Nothing Special   »   [go: up one dir, main page]

CN108900516B - Distributed service system of network space vulnerability merging platform - Google Patents

Distributed service system of network space vulnerability merging platform Download PDF

Info

Publication number
CN108900516B
CN108900516B CN201810746271.XA CN201810746271A CN108900516B CN 108900516 B CN108900516 B CN 108900516B CN 201810746271 A CN201810746271 A CN 201810746271A CN 108900516 B CN108900516 B CN 108900516B
Authority
CN
China
Prior art keywords
server
firewall
unit
distributed
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810746271.XA
Other languages
Chinese (zh)
Other versions
CN108900516A (en
Inventor
赖洪昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810746271.XA priority Critical patent/CN108900516B/en
Publication of CN108900516A publication Critical patent/CN108900516A/en
Application granted granted Critical
Publication of CN108900516B publication Critical patent/CN108900516B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a distributed service system of a network space vulnerability merging platform, which comprises a distributed server, a database server and a backup server, wherein the input end of the distributed server is connected with the database server, the output end of the distributed server is connected with the backup server, and the distributed server, the database server and the backup server are all connected through a local area network, wherein: the database server can be used for collecting user data and providing inquiry and calling functions, and the distribution server can perform distribution scanning and attack on tasks submitted by system users. According to the invention, the tasks are scanned in a mode of distributed scanning and attacking the tasks submitted by the system users, so that the problem that the influence on the source data is easily large due to the fact that the vulnerability is not discovered in time because the related patches are repaired after the existing network space is always vulnerable is solved.

Description

Distributed service system of network space vulnerability merging platform
Technical Field
The invention relates to the field of a network space vulnerability merging platform, in particular to a network space vulnerability merging platform distributed service system.
Background
With the rapid development of information technology, computer networks are widely used, global communication by using widely open network environments becomes the trend of times development, and people increasingly rely on the internet in daily economic and social life.
The human society has gradually entered the information age characterized by digitalization, networking, and intelligence, and the explosive growth of information has further led to the advent of the big data age. Various information systems such as search engines, social networks, electronic government affairs, electronic finance, electronic commerce, intelligent transportation and intelligent factories emerge like bamboo shoots in the spring after rain, sense, manage and regulate the aspects of real physical environment and social life silently by acquiring mass data, provide various convenient services for organizations and personal families, and greatly change the life, production and management modes of human society. The data, information and systems describe virtual images of the physical world and human society from multiple dimensions, forming a corresponding information space. In particular, the development of the mobile internet and internet of things technology enables anyone, things and things to actively and passively generate or acquire information anytime and anywhere, and widely share information and mutually associate and influence each other. The diversified and grouped information perception mode enables the information space to be gradually fused with the physical world and the human society, deeply associated and interacted, and forms an organic integral- 'information-physics-society' ternary space with a closed loop feedback loop.
However, in the existing network space, after a bug occurs, the related patch is often repaired, which easily causes a large influence on the source data due to the fact that the bug is not discovered in time.
Therefore, it is necessary to invent a distributed service system of a cyberspace vulnerability merger platform to solve the above problems.
Disclosure of Invention
The invention aims to provide a distributed service system of a network space vulnerability merging platform, which scans tasks by adopting a mode of distributed scanning and attacking the tasks submitted by system users, so as to solve the problem that the existing network space proposed in the background technology often repairs related patches after vulnerabilities appear, and the vulnerability discovery is not timely, so that the influence on the source data is large.
In order to achieve the purpose, the invention provides the following technical scheme: the utility model provides a network space vulnerability merger platform distribution service system, includes distribution server, database server and backup server, distribution server's input is connected with database server and the output is connected with backup server, all be connected through the LAN between distribution server, database server and the backup server, wherein:
the database server may be used to collect user data and provide query and call functions;
the distribution server can perform distribution scanning and attack on tasks submitted by system users;
the backup server can completely backup data related information before and after processing by the distribution server so as to accelerate the identification speed of the distribution server on tasks repeatedly submitted by system users, thereby rapidly exciting a firewall to attack a network space bug and ensuring the stable operation of the merging platform;
the distribution server comprises a data acquisition unit, the connection end of the data acquisition unit is connected with an inquiry unit, the connection end of the inquiry unit is connected with a detection unit, the connection end of the detection unit is connected with a data processing unit, the connection end of the data processing unit is connected with a scheduling management unit, the connection end of the scheduling management unit is connected with a safety defense unit, and the safety defense unit is arranged at the connection port between the data acquisition unit and the inquiry unit.
Preferably, the query unit is composed of a domain name query subdomain function module, a domain name query IP function module and an IP back-check domain name module, and the domain names and IP addresses of the system users when submitting tasks are queried in a matched independent working mode among all the parts, so that vulnerabilities of a network space can be rapidly positioned.
Preferably, the detection unit is composed of a port scanning and service detection module, an operating system detection module and a WEB server detection module, and tasks and operating systems submitted by system users are detected among all the parts in a matched independent working mode so as to find related vulnerabilities in time.
Preferably, the data processing unit is composed of a WEB crawling module of the whole website, a WEB page vulnerability scanning analysis module and a WEB service component judgment module, and can analyze and integrate data of tasks submitted by system users.
Preferably, the scheduling management unit is composed of a distributed task communication module and a distributed attack module, and can distribute tasks by combining with the data information after analysis and integration and simultaneously carry out distributed attack on the occurred vulnerabilities.
Preferably, the security defense unit comprises a storage server of a plurality of subsystems, a local firewall, a regional firewall, a hardware firewall, a software firewall and a remote firewall, wherein the remote firewall comprises a remote software firewall and a remote hardware firewall.
Preferably, the storage server of the subsystem is connected with a local firewall, the local firewall is connected with a regional firewall, and the firewalls of the subsystems are connected with each other.
The invention has the technical effects and advantages that:
1. the tasks are scanned in a mode of distributed scanning and attacking the tasks submitted by the system users, so that bugs in the submitted tasks can be found in time, and a safety protection net is quickly established, so that the problem that the bugs are not found in time to cause great influence on the source data is solved;
2. the backup server is arranged, so that the backup server can be used for collecting user data and providing query and call functions, and meanwhile, the situation that the source data is damaged can be avoided;
3. the distributed technology is utilized to arrange the nodes in each region, the problem that vulnerability, scanning speed and the like caused by network factors affect security assessment can be solved, and meanwhile, the distributed technology can distribute tasks to each node for targeted assessment.
Drawings
FIG. 1 is a schematic diagram of a distributed server deployment scenario of the present invention;
FIG. 2 is a block diagram of the system of the present invention;
FIG. 3 is a schematic diagram of a query unit according to the present invention;
FIG. 4 is a schematic structural diagram of a detecting unit according to the present invention;
FIG. 5 is a block diagram of a data processing unit according to the present invention;
FIG. 6 is a schematic diagram of a scheduling management unit according to the present invention;
FIG. 7 is a schematic structural diagram of a security defense unit of the present invention;
in the figure: the system comprises a distribution server 1, a data acquisition unit 11, an inquiry unit 12, a detection unit 13, a data processing unit 14, a scheduling management unit 15, a security defense unit 16, a database server 2 and a backup server 3.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides a distributed service system of a network space vulnerability merging platform as shown in figures 1-7, which comprises a distributed server 1, a database server 2 and a backup server 3, wherein the input end of the distributed server 1 is connected with the database server 2, the output end of the distributed server 1 is connected with the backup server 3, the distributed server 1, the database server 2 and the backup server 3 are all connected through a local area network, and the distributed server 1, the database server 2 and the backup server 3 are all connected through a local area network, wherein:
the database server 2 may be used to collect user data and provide query and call functions;
the distribution server 1 can perform distribution scanning and attack on tasks submitted by system users;
the backup server 3 can completely backup data related information before and after processing by the distribution server 1 to accelerate the identification speed of the distribution server 1 on tasks repeatedly submitted by system users, so that a firewall is quickly excited to attack a network space bug, and the stable operation of the merging platform is ensured;
the distribution server 1 comprises a data acquisition unit 11, wherein a connection end of the data acquisition unit 11 is connected with an inquiry unit 12, a connection end of the inquiry unit 12 is connected with a detection unit 13, a connection end of the detection unit 13 is connected with a data processing unit 14, a connection end of the data processing unit 14 is connected with a scheduling management unit 15, a connection end of the scheduling management unit 15 is connected with a safety defense unit 16, and the safety defense unit 16 is arranged at a connection port between the data acquisition unit 11 and the inquiry unit 12.
The beneficial effects of the above technical scheme are: the distribution server 1, the database server 2 and the backup server 3 are connected together through the local area network, so that the backup server 3 is used for completely backing up data related information before and after processing of the distribution server 1, the identification speed of the distribution server 1 on tasks repeatedly submitted by system users is increased, a firewall is rapidly excited to attack a network space vulnerability, and the stable operation of a merging platform is ensured.
Example 2:
further, in the technical solution of embodiment 1, the query unit 12 is composed of a domain name query sub-domain function module, a domain name query IP function module, and an IP reverse-check domain name module, and each of the components queries a domain name and an IP address of a system user when submitting a task in a form of cooperative independent work, so as to quickly locate a vulnerability of a network space.
Further, in the technical solution of embodiment 1, the detection unit 13 is composed of a port scanning and service detection module, an operating system detection module, and a WEB server detection module, and all the parts adopt a coordinated independent work mode to detect tasks and operating systems submitted by system users, so as to discover related vulnerabilities in time.
Further, in the technical solution of embodiment 1, the data processing unit 14 is composed of a whole website WEB crawling module, a WEB page vulnerability scanning analysis module, and a WEB service component judgment module, and can analyze and integrate data of tasks submitted by system users.
Further, in the technical solution of embodiment 1, the scheduling management unit 15 is composed of a distributed task communication module and a distributed attack module, and can distribute tasks by combining with analyzing and integrating data information and perform distributed attack on occurring vulnerabilities.
Further, in the technical solution of embodiment 1, the security defense unit 16 includes a storage server of a plurality of subsystems, a local firewall, a regional firewall, a hardware firewall, a software firewall, and a remote firewall, where the remote firewall includes a remote software firewall and a remote hardware firewall, the storage server of the subsystem is connected to the local firewall, the local firewall is connected to the regional firewall, and the firewalls of the subsystems are connected to each other to form a complementary relationship of fault-tolerant control, so that the whole distributed server cluster is connected to the hardware firewall, the software firewall, and the remote firewall, thereby protecting the normal operation of the internal software operating environment and providing a security policy for the operating system.
The working principle of the invention is as follows:
referring to the attached figure 1 of the specification, the input end of a distribution server is connected with a database server, the output end of the distribution server is connected with a backup server, and the distribution server, the database server and the backup server are connected through a local area network, wherein the database server can be used for collecting user data and providing inquiry and calling functions, the distribution server can perform distribution scanning and attack on tasks submitted by system users, meanwhile, the backup server can perform complete backup on data related information before and after processing by the distribution server so as to accelerate the identification speed of the distribution server on the tasks repeatedly submitted by the system users, and therefore a firewall is rapidly excited to attack a network space leak, and stable operation of a merging platform is ensured;
referring to the attached figures 2-6 of the specification, in the working process of the distributed server, a data acquisition unit acquires relevant data of tasks submitted by system users, then according to the acquired relevant data conditions, a domain name inquiry subdomain function module, a domain name inquiry IP function module or an IP back-check domain name module is used for inquiring domain names and IP addresses when the system users submit the tasks so as to quickly position the loopholes of a network space, meanwhile, a port scanning and service detection module, an operating system detection module and a WEB server detection module are used for detecting the tasks and the operating systems submitted by the system users so as to find the relevant loopholes in time, and then the data of the tasks submitted by the system users are analyzed and integrated through a whole website WEB crawling module, a WEB page loophole scanning analysis module and a WEB service component judgment module, the distributed task communication module and the distributed attack module distribute tasks by combining with the data information after analysis and integration, simultaneously carry out distributed attack on the generated bugs, and establish a firewall to protect the source data of the system;
referring to fig. 7 of the specification, the security defense unit 16 includes a storage server of a plurality of subsystems, a local firewall, a regional firewall, a hardware firewall, a software firewall and a remote firewall, where the remote firewall includes a remote software firewall and a remote hardware firewall, and the storage server of the subsystem is connected to the local firewall, the local firewall is connected to the regional firewall, and the firewalls of the subsystems are connected to each other to form a complementary relationship of fault-tolerant control, so that the whole distributed server cluster is connected to the hardware firewall, the software firewall and the remote firewall to protect the normal operation of the internal software operating environment, and provide a security policy for the operating system.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (7)

1. The utility model provides a network space vulnerability merger platform distribution service system, includes distribution server (1), database server (2) and backup server (3), its characterized in that: the input of distribution server (1) is connected with database server (2) and the output is connected with backup server (3), all be connected through the LAN between distribution server (1), database server (2) and backup server (3), wherein:
the database server (2) is operable to collect user data and provide query and call functions;
the distribution server (1) can perform distribution scanning and attack on tasks submitted by system users;
the backup server (3) can completely backup data related information before and after processing by the distribution server (1) so as to accelerate the identification speed of the distribution server (1) on tasks repeatedly submitted by system users, thereby rapidly exciting a firewall to attack a network space bug and ensuring the stable operation of the merging platform;
distribution server (1) is including data acquisition unit (11), data acquisition unit (11) link is connected with inquiry unit (12), inquiry unit (12) link is connected with detecting element (13), detecting element (13) link is connected with data processing unit (14), data processing unit (14) link is connected with dispatch administrative unit (15), dispatch administrative unit (15) link is connected with safety defense unit (16), and safety defense unit (16) set up the port department of connection between data acquisition unit (11) and inquiry unit (12).
2. The distributed service system of the cyberspace vulnerability merge platform according to claim 1, wherein: the query unit (12) is composed of a domain name query subdomain function module, a domain name query IP function module and an IP back-check domain name module, and the domain names and IP addresses of system users when submitting tasks are queried in a matched independent working mode among all the parts, so that vulnerabilities of network space can be rapidly positioned.
3. The distributed service system of the cyberspace vulnerability merge platform according to claim 1, wherein: the detection unit (13) is composed of a port scanning and service detection module, an operating system detection module and a WEB server detection module, and tasks and operating systems submitted by system users are detected among all parts in a matched independent working mode so as to find related bugs in time.
4. The distributed service system of the cyberspace vulnerability merge platform according to claim 1, wherein: the data processing unit (14) is composed of a website whole station WEB crawling module, a WEB page vulnerability scanning analysis module and a WEB service component judgment module, and can analyze and integrate data of tasks submitted by system users.
5. The distributed service system of the cyberspace vulnerability merge platform according to claim 1, wherein: the scheduling management unit (15) is composed of a distributed task communication module and a distributed attack module, and can distribute tasks by combining with data information after analysis and integration and carry out distributed attack on the occurred bugs.
6. The distributed service system of the cyberspace vulnerability merge platform according to claim 1, wherein: the security defense unit (16) includes a storage server of a plurality of subsystems, a local firewall, a regional firewall, a hardware firewall, a software firewall, and a remote firewall including a remote software firewall and a remote hardware firewall.
7. The distributed service system of the cyberspace vulnerability merger platform according to claim 6, wherein: the storage server of the subsystem is connected with the local firewall, the local firewall is connected with the regional firewall, and the firewalls of the subsystems are connected with each other.
CN201810746271.XA 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform Active CN108900516B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810746271.XA CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810746271.XA CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Publications (2)

