Network security protection method and system

A technology of network security and protection system, applied in the field of network security protection methods and systems, can solve the problems of unable to verify the communication data between CTC and TSRS, not deploying information security protection means, affecting the security of CTCS system, etc., to achieve high reliability Sexuality, low cost, and the effect of maintaining stability

Active Publication Date: 2022-04-26
CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the absence of network security protection, it is impossible to verify the communication data between CTC and TSRS. Without control, if the CTC end initiates malicious communication behaviors to the TSRS end, TSRS will be attacked, thereby affecting the entire CTCS system security
For the CTC-TSRS interface data, there are currently two situations: 1. No information security protection measures are deployed; 2. A firewall is connected in series between the TSTS interface server (belonging to the CTC system) and the TSRS host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and system
  • Network security protection method and system
  • Network security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0040] The embodiment of the present invention provides a network security protection method, figure 1 A schematic flowchart of a network security protection method in an embodiment of the present invention is shown, figure 1 , the method includes:

[0041] Determine the configuration policy routing and network security protection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security protection method and system. The method comprises the following steps: determining configuration strategy routing and network security protection rules of a switch and a firewall; the firewall is connected to the switch according to the configuration strategy route and the network security protection rule, a bypass is deployed between the switch and the router, network security protection is achieved, and by means of the information security protection mode, the network security level of the TSRS can be improved with low cost and high reliability. When the firewall function is normal, CTC communication is effectively verified, and network security protection is carried out; and when the firewall fails, the communication continuity of the original system is not influenced. The hardware cost is reduced, the probability of hardware faults can be reduced, and the stability of an original system can be maintained.

Description

technical field [0001] The invention belongs to the technical field of information security, and particularly relates to a network security protection method and system. Background technique [0002] In recent years, with the increase in dependence on the Internet, cyberspace has increasingly developed into the fifth largest sovereign space after land, sea, air, and sky, and has become an important strategic space for countries to compete for. At present, all countries have taken various measures to continuously seek to enhance their cyber defense and confrontation capabilities, and the situation of cyberspace confrontation has continued to intensify. [0003] The Chinese Train Control System (CTCS) was born and developed to improve the efficiency of train operation and ensure the safe operation of trains. It also involves many professional technologies such as railway transportation, railway signal and automatic control, and communication. Once the railway network and impo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L61/103
CPCH04L63/0263H04L63/0236H04L63/20H04L63/101H04L63/0272H04L61/103
Inventor 陈红学焦名马卫红张浩张子琪
Owner CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products