[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109922055A - A kind of detection method, system and the associated component of risk terminal - Google Patents

A kind of detection method, system and the associated component of risk terminal Download PDF

Info

Publication number
CN109922055A
CN109922055A CN201910142072.2A CN201910142072A CN109922055A CN 109922055 A CN109922055 A CN 109922055A CN 201910142072 A CN201910142072 A CN 201910142072A CN 109922055 A CN109922055 A CN 109922055A
Authority
CN
China
Prior art keywords
terminal
security
risk
end message
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910142072.2A
Other languages
Chinese (zh)
Inventor
刘媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Technology Co Ltd Of Xin Ruiwang Section Of Shenzhen
Original Assignee
Technology Co Ltd Of Xin Ruiwang Section Of Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Technology Co Ltd Of Xin Ruiwang Section Of Shenzhen filed Critical Technology Co Ltd Of Xin Ruiwang Section Of Shenzhen
Priority to CN201910142072.2A priority Critical patent/CN109922055A/en
Publication of CN109922055A publication Critical patent/CN109922055A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of detection method of risk terminal, the detection method includes the end message for obtaining multiple target terminals of access switch;Wherein, the target terminal includes wireless terminal and catv terminal, and end message includes terminal information off-line, Network Quality Analysis data, security incident statistical information and terminal individual information;The end message is sent to security linkage network equipment, so that the security linkage network equipment carries out safety detection operation to the end message;When the security linkage network equipment detects security risk, determine the corresponding target terminal of the security risk for risk terminal.The safety monitoring of wireless terminal and catv terminal can be combined by this method, realize wired, wireless integral comprehensive security monitoring.Disclosed herein as well is a kind of detection system of risk terminal, a kind of computer readable storage medium and a kind of electronic equipment, have the above beneficial effect.

Description

A kind of detection method, system and the associated component of risk terminal
Technical field
This application involves field of information security technology, in particular to a kind of detection method of risk terminal, system, Yi Zhongji Calculation machine readable storage medium storing program for executing and a kind of electronic equipment.
Background technique
In enterprise's high speed development, operation system is multiplied, and causes the difficulty of security protection also continuing to increase, O&M people Member in face of complicated operation system often can not accurate awareness network security status, do not know in network what has all connect The equipment of type, it is unclear that whether corporate networks are safe, lack perfect precautionary measures.
In the prior art, wireless manufacturer, can be right often through the linkage of wireless aware platform and Security Policy Server Virus infection or the various ways such as there are the underproof wireless clients such as system vulnerability to carry out offline, isolation, reminds or monitors Processing, only wireless client, which meets, just allows normal access network after corresponding security strategy, to improve wireless The overall security of network.But the prior art lacks the safety monitoring for catv terminal, can not comprehensively be prevented It is imperial.
Therefore, how the safety monitoring of wireless terminal and catv terminal to be combined, is realized wired, wireless integral Comprehensive security monitoring is a technical problem that technical personnel in the field need to solve at present.
Summary of the invention
The purpose of the application is to provide the detection method, system, a kind of computer readable storage medium of a kind of risk terminal And a kind of electronic equipment, the safety monitoring of wireless terminal and catv terminal can be combined, realize wired, wireless integral Comprehensive security monitoring.
In order to solve the above technical problems, the application provides a kind of detection method of risk terminal, which includes:
Obtain the end message of multiple target terminals of access switch;Wherein, the target terminal includes wireless terminal And catv terminal, the end message include terminal information off-line, Network Quality Analysis data, security incident statistical information and end Hold individual information;
End message is sent to security linkage network equipment, so that security linkage network equipment carries out safety detection behaviour to end message Make;
When security linkage network equipment detects security risk, determine that the corresponding target terminal of security risk is risk terminal.
Optionally, terminal information off-line includes offline number, limitation time and offline trend;Network Quality Analysis data packet Include packet loss seniority among brothers and sisters;Security incident statistical information includes security incident sum, private expansion network edge information, terminal abnormal drift letter Breath and sets up Dynamic Host Configuration Protocol server event statistical data illegally at static IP exception information;Terminal individual information includes terminal traffic trends, stream Amount load, the SOT state of termination and packet loss.
Optionally, further includes:
Identify the terminal type of target terminal;
Judge whether target terminal is illegal terminal according to terminal type;
If so, control interchanger executes offline operation to target terminal.
Optionally, this method further include:
Visualization processing is carried out to end message and obtains the SOT state of termination, and the display terminal state in the safe condition page.
Optionally, after determining the corresponding target terminal of security risk for risk terminal, further includes:
It controls interchanger and offline operation or isolated operation is executed to the corresponding target terminal of security risk.
Present invention also provides a kind of detection system of risk terminal, which includes:
Data obtaining module, the end message of multiple target terminals for obtaining access switch;Wherein, the target Terminal includes wireless terminal and catv terminal, and the end message includes terminal information off-line, Network Quality Analysis data, safety Event statistics information and terminal individual information;
Safety linkage module, for end message to be sent to security linkage network equipment, so as to security linkage network equipment pair End message carries out safety detection operation;
Determination module, for when security linkage network equipment detects security risk, determining that the corresponding target of security risk is whole End is risk terminal.
Optionally, terminal information off-line includes offline number, limitation time and offline trend;Network Quality Analysis data packet Include packet loss seniority among brothers and sisters;Security incident statistical information includes security incident sum, private expansion network edge information, terminal abnormal drift letter Breath and sets up DHCP (Dynamic Host Configuration Protocol, dynamic host configuration illegally at static IP exception information Agreement) server event statistical data;Terminal individual information includes terminal traffic trends, flow load, the SOT state of termination and packet loss Rate.
Optionally, further includes:
Terminal type identification module, for identification terminal type of target terminal;It is also used to judge mesh according to terminal type Mark whether terminal is illegal terminal;If so, control interchanger executes offline operation to target terminal.
Optionally, the system further include:
Visualization model obtains the SOT state of termination for carrying out visualization processing to end message, and in the safe condition page Middle display terminal state.
Optionally, further includes:
Risk terminal processing module, for control interchanger to the corresponding target terminal of security risk execute it is offline operation or Isolated operation.
Present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, computer program The step of detection method of above-mentioned risk terminal executes is realized when execution.
Present invention also provides a kind of electronic equipment, including memory and processor, computer journey is stored in memory Sequence, processor realize the step of detection method of above-mentioned risk terminal executes when calling the computer program in memory.
