Unlock instant, AI-driven research and patent intelligence for your innovation.

Ubiquitous network topological graph construction method and network security protection method

A technology of network topology diagram and construction method, which is applied in the construction of ubiquitous network topology diagram and the field of network security protection, can solve the problems that the security and completeness of the ubiquitous Internet network cannot be guaranteed, and achieve the goal of ensuring security and completeness Effect

Active Publication Date: 2021-12-21
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method for constructing a ubiquitous network topology map and a network security protection method, which are used to solve the problem that the security protection method in the prior art is not applicable to the ubiquitous Internet network, resulting in that the security and integrity of the ubiquitous Internet network cannot be guaranteed question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ubiquitous network topological graph construction method and network security protection method
  • Ubiquitous network topological graph construction method and network security protection method
  • Ubiquitous network topological graph construction method and network security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0078] At present, information system security protection methods widely used in the industry, such as PDR method, PPDR method, PDRR method, MPDRR method and WPDRRC method, etc., can cover early warning, protection, detection, response, recovery and counterattack, and realize dynamic feedback. However, the above method cannot be adapted to the ubiquitous Internet, the specific reasons are as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a ubiquitous network topological graph construction method and a network security protection method. The construction method comprises the following steps: determining a to-be-constructed ubiquitous internet; constructing a ubiquitous network topological graph based on atomic operation by taking communication subjects in the ubiquitous internet as nodes and taking a relationship among the communication subjects as edges; wherein the nodes comprise an end node, a collection access node and a control node; the atomic operation is used for adjusting nodes and / or edges, the atomic operation comprises at least one of intersection operation, union operation and fusion operation, and network security protection capability arrangement, deployment and management, threat disposal and network security supervision can be carried out based on the atomic operation. According to the method provided by the invention, the ubiquitous network topological graph is constructed through the universal, minimum and combinable atomic operation, so that the ubiquitous network topological graph can adapt to the large-scale and high-dynamic characteristics of the ubiquitous internet, network security protection is carried out on the basis, and the security and completeness of the network security protection are ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for constructing a ubiquitous network topology map and a method for network security protection. Background technique [0002] With the continuous development, evolution and wide application of satellite communication technology, mobile communication technology, network technology and computing technology, heterogeneous networks including the Internet, mobile Internet, Internet of Things, satellite communication network / satellite Internet, space-ground integrated network, and smart cities have been formed. An interconnected ubiquitous Internet network environment. [0003] In order to ensure network security, a security protection method that can guide the implementation of the security system is needed. Currently, information system security protection methods widely used in the industry include: PDR (Protection Detection Response, protection, detection, respo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/751H04L29/06H04L45/02
CPCH04L45/02H04L63/20
Inventor 李凤华房梁李子孚郭云川耿魁张玲翠陈操
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI