Disclosure of Invention
Based on at least one of the above technical problems, the present invention provides a new computer network protection scheme, which can effectively prevent an illegal requester from invading the network and improve the security of the network.
In view of the above, the present invention provides a new computer network protection method, including: when a network access request sent by a requester is detected, judging whether the requester is in a white list, wherein the network access request comprises identification information and a data packet of the requester; when the requesting party is determined not to be in the white list, sending an authentication request to a specified monitoring terminal, and determining whether to respond to the network access request according to an authentication result; and when the requester is determined to be in the white list, encrypting the data packet in the network access request, and responding to the network access request.
In the foregoing technical solution, preferably, the white list includes a plurality of identification information, and the step of determining whether the requesting party is in the white list specifically includes: extracting identification information of the requester from the network access request; and judging whether the identification information of the requesting party is in the white list, and if so, indicating that the requesting party is in the white list.
In any one of the foregoing technical solutions, preferably, the step of sending an authentication request to a designated monitoring terminal and determining whether to respond to the network access request according to an authentication result specifically includes: detecting whether authentication passing information fed back by the specified monitoring terminal is acquired within preset time; if the authentication passing information is received, responding to the network access request; and if the authentication passing information is not received within the preset time, forbidding the network access request, and adding the requesting party into a blacklist.
According to a second aspect of the present invention, there is provided a computer network defense system, comprising: the device comprises a judging unit, a processing unit and a processing unit, wherein the judging unit is used for judging whether a request party is in a white list or not when a network access request sent by the request party is detected, and the network access request comprises identification information and a data packet of the request party; the first processing unit is used for sending an authentication request to a specified monitoring terminal when the requesting party is determined not to be in a white list, and determining whether to respond to the network access request according to an authentication result; and the second processing unit is used for encrypting the data packet in the network access request and responding to the network access request when the requester is determined to be in the white list.
In the foregoing technical solution, preferably, the white list includes a plurality of identification information, and the determining unit is specifically configured to: extracting identification information of the requester from the network access request; and judging whether the identification information of the requesting party is in the white list, and if so, indicating that the requesting party is in the white list.
In any one of the above technical solutions, preferably, the first processing unit is specifically configured to: detecting whether authentication passing information fed back by the specified monitoring terminal is acquired within preset time; if the authentication passing information is received, responding to the network access request; and if the authentication passing information is not received within the preset time, forbidding the network access request, and adding the requesting party into a blacklist.
According to a third aspect of the invention, there is provided a computer device comprising: a processor; and a memory communicatively coupled to the processor; wherein the memory stores readable instructions which, when executed by the processor, implement the method of any of the above aspects.
According to a fourth aspect of the present invention, a computer readable storage medium is presented, having stored thereon a computer program, which when executed, performs the method according to any of the previous claims.
Through the technical scheme, when a requester has a network access requirement, whether the requester is legal is detected, whether the requester is in a white list is specifically judged, if the requester is in the white list, the requester is allowed to access the network, if the requester is not in the white list, the requester is required to be further authenticated through a designated monitoring terminal, the access is prohibited if the authentication passes through the permission of the requester and does not pass through the permission of the requester, and therefore the security of the network is ensured.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Referring to fig. 1, the method for protecting a computer network according to an embodiment of the present invention specifically includes the following steps:
step S102, when a network access request sent by a requester is detected, judging whether the requester is in a white list, wherein the network access request comprises identification information and a data packet of the requester.
Specifically, the white list has a plurality of identification information, and the specific determination process is as follows: and extracting the identification information of the requesting party from the network access request, judging whether the identification information of the requesting party is in a white list, and if so, indicating that the requesting party is in the white list.
And step S104, when the requesting party is determined not to be in the white list, sending an authentication request to the appointed monitoring terminal, and determining whether to respond to the network access request according to an authentication result.
And step S106, when the requesting party is determined to be in the white list, encrypting the data packet in the network access request, and responding to the network access request.
Further, step S104 specifically includes: detecting whether authentication passing information fed back by a specified monitoring terminal is acquired within preset time; if the authentication passing information is received, responding to the network access request; and if the authentication passing information is not received within the preset time, forbidding the network access request, and adding the requesting party into the blacklist.
As shown in fig. 2, a computer network defense system 200 according to an embodiment of the invention includes: a judging unit 202, a first processing unit 204 and a second processing unit 206.
The determining unit 202 is configured to determine whether a requester is in a white list when a network access request sent by the requester is detected, where the network access request includes identification information and a data packet of the requester; the first processing unit 204 is configured to send an authentication request to the designated monitoring terminal when it is determined that the requesting party is not in the white list, and determine whether to respond to the network access request according to an authentication result; the second processing unit 206 is configured to perform encryption processing on the data packet in the network access request and respond to the network access request when it is determined that the requesting party is on the white list.
Further, there are a plurality of identification information in the white list, and the determining unit 202 is specifically configured to: extracting identification information of a requester from the network access request; and judging whether the identification information of the requesting party is in a white list or not, and if so, indicating that the requesting party is in the white list.
Further, the first processing unit 204 is specifically configured to: detecting whether authentication passing information fed back by a specified monitoring terminal is acquired within preset time; if the authentication passing information is received, responding to the network access request; and if the authentication passing information is not received within the preset time, forbidding the network access request, and adding the requesting party into the blacklist.
When a requester has a network access requirement, detecting whether the requester is legal, specifically judging whether the requester is in a white list, if so, allowing the requester to access the network, if not, further authenticating by a specified monitoring terminal, allowing the requester to access the network by authentication, and forbidding access if not, thereby ensuring the security of the network.
As shown in fig. 3, a computer apparatus 300 according to an embodiment of the present invention includes: a memory 302, a processor 304, and a communication bus 306. Wherein the memory 302 is configured to store executable instructions; the processor 304 is configured to execute the stored instructions to implement the steps of the method according to any of the above embodiments, so as to have all the technical effects of the data analysis method, which will not be described herein again.
In particular, the memory 302 described above may include mass storage for data or instructions. By way of example, and not limitation, memory 302 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 302 may include removable or non-removable (or fixed) media, where appropriate. The memory 302 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 302 is a non-volatile solid-state memory. In a particular embodiment, the memory 302 includes Read Only Memory (ROM). Where appropriate, the ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory or a combination of two or more of these. The processor 304 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured as one or more integrated circuits implementing embodiments of the present invention. The communication bus 306 is used to enable connection communication between the signal processor 304 and the memory 302. The communication bus 306 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc.
An embodiment of the fourth aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when being executed by a processor, implements the steps of the method according to any of the above technical solutions, so as to have all the technical effects of the data analysis method, and therefore, the details are not repeated herein. Computer readable storage media may include any medium that can store or transfer information. Examples of computer readable storage media include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.