Publication Number Publication Date
CN108900516A CN108900516A (en) 2018-11-27
CN108900516B true CN108900516B (en) 2021-06-22

Family

ID=64348231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810746271.XA Active CN108900516B (en) 2018-07-09 2018-07-09 Distributed service system of network space vulnerability merging platform

Country Status (1)

Country Link
CN (1) CN108900516B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111090418B (en) * 2019-11-26 2023-08-01 常州工业职业技术学院 Intelligent service enterprise labeling operation maintenance system
CN111885094B (en) * 2020-09-28 2021-02-26 浙江省能源集团有限公司 Industrial control system network safety protection capability inspection and evaluation system
CN112637119A (en) * 2020-11-13 2021-04-09 北京大米科技有限公司 Host scanning method and device, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495884A (en) * 2011-12-08 2012-06-13 中国信息安全测评中心 Vulnerability information cloud service method based on Internet
CN104348829A (en) * 2014-09-26 2015-02-11 智慧城市信息技术有限公司 Network security situation sensing system and method
CN105069158A (en) * 2015-08-25 2015-11-18 携程计算机技术(上海)有限公司 Data mining method and system
CN106874755A (en) * 2017-01-22 2017-06-20 中国人民解放军信息工程大学 The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks
CN107087001A (en) * 2017-05-15 2017-08-22 华中科技大学 A kind of important address spatial retrieval system in distributed internet
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method
CN108769018A (en) * 2018-05-29 2018-11-06 北京理工大学 A kind of cyberspace security measure method of the more granularities of multidimensional

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108140057B (en) * 2016-07-14 2020-07-17 铁网网络安全股份有限公司 Network behavior system based on simulation and virtual reality

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495884A (en) * 2011-12-08 2012-06-13 中国信息安全测评中心 Vulnerability information cloud service method based on Internet
CN104348829A (en) * 2014-09-26 2015-02-11 智慧城市信息技术有限公司 Network security situation sensing system and method
CN105069158A (en) * 2015-08-25 2015-11-18 携程计算机技术(上海)有限公司 Data mining method and system
CN106874755A (en) * 2017-01-22 2017-06-20 中国人民解放军信息工程大学 The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks
CN107087001A (en) * 2017-05-15 2017-08-22 华中科技大学 A kind of important address spatial retrieval system in distributed internet
CN108040070A (en) * 2017-12-29 2018-05-15 北京奇虎科技有限公司 A kind of network security test platform and method
CN108769018A (en) * 2018-05-29 2018-11-06 北京理工大学 A kind of cyberspace security measure method of the more granularities of multidimensional

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《网络空间安全综述》;张焕国 等;《中国科学:信息科学》;20161231;全文 *

Also Published As

Publication number Publication date
CN108900516A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
US10397273B1 (en) Threat intelligence system
US9602530B2 (en) System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
US9503468B1 (en) Detecting suspicious web traffic from an enterprise network
US7743420B2 (en) Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
US7899849B2 (en) Distributed security provisioning
US20170289187A1 (en) System and method for visualizing and analyzing cyber-attacks using a graph model
US20120011590A1 (en) Systems, methods and devices for providing situational awareness, mitigation, risk analysis of assets, applications and infrastructure in the internet and cloud
US10129273B2 (en) System and methods for computer network security involving user confirmation of network connections
CN110138770B (en) Threat information generation and sharing system and method based on Internet of things
CA3069437A1 (en) Cyberanalysis workflow acceleration
CN108900516B (en) Distributed service system of network space vulnerability merging platform
US20170034200A1 (en) Flaw Remediation Management
Li et al. Complex attack linkage decision-making in edge computing networks
CN111510463B (en) Abnormal behavior recognition system
US20230291754A1 (en) Systems and methods for automated anomalous behavior detection and risk-scoring individuals
CN112738040A (en) Network security threat detection method, system and device based on DNS log
US9363140B2 (en) System and method for analyzing and reporting gateway configurations and rules
Husák et al. Dataset of intrusion detection alerts from a sharing platform
US10142359B1 (en) System and method for identifying security entities in a computing environment
Teng et al. A cooperative intrusion detection model for cloud computing networks
US8117181B2 (en) System for notification of group membership changes in directory service
CN113382010B (en) Large-scale network security defense system based on cooperative intrusion detection
CN108833368B (en) Network space vulnerability merging platform system
CN109302406B (en) Distributed webpage evidence obtaining method and system
KR20210106896A (en) System for managing security control and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant