CN115102865A - Network security device topology management method and system - Google Patents
Network security device topology management method and system Download PDFInfo
- Publication number
- CN115102865A CN115102865A CN202210744082.5A CN202210744082A CN115102865A CN 115102865 A CN115102865 A CN 115102865A CN 202210744082 A CN202210744082 A CN 202210744082A CN 115102865 A CN115102865 A CN 115102865A
- Authority
- CN
- China
- Prior art keywords
- module
- topology
- safety
- management
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 97
- 238000012544 monitoring process Methods 0.000 claims abstract description 46
- 238000001514 detection method Methods 0.000 claims abstract description 25
- 238000004458 analytical method Methods 0.000 claims abstract description 15
- 230000008054 signal transmission Effects 0.000 claims abstract description 13
- 230000000007 visual effect Effects 0.000 claims abstract description 5
- 238000000034 method Methods 0.000 claims description 21
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000011156 evaluation Methods 0.000 claims description 8
- 230000008439 repair process Effects 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 6
- 238000012423 maintenance Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 7
- 230000007123 defense Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 208000024891 symptom Diseases 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a network security device topology management method and system, relating to the technical field of network management, comprising a topology management terminal which is respectively connected with an environment detection module and a bus type management module in a signal transmission way, and the signal output of the environment detection module and the bus type management module is connected with a log storage, statistics and report module, the network security device topology management method and system can carry out all-round fine-grained monitoring on various monitored objects through the monitoring of the main stream IT software and hardware by the log storage, statistics and report module in the bus type management module, has rich monitoring indexes, and a manager can check monitoring index information through rich visual charts, set alarm threshold values for the monitoring indexes, and store the data of the monitoring indexes, and a history analysis is performed.
Description
Technical Field
The present invention relates to the field of network management technologies, and in particular, to a method and a system for managing a topology of a network security device.
Background
Network topology refers to the physical layout of various devices interconnected by a transmission medium, and refers to a specific physical, real, or logical, virtual arrangement among the members constituting a network, and if the connection structure of two networks is the same, we say that the network topologies are the same, although the physical wiring and the distance between nodes in the networks may be different.
According to the literature, in the process of managing and using most network security equipment topology management systems, most data management cannot carry out all-dimensional fine-grained monitoring on monitored objects, so that the monitoring indexes of all parameters are reduced, and the monitoring index information cannot be visually and conveniently analyzed by a data end chart, so that when the monitoring indexes reach an alarm threshold value, the data of the monitoring indexes cannot be stored, and the defects such as historical analysis and the like cannot be caused.
Disclosure of Invention
The invention aims to solve at least one technical problem in the prior art, and provides a network security device topology management method and a network security device topology management system, which can solve the problems that the topology management cannot carry out all-around fine-grained monitoring on a monitored object, further the monitoring index of each parameter is reduced, and the monitoring index information cannot be visually and conveniently analyzed by a data end chart, so that when the monitoring index reaches an alarm threshold value, the data of the monitoring index cannot be stored and historical analysis cannot be carried out.
In order to achieve the purpose, the invention provides the following technical scheme: a topology management method and a system for network security equipment comprise a topology management terminal, wherein the topology management terminal is respectively connected with an environment detection module and a bus type management module in a signal transmission manner, and the environment detection module and the bus type management module are connected with a log storage, statistics and report module in a signal output manner.
Preferably, the log storage, statistics and reporting module can perform all-around fine-grained monitoring on various monitored objects through monitoring of mainstream IT software and hardware, has rich monitoring indexes, and a manager can check monitoring index information through a rich visual chart.
Preferably, the environment detection module is connected with a transmission data security operation module and a data iteration security module in a signal transmission manner, the environment detection module can establish target security equipment for the network security virtualization platform according to physical resources required by the running environment information, and the transmission data security operation module can manage virtualization of the corresponding virtualization instance and other equipment in the running environment of the target security equipment.
Preferably, the transmission data security operation module is completed by a security management configuration center calling a function of a virtualization management center, and the virtual security device security service is configured to set a security service of the virtual security device, so that the virtual security device performs its own security function.
Preferably, the data iteration safety module is respectively connected with the data monitoring analysis module and the topology management evaluation module in a signal transmission manner.
Preferably, the routing topology view is identified and analyzed by the data monitoring and analyzing module in the data iteration security module for the security management server by using the micro service, so as to obtain the fault that the path of the routing is not through in the network system to be managed.
Preferably, a security monitoring and management system and an emergency response system are established through the topology management evaluation module to manage and control the host device, the network device and the infrastructure protection facility.
Preferably, the bus type management module is respectively connected with the path tracing module, the security repair detection module and the arranging engine management module in a signal transmission manner, and the path tracing module can identify the maintenance cost and the security policy of the network topology and support the path tracing analysis and presentation of information such as a source address, a destination address and a port.
Preferably, the simple information security service problem is repaired through the security repair detection module, and the operation steps required by the service can be completed only by transmitting the actual scene picture to the terminal desktop of the service staff through video on site by the service staff and common staff of the client side through voice conversation.
Preferably, the routing table analysis capability of the topology generation engine integrating the mainstream network device and the security device can be realized through the orchestration engine management module, the generation of the three-layer network topology is performed according to the routing table information, meanwhile, the network topology management aiming at the host layer can be realized by combining the two-layer MAC address information, and then the orchestration engine management module utilizes the security controller to manage according to the type of the security device and other service parameters.
Compared with the prior art, the invention has the beneficial effects that:
(1) according to the network security equipment topology management method and system, all-around fine-grained monitoring can be carried out on various monitored objects through the monitoring of mainstream IT software and hardware through the log storage, statistics and reporting module in the bus type management module, the monitoring method and system have rich monitoring indexes, a manager can check monitoring index information through rich visual charts, alarm threshold values can be set for the monitoring indexes, data of the monitoring indexes can be stored, and historical analysis is carried out.
(2) According to the network security device topology management method and system, the environment detection module can be used for establishing target security devices for the network security virtualization platform according to physical resources required by running environment information, the data transmission security operation module can be used for managing virtualization of corresponding virtualization instances and other devices in the running environment of the target security devices, determining that no existing idle security devices with the types of the target devices exist according to relevant information, and determining the running environment information state of the target devices according to requests after the corresponding virtualization instances.
(3) The network security equipment topology management method and system have the advantages that the virtual security equipment exists in a virtual machine form by accessing a virtual security equipment management interface and needing to be forwarded through a security service management agent, the network configuration belongs to functions related to virtual machine management, the security management configuration center calls the functions of the virtualization management center to complete, the virtual security equipment security service configuration is used for setting security services of the virtual security equipment so that the virtual security equipment can exert the security functions of the virtual security equipment, and the configuration belongs to the functions related to the security management configuration and is completed through the security management configuration topology management terminal center.
(4) According to the network security equipment topology management method and system, the data monitoring and analyzing module in the data iteration security module is used for identifying and analyzing the route topology view for the security management server by adopting micro-service, so that a fault with an obstructed route in the network system to be managed is obtained, and then fault repairing is carried out according to a protection strategy corresponding to the fault, such as automatic route repairing, so as to ensure the network security, so that the security protection of the network to be managed is realized, and the possible bugs of new access equipment in the IP address management view can be repaired, so that the security protection of the network to be managed is realized.
(5) According to the network security equipment topology management method and system, a security monitoring and management system and an emergency response system are established through a topology management evaluation module, host equipment, network equipment and infrastructure protection facilities are managed and controlled, and protection and prevention capability, information and detection capability, detection and identification capability, evaluation and decision capability, sensing and display capability and response and recovery capability are established from different defense levels, so that the security of a host system, the security of a network system and the security of a service application system are realized, and the expected target of safe operation is achieved.
(6) According to the network security equipment topology management method and system, the path tracing and tracking module can be used for enabling the maintenance cost and the security policy identification capacity of the network topology to support path tracing analysis and presentation of information such as source addresses, destination addresses and ports, an administrator can be assisted in conducting exposure check work and finding possible risk paths in time, security risk conditions such as vulnerabilities, early warning and alarming are automatically traced, risk disposal is conducted in a one-key plugging mode, threats are blocked in time, the problem of unified management of the security policies of equipment of different models can be solved, network topology information of a host layer can be generated, grouping management is supported, information can be managed, and security analysis and tracking of access paths can be achieved.
(7) The interactive service mode mainly avoids misjudgment caused by unclear or even uncertain description of the reported symptoms of the personnel faults in the common information safety service mode and loss caused by time delay of personnel engineering allocation of a service party, and has the characteristics of dynamic and real-time information safety service.
(8) The information returned by the security application program is compared with the business process strategy through the arrangement engine, if the triggering condition is met, the next security application program is called according to the business process strategy for protection, and if the triggering condition is not met, the first task scheduling method defined by the business process strategy security application program is called again, so that each security module can be independently executed, the security protection is more convenient and faster, meanwhile, the security protection of the network system to be managed is carried out in a micro-service mode, the iteration of different strategies based on micro-service is faster, and the protection efficiency of network security is improved.
Drawings
The invention is further illustrated with reference to the following figures and examples:
fig. 1 is a schematic structural diagram of a network security device topology management method and system according to the present invention.
Detailed Description
Reference will now be made in detail to the present preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
In the description of the present invention, it should be understood that the orientation or positional relationship referred to in the description of the orientation, such as the upper, lower, front, rear, left, right, etc., is based on the orientation or positional relationship shown in the drawings, and is only for convenience of description and simplification of description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, greater than, less than, exceeding, etc. are understood as excluding the present numbers, and the above, below, inside, etc. are understood as including the present numbers. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present invention, unless otherwise specifically limited, terms such as set, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention by combining the specific contents of the technical solutions.
Referring to fig. 1, the present invention provides a technical solution: a topology management method and system for network safety device includes topology management terminal connected with environment detection module and bus type management module by signal transmission, log storage, statistics and report module connected with signal output of environment detection module and bus type management module, bus type management module is that each workstation and server are hung on a bus, each workstation is equal in status and not controlled by central node, information on public bus is transmitted in serial mode in baseband mode, its transmission direction is always diffused from node sending information to two ends, the same as information sent by broadcast station, so it is also called broadcast type computer network, each node carries out address check when receiving information, if it is in accordance with its own workstation address, then receives information on network, bus type management module structure is simple, the expandability is good, when the bus type management module is used for managing the branch module on the topology management terminal, when nodes are required to be added, only a branch interface is required to be added on the bus to be connected with the branch node, when the bus load is not allowed, the bus can be expanded, the used cables are few, the installation is easy, the used equipment is relatively simple, the reliability is high, the log storage module, the statistics and reporting module monitors the main stream IT software and hardware, all-around fine-grained monitoring can be carried out on various monitored objects, the monitoring index is rich, a manager can check monitoring index information through rich visual charts, an alarm threshold value can be set for the monitoring index, the data of the monitoring index can be stored, and historical analysis is carried out.
Furthermore, the environment detection module is respectively connected with a transmission data safety operation module and a data iteration safety module in a signal transmission mode, target safety equipment can be established for the network safety virtualization platform according to physical resources required by running environment information through the environment detection module, the transmission data safety operation module can be used for carrying out virtualization management on the corresponding virtualization instances and other equipment in the running environment of the target safety equipment, the existing idle safety equipment with the type of the target equipment does not exist according to relevant information, and after the corresponding virtualization instances, the running environment information state of the target equipment is determined according to a request.
Further, through the deployment of the data iteration security module, when an administrator needs to configure the security service of the virtual security device, the virtual security equipment security service console can be accessed only by forwarding through the security service management agent of the security management configuration center, the security service management interface of the virtual security equipment is configured to be an intranet address, the virtual security equipment management interface is accessed and needs to be forwarded through the security service management agent, the virtual security equipment exists in a virtual machine state, the network configuration belongs to the functions related to virtual machine management, and is completed by the security management configuration center calling the functions of the virtualization management center, the virtual security equipment security service configuration is used for setting the security service of the virtual security equipment, so that the terminal can exert the self security function, and the part of the configuration belongs to the security management configuration related function and is completed by the security management configuration topology management terminal center.
Furthermore, the data iteration security module is respectively connected with a data monitoring and analyzing module and a topology management evaluating module in a signal transmission manner, the data monitoring and analyzing module in the data iteration security module identifies and analyzes a routing topology view by adopting micro-service to a security management server to obtain a fault with a routing path in a network system to be managed, and then fault repair is carried out according to a protection strategy corresponding to the fault, such as automatically repairing a routing path to ensure network security, so that the security protection of the network to be managed is realized, and the security protection of the network to be managed can also be realized by repairing a possible leak of a new access device in an IP address management view.
Furthermore, a safety monitoring and management system and an emergency response system are established through the topology management evaluation module, the host equipment, the network equipment and the infrastructure protection facility are managed and controlled, and the protection and prevention capability, the information and detection capability, the detection and identification capability, the evaluation and decision capability, the sensing and display capability and the response and recovery capability are established from different defense levels, so that the safety of the host system, the safety of the network system and the safety of the service application system are realized, and the expected target of safe operation is achieved.
Furthermore, the bus type management module is respectively connected with the path tracing module, the safety repair detection module and the arranging engine management module in a signal transmission way, the maintenance cost and the security policy recognition capability of the network topology can be realized through the path tracing module, the path tracing analysis and presentation of information such as source addresses, destination addresses, ports and the like are supported, can assist the administrator to carry out the exposed surface check work and timely find out possible risk paths, automatically trace the safety risk conditions, such as vulnerability, early warning, warning and other threat information, risk disposal is carried out by adopting a one-key plugging mode and the like, threats are blocked in time, the problem of unified management of security strategies of equipment with different models can be solved, network topology information of a host layer can be generated, and the method supports packet management, can manage information, and can realize security analysis for the policy and tracking of an access path.
Furthermore, simple information security service problems are repaired through the security repair detection module, only the service side personnel and the client side ordinary personnel need to transmit actual scene pictures to the terminal desktop of the service side personnel through videos on site, and operation steps required by service can be completed through voice conversation.
Furthermore, the routing table analysis capability of the engine integrating the mainstream network equipment and the safety equipment can be topologically generated through the layout engine management module, the generation of three-layer network topology is carried out according to the routing table information, meanwhile, the network topology admission aiming at the host layer can be realized by combining with the two-layer MAC address information, then the layout engine management module utilizes the safety controller to select proper safety equipment through a resource scheduling algorithm according to the type of the safety equipment and other service parameters, and sends a protection task to the selected equipment, the layout engine management module collects the task execution result of the safety equipment and returns the information to the safety application program, the layout engine management module further processes the collected log and alarm information, converts the log and alarm information into an interface format which can be identified by the layout engine and then returns the interface format to the layout engine, and finally, the layout engine compares the information returned by the safety application program with the service flow strategy, if the triggering condition is met, calling the next security application program for protection according to the business process strategy, if the triggering condition is not met, calling the first security application program again according to the task scheduling method defined by the business process strategy security application program, and thus, each security module can be independently executed, so that the security protection is more convenient and faster, and meanwhile, the security protection of the network system to be managed is carried out in a micro-service mode, so that iteration of different strategies based on micro-service is faster, and the protection efficiency of network security is improved.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.
Claims (10)
1. A network security device topology management method and system, including topology management terminal, characterized by that: the topology management terminal is respectively connected with an environment detection module and a bus type management module in a signal transmission mode, and the environment detection module and the bus type management module are connected with a log storage, statistics and reporting module in a signal output mode.
2. The method and system for managing the topology of the network security device according to claim 1, wherein: the log storage, statistics and reporting module can monitor various monitored objects in an all-around fine-grained mode through monitoring of mainstream IT software and hardware, has rich monitoring indexes, and a manager can check monitoring index information through a rich visual chart.
3. The method and system for managing the topology of the network security device according to claim 1, wherein: the environment detection module is respectively connected with a transmission data safety operation module and a data iteration safety module in a signal transmission mode, the environment detection module can establish target safety equipment for the network safety virtualization platform according to physical resources required by running environment information, and the transmission data safety operation module can manage virtualization of corresponding virtualization instances and other equipment in the running environment of the target safety equipment.
4. The method and system for managing the topology of the network security device according to claim 3, wherein: the transmission data safety operation module is completed by a safety management configuration center calling a function of a virtualization management center, and the virtual safety equipment safety service configuration is used for setting the safety service of the virtual safety equipment so as to exert the safety function of the virtual safety equipment.
5. The method and system for managing the topology of the network security device according to claim 3, wherein: the data iteration safety module is respectively connected with a data monitoring and analyzing module and a topology management and evaluation module in a signal transmission way.
6. The method and system for managing the topology of the network security device according to claim 5, wherein: and identifying and analyzing the route topology view by adopting micro service to the safety management server through a data monitoring and analyzing module in the data iteration safety module to obtain the fault of the path of the existing route in the network system to be managed, wherein the path is not communicated.
7. The method and system for managing the topology of the network security device according to claim 5, wherein: and establishing a safety monitoring and managing system and an emergency response system through the topology management evaluation module to manage and control the host equipment, the network equipment and the infrastructure protection facilities.
8. The method and system for managing the topology of the network security device according to claim 1, wherein: the bus type management module is respectively connected with a path tracing module, a security repair detection module and an arrangement engine management module in a signal transmission mode, and the path tracing module can identify the maintenance cost and the security strategy of the network topology and support the path tracing analysis and presentation of information such as source addresses, destination addresses and ports.
9. The method and system for managing the topology of the network security device according to claim 8, wherein: the simple information security service problem is repaired through the security repair detection module, and the operation steps required by the service can be completed only by transmitting the actual scene picture to the terminal desktop of the service staff through video on site by the service staff and common staff of the client side through voice conversation.
10. The method and system for managing the topology of the network security device according to claim 1, wherein: the routing table analysis capability of the topology generation engine integrating the mainstream network equipment and the safety equipment can be realized through the arrangement engine management module, the generation of three-layer network topology is carried out according to the routing table information, meanwhile, the network topology management aiming at the host layer can be realized by combining the two-layer MAC address information, and then the arrangement engine management module utilizes the safety controller to realize the network topology management according to the type of the safety equipment and other service parameters.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744082.5A CN115102865A (en) | 2022-06-27 | 2022-06-27 | Network security device topology management method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210744082.5A CN115102865A (en) | 2022-06-27 | 2022-06-27 | Network security device topology management method and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115102865A true CN115102865A (en) | 2022-09-23 |
Family
ID=83295271
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210744082.5A Pending CN115102865A (en) | 2022-06-27 | 2022-06-27 | Network security device topology management method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115102865A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115865644A (en) * | 2022-11-09 | 2023-03-28 | 浪潮通信信息系统有限公司 | Service fault processing method, device, equipment and storage medium |
| CN119171638A (en) * | 2024-11-20 | 2024-12-20 | 佳源科技股份有限公司 | Electricity collection safety monitoring method based on intelligent remote control |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050180335A1 (en) * | 2004-02-13 | 2005-08-18 | Lucent Technologies Inc. | Path based network management method and apparatus for data communication networks |
| CN102111440A (en) * | 2010-12-31 | 2011-06-29 | 深圳市永达电子股份有限公司 | Real-time information safety service method and system for supporting dynamic interaction |
| CN103067380A (en) * | 2012-12-26 | 2013-04-24 | 北京启明星辰信息技术股份有限公司 | Deployment configuration method and system of virtual safety device |
| CN103338128A (en) * | 2013-02-25 | 2013-10-02 | 中国人民解放军91655部队 | Information security management system with integrated security management and control function |
| WO2014015697A1 (en) * | 2012-05-04 | 2014-01-30 | 运软网络科技(上海)有限公司 | Autonomic management system and method of virtual network |
| CN109768880A (en) * | 2018-12-17 | 2019-05-17 | 国网重庆市电力公司 | A kind of network topology distant place visualizing monitor method towards electric power monitoring system |
| CN111669401A (en) * | 2020-06-22 | 2020-09-15 | 南方电网数字电网研究院有限公司 | Security protection method, device, computer equipment and storage medium for network system |
| CN112333025A (en) * | 2020-11-19 | 2021-02-05 | 中国人民解放军国防科技大学 | Network security simulation training method, device and system |
| CN114244763A (en) * | 2021-12-20 | 2022-03-25 | 中电福富信息科技有限公司 | Dynamic network topology management method and system based on rule engine |
-
2022
- 2022-06-27 CN CN202210744082.5A patent/CN115102865A/en active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050180335A1 (en) * | 2004-02-13 | 2005-08-18 | Lucent Technologies Inc. | Path based network management method and apparatus for data communication networks |
| CN102111440A (en) * | 2010-12-31 | 2011-06-29 | 深圳市永达电子股份有限公司 | Real-time information safety service method and system for supporting dynamic interaction |
| WO2014015697A1 (en) * | 2012-05-04 | 2014-01-30 | 运软网络科技(上海)有限公司 | Autonomic management system and method of virtual network |
| CN103067380A (en) * | 2012-12-26 | 2013-04-24 | 北京启明星辰信息技术股份有限公司 | Deployment configuration method and system of virtual safety device |
| CN103338128A (en) * | 2013-02-25 | 2013-10-02 | 中国人民解放军91655部队 | Information security management system with integrated security management and control function |
| CN109768880A (en) * | 2018-12-17 | 2019-05-17 | 国网重庆市电力公司 | A kind of network topology distant place visualizing monitor method towards electric power monitoring system |
| CN111669401A (en) * | 2020-06-22 | 2020-09-15 | 南方电网数字电网研究院有限公司 | Security protection method, device, computer equipment and storage medium for network system |
| CN112333025A (en) * | 2020-11-19 | 2021-02-05 | 中国人民解放军国防科技大学 | Network security simulation training method, device and system |
| CN114244763A (en) * | 2021-12-20 | 2022-03-25 | 中电福富信息科技有限公司 | Dynamic network topology management method and system based on rule engine |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115865644A (en) * | 2022-11-09 | 2023-03-28 | 浪潮通信信息系统有限公司 | Service fault processing method, device, equipment and storage medium |
| CN119171638A (en) * | 2024-11-20 | 2024-12-20 | 佳源科技股份有限公司 | Electricity collection safety monitoring method based on intelligent remote control |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10103851B2 (en) | Network link monitoring and testing | |
| CN102158360B (en) | Network fault self-diagnosis method based on causal relationship positioning of time factors | |
| US6532554B1 (en) | Network event correlation system using formally specified models of protocol behavior | |
| WO2021008031A1 (en) | Processing method for implementing monitoring intellectualization on the basis of micro-services, and electronic device | |
| CN108306747B (en) | A cloud security detection method, device and electronic device | |
| WO2016119436A1 (en) | Alarm processing method and device, and controller | |
| CN109150869B (en) | A system and method for collecting and analyzing switch information | |
| CN104219091A (en) | System and method for network operation fault detection | |
| CN115102865A (en) | Network security device topology management method and system | |
| CN112468335A (en) | IPRAN cloud private line fault positioning method and device | |
| CN109120522A (en) | A kind of multipath state monitoring method and device | |
| CN112003747A (en) | Fault positioning method of cloud virtual gateway | |
| CN103957138A (en) | Network monitoring method, device and system | |
| CN102217232A (en) | Method for determining running condition of network element and relevant device and system | |
| CN111147516B (en) | SDN-based dynamic interconnection and intelligent routing decision system and method for security equipment | |
| US20190207805A1 (en) | Node fault isolation | |
| WO2024051258A1 (en) | Event processing method, apparatus and system | |
| CN114389991B (en) | Intelligent network flow scheduling management method and device | |
| CN114172789B (en) | Virtual equipment link detection method, device, equipment and storage medium | |
| CN112636944A (en) | OLT equipment offline intelligent diagnosis method and system | |
| CN117560270A (en) | Network fault locating methods, devices, media and electronic equipment | |
| CN119520341B (en) | A method and apparatus for detecting server links | |
| JP3249851U (en) | Alarm system for monitoring network devices in virtualization platforms | |
| CN115834339B (en) | A cross-domain ground test, launch and control network real-time monitoring system and method | |
| CN112653587B (en) | Network connectivity state detection method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220923 |