CN109600397A - A kind of network security monitoring and managing method - Google Patents
A kind of network security monitoring and managing method Download PDFInfo
- Publication number
- CN109600397A CN109600397A CN201910076567.XA CN201910076567A CN109600397A CN 109600397 A CN109600397 A CN 109600397A CN 201910076567 A CN201910076567 A CN 201910076567A CN 109600397 A CN109600397 A CN 109600397A
- Authority
- CN
- China
- Prior art keywords
- network
- data
- access control
- access
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012544 monitoring process Methods 0.000 title abstract description 10
- 241000700605 Viruses Species 0.000 claims abstract description 16
- 238000007689 inspection Methods 0.000 claims abstract description 8
- 230000002155 anti-virotic effect Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 239000000463 material Substances 0.000 claims description 4
- 230000004888 barrier function Effects 0.000 claims description 3
- 230000008859 change Effects 0.000 claims description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims 2
- 230000002265 prevention Effects 0.000 claims 2
- 208000005374 Poisoning Diseases 0.000 claims 1
- 231100000572 poisoning Toxicity 0.000 claims 1
- 230000000607 poisoning effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 claims 1
- 230000008439 repair process Effects 0.000 claims 1
- 230000007480 spreading Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 claims 1
- 238000010606 normalization Methods 0.000 abstract description 2
- 238000001514 detection method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003612 virological effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 239000000725 suspension Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to technical field of network security, the invention discloses a kind of network security monitoring and managing methods, access control including network, the attack-defending of internet worm, the safety of data, network hole reparation and inspection and the security protection of computer, the invention is illustrated danger present on network from many aspects and proposes corresponding solution, it can preferably solve the problems, such as network security, to avoid the infringement of virus, and to being made that regulation in the method using network of user, so as to effectively improve the safety and normalization that internet uses.
Description
Technical field
The present invention relates to technical field of network security more particularly to a kind of network security monitoring and managing methods.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
Network security monitoring and managing method in the prior art is incomplete and specific, and the user without being directed to user
Formula is specifically explained, therefore is unfavorable for promoting.
Summary of the invention
The invention proposes a kind of network security monitoring and managing methods, to solve the problems mentioned in the above background technology.
The invention proposes a kind of network security monitoring and managing methods, include the following steps:
A, the access control of network: access control is the important means of Protection of Network Security and protection, its main task
It is maintenance network system security, guarantees that Internet resources are not illegally used and access very much, in technology realization, including it is following several
A part:
A1, access control: access control provides first layer access control for network access, is network access
Barrier at first, which user it, which controls, can log on to server and obtain Internet resources, control permit user-network access when
Between and permit them and network in some specific work station;
A2, resources accessing control: being the access control management to object entirety resource information, including file system
Access control (file directory access control and system access control), file attribute access control, information content access control with
And file directory access control;
The access control of A3, the network port and node: node and port in network often encrypted transmission data, these are heavy
The management of position is wanted to must be prevented from the attack that hacker starts, for managing and modifying data, it should be enough it is required that visitor provides
Prove the validator of identity;
B, the attack-defending of internet worm, specifically includes the following aspects:
B1, of unknown origin Email and file are not opened arbitrarily, not run stranger at will to your journey
Formula is similar to " Troy " class hacker formula and just needs to deceive your operation;
B2, it avoids downloading nameless software and game formula from Internet as far as possible, even if downloading from well-known website
Software also will in time with it is newest virus and wooden horse killing software software and system are scanned;
B3, password setting use alphanumeric as far as possible, and simple English or number are very easy to exhaustion, will commonly use
Password be arranged different, prevent from being found one by people, related to arrive important password, important password is most preferably often replaced;
B4, support HTML BBS on, such as discovery submit warning, referring initially to source code, it is however very well possible to be defraud of password fall into
Trap;
C, the safety of data: being carried out the transmission of data by network, need to guarantee the integrality and confidentiality of data, and
When can to data sender carry out identity verifying, specific step is as follows for realization:
C1, One-Way Encryption is done to the data of data sender first, obtains the condition code of data;
C2, encryption generation specific code M1 is carried out with the private key of sender to the condition code obtained in C1;
C3, symmetric cryptography generation M2 is carried out to the M1 and data generated in C2;
C4, finally the password of the M2 generated in C3 and symmetric cryptography encrypted using the public key of recipient, to make
It obtains the integrality confidentiality in the transmission process of data and can be protected to the verifying of sender's identity;
D, network hole reparation and inspection: periodically carrying out comprehensive loophole inspection to computer, understands computer system
In the service that opens up and port, the loophole that understands the gimmick of current hacker attack and can be utilized, hacker invades work
Tool detection, which checks, whether there is these loopholes in the computer system of oneself, discovery loophole is repaired in time;
E, the security protection of computer, including the following steps:
E1, a trustworthy antivirus software and firewall are installed in a computer, and during computer operation
Forbid privately closing firewall and antivirus software, find there is virus in computer, should the antivirus of suspension immediately, must not make
It is worked with viruliferous computer is taken, virus is avoided to spread through the internet to entire local area network;
E2, in company and enterprises so that computer be only used for writing material and utilize in-company office
Domain net carries out inquiry data, must not watch movie using network, play game, chat and speculation in stocks;
E3, the computer for carrying and preserving the important confidential information of company should be applicable in fixed online IP, without permission,
Internet must not be accessed without exception.
Preferably, after completing step C, when data reach recipient, recipient first use the private key of oneself to data into
Row decryption, is obtained the data of password and encryption, encryption data is decrypted using password, the condition code sum number encrypted
According to the public key decryptions condition code of sender, if it is possible to decrypt, then illustrate that the data are sent out by sender, it is on the contrary then not
It is finally to be compared in the specific code for calculating the condition code of data and decrypting, be capable of detecting when whether data are repaired in this way
Change.
Preferably, punishment system is carried out in company and enterprise: the employee of company and enterprise has act in violation of the stipulations
One of, below discovery three times (including three times), 200 or less place is imposed a fine, and more than three times, company will release labor with the employee for discovery
Dynamic circuit connector is same;
Preferably, during logging in website, as network tourist, the discrimination for constantly improving itself is needed to discover energy
Power could more effectively protect oneself.
Preferably, before internet development is got up, viral propagation depends on floppy disc, and the present public frequently uses
Movable storage device transmits file, these mobile devices become the important channel that wooden horse is propagated, and user should disable oneself of USB flash disk
Dynamic playing function, the risk for avoiding movable storage device from contaminating.
A kind of network security monitoring and managing method proposed by the present invention, beneficial effect are the network supervision method from many aspects
Corresponding solution is illustrated and proposed to danger present on network, can preferably solve the problems, such as network security,
To avoid the infringement of virus, and to regulation is made that in the method using network of user, so as to effectively improve
The safety and normalization that internet uses.
Specific embodiment
It is next combined with specific embodiments below that the present invention will be further described.
A kind of network security monitoring and managing method, includes the following steps:
A, the access control of network: access control is the important means of Protection of Network Security and protection, its main task
It is maintenance network system security, guarantees that Internet resources are not illegally used and access very much, in technology realization, including it is following several
A aspect:
A1, access control: access control provides first layer access control for network access, is network access
Barrier at first, which user it, which controls, can log on to server and obtain Internet resources, control permit user-network access when
Between and permit them and network in some specific work station, what is realized such as ISP service provider is exactly access service, the access visit of user
Ask that control is the verifying to legitimate user, the authentication mode of user's the user name and password can be divided into three steps: user name
Identification and verifying, the identification of user password and verifying and the default limitation inspection of user account;
A2, resources accessing control: being the access control management to object entirety resource information, including file system
Access control (file directory access control and system access control), file attribute access control, information content access control, text
Part directory access control refers to that user and user group are endowed certain permission, and under the rule control license of permission, which is used
Family and which accessible catalogue of user group, subdirectory, file and other resources, which user can be to which texts therein
Which kind of operation part, catalogue, subdirectory, equipment are able to carry out, and system access control refers to that a network system administrator is should be
User specifies access authority appropriate, these access privilege controls access of the user to server, password locking clothes should be set
Business device console should set server log time limit preventing illegal user's modification, deleting important information or destroying data
System, time interval unauthorized access person detection and closed, reply network implementation monitoring, record access of the user to Internet resources,
Illegal network is accessed, can use figure or text or form of sound alarm, file attribute access control, when with file, mesh
Record and when the network equipment, should specify access attribute to file, catalogue, attribute security control can by given attribute with to access
File, catalogue and the network equipment connect;
The access control of A3, the network port and node: node and port in network often encrypted transmission data, these are heavy
The management of position is wanted to must be prevented from the attack that hacker starts, for managing and modifying data, it should be enough it is required that visitor provides
Prove the validator of identity;
B, the attack-defending of internet worm, specifically includes the following aspects:
B1, of unknown origin Email and file are not opened arbitrarily, not run stranger at will to your journey
Formula is similar to " Troy " class hacker formula and just needs to deceive your operation;
B2, it avoids downloading nameless software and game formula from Internet as far as possible, even if downloading from well-known website
Software also will in time with it is newest virus and wooden horse killing software software and system are scanned;
B3, password setting use alphanumeric as far as possible, and simple English or number are very easy to exhaustion, will commonly use
Password be arranged different, prevent from being found one by people, related to arrive important password, important password is most preferably often replaced;
B4, support HTML BBS on, such as discovery submit warning, referring initially to source code, it is however very well possible to be defraud of password fall into
Trap;
C, the safety of data: being carried out the transmission of data by network, need to guarantee the integrality and confidentiality of data, and
When can to data sender carry out identity verifying, specific step is as follows for realization:
C1, One-Way Encryption is done to the data of data sender first, obtains the condition code of data;
C2, encryption generation specific code M1 is carried out with the private key of sender to the condition code obtained in C1;
C3, symmetric cryptography generation M2 is carried out to the M1 and data generated in C2;
C4, finally the password of the M2 generated in C3 and symmetric cryptography encrypted using the public key of recipient, to make
It obtains the integrality confidentiality in the transmission process of data and can be protected to the verifying of sender's identity, complete
After step C, when data reach recipient, recipient is first decrypted data with the private key of oneself, obtains password and encryption
Data, encryption data is decrypted using password, the condition code and data encrypted, it is special with the public key decryptions of sender
Levy code, if it is possible to it decrypts, then illustrates that the data are sent out by sender, it is on the contrary then be not, finally in the feature of calculating data
Code and the specific code decrypted compare, and are capable of detecting when whether data are modified in this way;
D, network hole reparation and inspection: periodically carrying out comprehensive loophole inspection to computer, understands computer system
In the service that opens up and port, the loophole that understands the gimmick of current hacker attack and can be utilized, hacker invades work
Tool detection, which checks, whether there is these loopholes in the computer system of oneself, discovery loophole is repaired in time;
E, the security protection of computer, including the following steps:
E1, a trustworthy antivirus software and firewall are installed in a computer, and during computer operation
Forbid privately closing firewall and antivirus software, find there is virus in computer, should the antivirus of suspension immediately, must not make
It is worked with viruliferous computer is taken, virus is avoided to spread through the internet to entire local area network;
E2, in company and enterprises so that computer be only used for writing material and utilize in-company office
Domain net carries out inquiry data, must not watch movie using network, play game, chat and speculation in stocks;
E3, the computer for carrying and preserving the important confidential information of company should be applicable in fixed online IP, without permission,
Internet must not be accessed without exception.
Punishment system is carried out in company and enterprise: the employee of company and enterprise has infringement, hair
Now following three times (including three times), 200 or less place is imposed a fine, and more than three times, company will release labour contract, tool with the employee for discovery
Behavior as defined in body is as follows;
(1), to the accident occurred in computer information system not by regulation report, cause data divulge a secret and virus in office
It is spread in the net of domain;
(2), I or leave that other people in the computer of oneself play game, the amusement watching movie and chat using internet
Behavior;
(3), do not unify installation antivirus software and firewall as requested, be turned off privately during the operation of computer
Behavior;
(4), using the computer for carrying and preserving the important confidential information of company, accessing internet causes data to be divulged a secret
And viral behavior in computer.
During logging in website, as network tourist, needs constantly to improve the discrimination diagnostic ability of itself, could more have
The protection of effect oneself, before internet development is got up, viral propagation depends on floppy disc, and the present public is frequently using shifting
Dynamic storage equipment transmits file, these mobile devices become the important channel that wooden horse is propagated, and user should disable the automatic of USB flash disk
Playing function, the risk for avoiding movable storage device from contaminating.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to should be covered by the protection scope of the present invention with replacing or changing.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910076567.XA CN109600397A (en) | 2019-01-26 | 2019-01-26 | A kind of network security monitoring and managing method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910076567.XA CN109600397A (en) | 2019-01-26 | 2019-01-26 | A kind of network security monitoring and managing method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN109600397A true CN109600397A (en) | 2019-04-09 |
Family
ID=65966593
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910076567.XA Pending CN109600397A (en) | 2019-01-26 | 2019-01-26 | A kind of network security monitoring and managing method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109600397A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110443038A (en) * | 2019-08-02 | 2019-11-12 | 贵州电网有限责任公司 | A kind of portable ciphering type network security compliance automatic inspection device of desktop terminal |
| CN110881049A (en) * | 2019-12-16 | 2020-03-13 | 淮安信息职业技术学院 | Computer network safety intelligent control system |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106411926A (en) * | 2016-11-03 | 2017-02-15 | 厦门安胜网络科技有限公司 | Data encryption communication method and system |
| US20180053005A1 (en) * | 2016-08-22 | 2018-02-22 | Mastercard International Incorporated | Method and system for secure device based biometric authentication scheme |
-
2019
- 2019-01-26 CN CN201910076567.XA patent/CN109600397A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180053005A1 (en) * | 2016-08-22 | 2018-02-22 | Mastercard International Incorporated | Method and system for secure device based biometric authentication scheme |
| CN106411926A (en) * | 2016-11-03 | 2017-02-15 | 厦门安胜网络科技有限公司 | Data encryption communication method and system |
Non-Patent Citations (4)
| Title |
|---|
| 健莲科技: "《宽带应用百事通》", 31 January 2003, 中国铁道出版社 * |
| 商者: "网络传输数据的加密过程详解", 《MY.OSCHINA.NET》 * |
| 牛少彰,崔宝江,李剑: "《信息安全概论》", 31 August 2016, 北京邮电大学出版社 * |
| 邱永渠主编: "《中等职业教育教学探索 福建师范大学2006-2007年度中等职业学校专业骨干教师国家级培训论文集》", 30 November 2008, 浅析计算机网络安全与防范 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110443038A (en) * | 2019-08-02 | 2019-11-12 | 贵州电网有限责任公司 | A kind of portable ciphering type network security compliance automatic inspection device of desktop terminal |
| CN110881049A (en) * | 2019-12-16 | 2020-03-13 | 淮安信息职业技术学院 | Computer network safety intelligent control system |
| CN110881049B (en) * | 2019-12-16 | 2022-02-15 | 淮安信息职业技术学院 | Computer network safety intelligent control system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
| Greenberg et al. | Mobile agents and security | |
| Mohamed et al. | Android vs iOS security: A comparative study | |
| Herrmann et al. | Basic concepts and models of cybersecurity | |
| Mubeen et al. | Strategies to Avoid Illegal Data Access | |
| Almaiah et al. | Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems. | |
| Bishop et al. | The threat from the net [Internet security] | |
| WO2001073533A1 (en) | System and method for safeguarding electronic files and digital information in a network environment | |
| Robberts et al. | Finding vulnerabilities in iot devices: Ethical hacking of electronic locks | |
| Chuka-Maduji et al. | Cloud computing security challenges and related defensive measures: A survey and taxonomy | |
| Cordis et al. | Considerations in mitigating Kerberos vulnerabilities for active directory | |
| KR101042234B1 (en) | How to prevent reading confidential documents of user program through location authentication | |
| CN109600397A (en) | A kind of network security monitoring and managing method | |
| Krit et al. | Review on the IT security: Attack and defense | |
| Shetty et al. | Survey of hacking techniques and it's prevention | |
| CN117521052A (en) | Protection authentication method and device for server privacy, computer equipment and medium | |
| Lingamgunta | Cyber Security For Beginners | |
| Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
| Vinay et al. | The Demonstration of Android Vulnerabilities | |
| Liu | Ethical Hacking of a Smart Video Doorbell | |
| MA et al. | Attacks and countermeasures in software system security | |
| Udaykumar | A study on Network Threats, Attacks & Security Measures | |
| Soriano | Information and network security | |
| Tapiador | Computer Security Fundamentals | |
| Erike | Dual combat technique-based cyber systems protection against password attacks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190409 |