Ubiquitous network topological graph construction method and network security protection method
A technology of network topology diagram and construction method, which is applied in the construction of ubiquitous network topology diagram and the field of network security protection, can solve the problems that the security and completeness of the ubiquitous Internet network cannot be guaranteed, and achieve the goal of ensuring security and completeness Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0078] At present, information system security protection methods widely used in the industry, such as PDR method, PPDR method, PDRR method, MPDRR method and WPDRRC method, etc., can cover early warning, protection, detection, response, recovery and counterattack, and realize dynamic feedback. However, the above method cannot be adapted to the ubiquitous Internet, the specific reasons are as ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