This application provides a kind of detection method of risk terminal, multiple target terminals including obtaining access switch End message;Wherein, target terminal includes wireless terminal and catv terminal, and the end message includes terminal information off-line, net Network mass analysis data, security incident statistical information and terminal individual information;End message is sent to security linkage network equipment, with Just security linkage network equipment carries out safety detection operation to end message;When security linkage network equipment detects security risk, determine The corresponding target terminal of security risk is risk terminal.
The application obtains the end message of multiple target terminals of access switch first, and interchanger can receive wireless end The end message at end also can receive the end message of catv terminal, but the terminal of catv terminal is only used only in the prior art Information carries out safety monitoring, and the operation of safety monitoring is not related to wireless terminal.The application is wireless by obtaining to interchanger The end message of terminal and the end message of catv terminal carry out safety interaction, realize port level closure, join when by safety Dynamic detect then can be determined that the corresponding target terminal of security risk is risk terminal when security risk.The application is by wireless terminal Safety monitoring with catv terminal is combined, and realizes wired, wireless integral comprehensive security monitoring.The application is gone back simultaneously Detection system, a kind of computer readable storage medium and a kind of electronic equipment of a kind of risk terminal are provided, is had with above-mentioned Beneficial effect, details are not described herein.
Detailed description of the invention
In ord to more clearly illustrate embodiments of the present application, attached drawing needed in the embodiment will be done simply below It introduces, it should be apparent that, the drawings in the following description are only some examples of the present application, for ordinary skill people For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the detection method of risk terminal provided by the embodiment of the present application;
Fig. 2 is the flow chart of the detection method of another kind risk terminal provided by the embodiment of the present application;
Fig. 3 is a kind of structural schematic diagram of the detection system of risk terminal provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Below referring to Figure 1, Fig. 1 is a kind of process of the detection method of risk terminal provided by the embodiment of the present application Figure.
Specific steps may include:
S101: the end message of multiple target terminals of access switch is obtained;
Wherein, there are multiple target terminal access switch for this step default, do not limit the quantity of target terminal herein With type.It should be noted that the target terminal of access switch had not only included catv terminal but also had included wireless terminal.Specifically, Wireless terminal can pass through wireless aware platform access switch.
The executing subject of the present embodiment can be the controller connecting with interchanger, which can be with multiple switch Connection, that is to say, that controller is available any in this step or appoints the corresponding end message of several interchangers, herein not into Row is specific to be limited.
As an alternative embodiment, end message acquired in this implementation may include: the end of target terminal Hold information off-line, Network Quality Analysis data, security incident statistical information and terminal individual information.Specifically, terminal is believed offline Breath may include offline number, limitation time and offline trend, and Network Quality Analysis data may include packet loss seniority among brothers and sisters, safety Event statistics information may include security incident sum, private expansion network edge information, terminal abnormal drift information, static IP exception Information and set up Dynamic Host Configuration Protocol server event statistical data illegally, terminal individual information may include terminal traffic trends, flow load, end End state and packet loss.Certainly, the example above is only explanation for end message, and end message may include still not only It is limited to above content, those skilled in the art can obtain according to concrete application scene this step of flexible choice of the present embodiment End message particular content.
It should be noted that be for the safety prevention measure of catv terminal and wireless terminal in the prior art it is separated, It links in the prior art for the detection of wireless terminal often by with Security Policy Server, this mode is due to money Source and configuration be not mutually indepedent, and the excessively linkage of reliance server be easy to cause conflict and loss.And in the present embodiment, control Device processed obtains the end message of the catv terminal and wireless terminal that access in interchanger, carries out the related behaviour of safety interaction in S102 Make, realizes the port level closure in conjunction with interchanger, significantly improve Prevention-Security effect.
S102: being sent to security linkage network equipment for end message, so that security linkage network equipment carries out safety to end message Detection operation;
Wherein, this step is established on the basis of S101 has obtained the end message of target terminal, and the present embodiment is silent Recognize controller and be associated with a variety of safety equipments, the equipment of safety interaction will be carried out in the present embodiment with controller as safety connection Dynamic equipment.
Specifically, the security linkage network equipment being previously mentioned in the present embodiment may include firewall, latent threat probe, safety Any one of aware platform appoints several combinations.For example, after by terminal information transfer to security linkage network equipment, by each Security linkage network equipment carries out analysis realization to end message and the safety detection of target terminal is operated, once security linkage network equipment Between the security risk that perceives can link, realize the closure for carrying out access interface rank to risk terminal, provide more Good guarantee intranet security.
It is understood that not limiting the quantity and type of security linkage network equipment in this step, controller is not also limited Which kind of strategy end message is sent to security linkage network equipment according to, the purpose of this step is through this side of safety interaction in a word Formula detects whether target terminal is risk terminal.
S103: when security linkage network equipment detects security risk, determine that the corresponding target terminal of security risk is risk Terminal.
Wherein, when detecting security risk, this step will cause the target terminal of the security risk as risk terminal, Determine that the corresponding target terminal of security risk is risk terminal.Since there are one to network for the corresponding target terminal of security risk Fixed threat, the control for needing that certain measure is taken to realize for risk terminal.As a preferred embodiment, sentencing Certain fixed target terminal executes offline operation or isolated operation to the target terminal after risk terminal, to can control interchanger, The target terminal can also be added in blacklist, to promote the safe coefficient of network.
The present embodiment obtains the end message of multiple target terminals of access switch first, and interchanger can receive wirelessly The end message of terminal also can receive the end message of catv terminal, but the end of catv terminal is only used only in the prior art Client information carries out safety monitoring, and the operation of safety monitoring is not related to wireless terminal.The application passes through the nothing that obtains to interchanger The end message of the end message of line terminal and catv terminal carries out safety interaction, realizes port level closure, when passing through safety Linkage, which detects, then can be determined that the corresponding target terminal of security risk is risk terminal when security risk.The present embodiment will be wireless The safety monitoring of terminal and catv terminal is combined, and realizes wired, wireless integral comprehensive security monitoring.
As advanced optimizing for the corresponding embodiment of Fig. 1, after S101 obtains end message, there may also be with Lower operation:
Step 1: identifying the terminal type of target terminal.
Step 2: judging whether target terminal is illegal terminal according to terminal type;If so, entering step 3;If it is not, then Terminate process.
Step 3: control interchanger executes offline operation to target terminal.
Aforesaid operations can be convenient for all devices type accessed in staff's awareness network, can be by inquiring black name It is single to judge whether target terminal is illegal terminal (e.g., private connects router), to be managed.Specifically, identification target terminal Terminal type can by terminal type library based on fingerprint bank automatic identification IOT equipment, mobile terminal to target terminal Terminal type is identified.
As further supplement, after S101 obtains end message, terminal can also be believed by visualization model Breath carries out visualization processing and obtains the SOT state of termination, and the display terminal state in the safe condition page, and the content of display can wrap Terminal off-line tracking is included, offline number, standby time, offline trend support Network Quality Analysis packet loss seniority among brothers and sisters etc.;Support peace Total event statistics, such as: security incident sum, private expansion network edge, terminal abnormal drift, static IP are abnormal;Set up DHCP service illegally Device event statistics;Individual information, as SOT state of termination list is shown;Terminal details, such as terminal traffic trends, flow load, terminal State, packet loss etc..
Fig. 2 is referred to below, and Fig. 2 is the process of the detection method of another kind risk terminal provided by the embodiment of the present application Figure;The present embodiment is the more fully explanation to the corresponding embodiment of Fig. 1, and there are the implementation corresponding with Fig. 1 of certain steps is basic Unanimously, can be with cross-reference, details are not described herein again.
Specific steps may include:
S201: terminal information off-line, the Network Quality Analysis data, safety of multiple target terminals of access switch are obtained Event statistics information and terminal individual information;
Wherein, terminal information off-line includes that offline number, limitation time and offline trend, Network Quality Analysis data include Packet loss seniority among brothers and sisters, security incident statistical information include security incident sum, private expansion network edge information, terminal abnormal drift letter Breath and sets up Dynamic Host Configuration Protocol server event statistical data illegally at static IP exception information, and terminal individual information includes terminal traffic trends, stream Amount load, the SOT state of termination and packet loss.
S202: the terminal type of target terminal is identified;
S203: judge whether target terminal is illegal terminal according to terminal type;If so, entering step S206;If it is not, Then enter S204.
S204: being sent to security linkage network equipment for end message, so that security linkage network equipment carries out safety to end message Detection operation;
S205: when security linkage network equipment detects security risk, determine that the corresponding target terminal of security risk is risk Terminal.
S206: control interchanger executes offline operation or isolated operation to target terminal.
It should be noted that being actually when detecting that certain target terminal is illegal terminal in S206 to the target terminal Offline operation or isolated operation are executed, offline operation is executed to the target terminal when detecting that certain target terminal is risk terminal Or isolated operation, it is not that offline operation or isolated operation are executed to all target terminals.
As a preferred embodiment, the interchanger that the present embodiment is previously mentioned can be the exchange of support image feature Machine, preferably to cooperate a kind of SIP equipment (safe aware platform) corresponding Intranet flow to be analyzed.Interchanger can be supported Port Mirroring supports that, by ACL mirror image, support is mirrored to common mouth, optical port, aggregation port.
Fig. 3 is referred to, Fig. 3 is a kind of structural representation of the detection system of risk terminal provided by the embodiment of the present application Figure;
The system may include:
Data obtaining module 100, the end message of multiple target terminals for obtaining access switch;Wherein, described Target terminal includes wireless terminal and catv terminal, the end message include terminal information off-line, Network Quality Analysis data, Security incident statistical information and terminal individual information;
Safety linkage module 200, for end message to be sent to security linkage network equipment, so as to security linkage network equipment Safety detection operation is carried out to end message;
Specifically, safety linkage module can help in enterprise's office network deploying SIP Intranet aware platform, nothing When lane controller and switch device, the security risk that each equipment room perceives can be carried out linkage, access to risk terminal The other closure of port level, preferably ensures intranet security.Function is to support to report to deeply convinced safety equipment (such as SIP, AF) to connect Enter end message, comprising IP, MAC, user name, APID/SWID, AP/SW, UTC time, formed with deeply convinced safety equipment " Intranet gras generally recognized as safe " comprehensive solution;The request for the lockout risk terminal for supporting reception deeply convinced safety equipment to issue, it is right Risk terminal, which is freezed and passes through APP, notifies administrator;Support the safe condition page in statistics display linkage event times and Details.Safety linkage module may include terminal security strategy submodule and interchanger mirror image submodule, security strategy Module avoids the occurrence of the random configuration of IP of terminal, IP is caused to conflict, is non-for the corresponding personalized secure strategy of application scenarios to be arranged The problems such as method is using privilege IP saves O&M cost, can be also used for carrying out static IP abnormality detection, carries out port mac binding Detection carries out private and connects the detection of the terminal types such as router, port blocked, addition blacklist after security strategy event occurs.It hands over The information that mirror image submodule of changing planes is used to obtain data obtaining module carries out mirror image processing, and the security incident that mirror image is obtained is believed Breath is transmitted to the safety equipment of collaborative support function.
Determination module 300, for when security linkage network equipment detects security risk, determining the corresponding target of security risk Terminal is risk terminal.
The present embodiment obtains the end message of multiple target terminals of access switch first, and interchanger can receive wirelessly The end message of terminal also can receive the end message of catv terminal, but the end of catv terminal is only used only in the prior art Client information carries out safety monitoring, and the operation of safety monitoring is not related to wireless terminal.The application passes through the nothing that obtains to interchanger The end message of the end message of line terminal and catv terminal carries out safety interaction, realizes port level closure, when passing through safety Linkage, which detects, then can be determined that the corresponding target terminal of security risk is risk terminal when security risk.The present embodiment will be wireless The safety monitoring of terminal and catv terminal is combined, and realizes wired, wireless integral comprehensive security monitoring.
Further, terminal information off-line includes offline number, limitation time and offline trend;Network Quality Analysis data It is ranked including packet loss;Security incident statistical information includes security incident sum, private expansion network edge information, terminal abnormal drift Information, static IP exception information and set up Dynamic Host Configuration Protocol server event statistical data illegally;Terminal individual information include terminal traffic trends, Flow load, the SOT state of termination and packet loss.
Further, further includes:
Terminal type identification module, for identification terminal type of target terminal;It is also used to judge mesh according to terminal type Mark whether terminal is illegal terminal;If so, control interchanger executes offline operation to target terminal.
Further, further include
Visualization model obtains the SOT state of termination for carrying out visualization processing to end message, and in the safe condition page Middle display terminal state.
Further, further includes:
Risk terminal processing module, for control interchanger to the corresponding target terminal of security risk execute it is offline operation or Isolated operation.
Since the embodiment of components of system as directed is corresponded to each other with the embodiment of method part, the embodiment of components of system as directed is asked Referring to the description of the embodiment of method part, wouldn't repeat here.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program It is performed and step provided by above-described embodiment may be implemented.The storage medium may include: USB flash disk, mobile hard disk, read-only deposit Reservoir (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or The various media that can store program code such as CD.
Present invention also provides a kind of electronic equipment, may include memory and processor, have meter in the memory Calculation machine program may be implemented provided by above-described embodiment when the processor calls the computer program in the memory Step.Certain electronic equipment can also include various network interfaces, the components such as power supply.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, also Can to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application It is interior.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.Under the situation not limited more, the element limited by sentence "including a ..." is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (12)

1. a kind of detection method of risk terminal characterized by comprising
Obtain the end message of multiple target terminals of access switch;Wherein, the target terminal includes wireless terminal and has Line terminal, the end message include terminal information off-line, Network Quality Analysis data, security incident statistical information and terminal Body information;
The end message is sent to security linkage network equipment, so that the security linkage network equipment pacifies the end message Full inspection surveys operation;
When the security linkage network equipment detects security risk, determine the corresponding target terminal of the security risk for risk end End.
2. detection method according to claim 1, which is characterized in that the terminal information off-line includes offline number, limitation Time and offline trend;The Network Quality Analysis data include packet loss seniority among brothers and sisters;The security incident statistical information includes peace Total event sum, private expand network edge information, terminal abnormal drift information, static IP exception information and set up Dynamic Host Configuration Protocol server thing illegally Part statistical data;The terminal individual information includes terminal traffic trends, flow load, the SOT state of termination and packet loss.
3. detection method according to claim 1, which is characterized in that further include:
Identify the terminal type of the target terminal;
Judge whether the target terminal is illegal terminal according to the terminal type;
Offline operation is executed to the target terminal if so, controlling the interchanger.
4. detection method according to claim 1, which is characterized in that further include:
Visualization processing is carried out to the end message and obtains the SOT state of termination, and shows the terminal shape in the safe condition page State.
5. according to claim 1 to any one of 4 detection methods, which is characterized in that determining that the security risk is corresponding Target terminal is after risk terminal, further includes:
It controls the interchanger and offline operation or isolated operation is executed to the corresponding target terminal of the security risk.
6. a kind of detection system of risk terminal characterized by comprising
Data obtaining module, the end message of multiple target terminals for obtaining access switch;Wherein, the target terminal Including wireless terminal and catv terminal, the end message includes terminal information off-line, Network Quality Analysis data, security incident Statistical information and terminal individual information;
Safety linkage module, for the end message to be sent to security linkage network equipment, so that the safety interaction is set It is standby that safety detection operation is carried out to the end message;
Determination module, for determining the corresponding mesh of the security risk when the security linkage network equipment detects security risk Mark terminal is risk terminal.
7. detection system according to claim 6, which is characterized in that the terminal information off-line includes offline number, limitation Time and offline trend;The Network Quality Analysis data include packet loss seniority among brothers and sisters;The security incident statistical information includes peace Total event sum, private expand network edge information, terminal abnormal drift information, static IP exception information and set up Dynamic Host Configuration Protocol server thing illegally Part statistical data;The terminal individual information includes terminal traffic trends, flow load, the SOT state of termination and packet loss.
8. detection system according to claim 6, which is characterized in that further include:
Terminal type identification module, for identification terminal type of the target terminal;It is also used to be sentenced according to the terminal type Whether the target terminal that breaks is illegal terminal;Offline operation is executed to the target terminal if so, controlling the interchanger.
9. detection system according to claim 6, which is characterized in that further include
Visualization model obtains the SOT state of termination for carrying out visualization processing to the end message, and in the safe condition page The middle display SOT state of termination.
10. according to any one of claim 6 to 9 detection system, which is characterized in that further include:
Risk terminal processing module executes offline behaviour to the corresponding target terminal of the security risk for controlling the interchanger Work or isolated operation.
11. a kind of electronic equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the detection of the risk terminal as described in any one of claim 1 to 5 when for executing the computer program The step of method.
12. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the detection side of the risk terminal as described in any one of claim 1 to 5 when the computer program is executed by processor The step of method.
CN201910142072.2A 2019-02-26 2019-02-26 A kind of detection method, system and the associated component of risk terminal Pending CN109922055A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142072.2A CN109922055A (en) 2019-02-26 2019-02-26 A kind of detection method, system and the associated component of risk terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142072.2A CN109922055A (en) 2019-02-26 2019-02-26 A kind of detection method, system and the associated component of risk terminal

