in time.

Description

technical field [0001] Embodiments of the present invention relate to the field of network security, and in particular, to a method, device, electronic device and storage medium for abnormality monitoring of critical information infrastructure. Background technique [0002] Key information infrastructure is an information system or industrial control system that provides network information services to the public or supports the operation of important industries such as energy, communications, finance, transportation, and public utilities. As an important information infrastructure, once it is damaged or interrupted, it will It has a serious impact on important social functions. Therefore, abnormal monitoring of critical information infrastructure has important social significance. [0003] In the existing technology, for the management of key information infrastructure, the way of certification license is usually adopted, that is, the affiliated unit of each key information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/07
CPCG06F11/0751
Inventor 刘志强王方圆尚程阿曼太梁彧蔡琳杨满智王杰田野金红陈晓光傅强
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products