Publications (1)

Publication Number Publication Date
CN109922055A true CN109922055A (en) 2019-06-21

Family

ID=66962345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142072.2A Pending CN109922055A (en) 2019-02-26 2019-02-26 A kind of detection method, system and the associated component of risk terminal

Country Status (1)

Country Link
CN (1) CN109922055A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111372077A (en) * 2020-03-16 2020-07-03 深信服科技股份有限公司 Camera control method and device, terminal equipment and storage medium
CN112104618A (en) * 2020-08-27 2020-12-18 深信服科技股份有限公司 Information determination method, information determination device and computer readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821097A (en) * 2012-07-17 2012-12-12 浙江宇视科技有限公司 Access detecting method and device
CN103179130A (en) * 2013-04-06 2013-06-26 杭州盈高科技有限公司 Intranet security unified management platform and management method of management platform
CN204013576U (en) * 2014-06-10 2014-12-10 高芳 The intranet security platform of Data Control
CN104901838A (en) * 2015-06-23 2015-09-09 中国电建集团成都勘测设计研究院有限公司 Enterprise network safety event management system and method thereof
CN106506195A (en) * 2016-10-19 2017-03-15 广州新蓝网络科技有限公司 Mobile terminal safety management method and terminal management all-in-one
CN107493265A (en) * 2017-07-24 2017-12-19 南京南瑞集团公司 A kind of network security monitoring method towards industrial control system
CN108337270A (en) * 2018-05-18 2018-07-27 梧州井儿铺贸易有限公司 A kind of enterprise network security event management system
CN109150869A (en) * 2018-08-14 2019-01-04 南瑞集团有限公司 A kind of exchanger information acquisition analysis system and method
CN109309678A (en) * 2018-09-28 2019-02-05 深圳市极限网络科技有限公司 Network risks method for early warning based on artificial intelligence

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821097A (en) * 2012-07-17 2012-12-12 浙江宇视科技有限公司 Access detecting method and device
CN103179130A (en) * 2013-04-06 2013-06-26 杭州盈高科技有限公司 Intranet security unified management platform and management method of management platform
CN204013576U (en) * 2014-06-10 2014-12-10 高芳 The intranet security platform of Data Control
CN104901838A (en) * 2015-06-23 2015-09-09 中国电建集团成都勘测设计研究院有限公司 Enterprise network safety event management system and method thereof
CN106506195A (en) * 2016-10-19 2017-03-15 广州新蓝网络科技有限公司 Mobile terminal safety management method and terminal management all-in-one
CN107493265A (en) * 2017-07-24 2017-12-19 南京南瑞集团公司 A kind of network security monitoring method towards industrial control system
CN108337270A (en) * 2018-05-18 2018-07-27 梧州井儿铺贸易有限公司 A kind of enterprise network security event management system
CN109150869A (en) * 2018-08-14 2019-01-04 南瑞集团有限公司 A kind of exchanger information acquisition analysis system and method
CN109309678A (en) * 2018-09-28 2019-02-05 深圳市极限网络科技有限公司 Network risks method for early warning based on artificial intelligence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111372077A (en) * 2020-03-16 2020-07-03 深信服科技股份有限公司 Camera control method and device, terminal equipment and storage medium
CN112104618A (en) * 2020-08-27 2020-12-18 深信服科技股份有限公司 Information determination method, information determination device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN111092869B (en) Security management and control method for terminal access to office network and authentication server
US8989002B2 (en) System and method for controlling threshold testing within a network
US9680722B2 (en) Method for determining a severity of a network incident
CN109660405B (en) Disaster recovery method, device, equipment and storage medium for call center
US20110103392A1 (en) System and Method to Support Secondary Channel Connection from Residential Gateway to Service Provider Network
CN109787827B (en) CDN network monitoring method and device
CN112738095A (en) Method, device, system, storage medium and equipment for detecting illegal external connection
CN110113325A (en) Network Data Control method, apparatus and storage medium based on third party SDK
US20170353363A1 (en) Systems and methods for managing network operations
CN106780133A (en) Electrical power distribution automatization system appraisal procedure and device
CN103023815B (en) Aggregation link load sharing method and device
CN113852506A (en) Fault processing method and device, electronic equipment and storage medium
CN109922055A (en) A kind of detection method, system and the associated component of risk terminal
US10187250B2 (en) System and method for capacity planning on a high speed data network
US20190349793A1 (en) Mobility manager destructive testing
US20080086562A1 (en) Management support method, management support system, management support apparatus and recording medium
CN110768844A (en) Authentication server switching method and device
WO2015180265A1 (en) Multi-link protection switching method and device
CN109361695A (en) To the authorization method of network insertion, device, computer equipment and storage medium
TWI644228B (en) Server and monitoring method thereof
US10498591B1 (en) Isolating service faults using loopbacks
CN114285652B (en) Industrial protocol detection method and device, computer equipment and storage medium
CN114257604A (en) Data processing method and system
CN115914009B (en) ToB private network service quality testing method and system
CN115529157B (en) Enterprise application access system, method and access system based on zero trust

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621

RJ01 Rejection of invention patent application after publication