[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110855529A - Network information security monitoring method, device, server and readable storage medium - Google Patents

Network information security monitoring method, device, server and readable storage medium Download PDF

Info

Publication number
CN110855529A
CN110855529A CN201911176505.2A CN201911176505A CN110855529A CN 110855529 A CN110855529 A CN 110855529A CN 201911176505 A CN201911176505 A CN 201911176505A CN 110855529 A CN110855529 A CN 110855529A
Authority
CN
China
Prior art keywords
network
monitoring
information
monitored
monitoring processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911176505.2A
Other languages
Chinese (zh)
Other versions
CN110855529B (en
Inventor
李明喜
胡维东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Wuyi Information Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201911176505.2A priority Critical patent/CN110855529B/en
Publication of CN110855529A publication Critical patent/CN110855529A/en
Application granted granted Critical
Publication of CN110855529B publication Critical patent/CN110855529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a network information security monitoring method, a device, a server and a readable storage medium, wherein network information to be monitored of a first network service type is written into a shared monitoring area shared by a central processing process and a network monitoring processing process, and the accuracy of the first network service type is higher than the monitoring level of a second network service type, so that the monitoring processing efficiency can be greatly improved by reducing the data volume when the monitoring level of the second network service type meets the monitoring processing requirement. On the basis, the type parameters and the type association relationship of each network information type in the network information database obtained by analysis are written into the shared monitoring area to indicate the network monitoring processing process to perform network monitoring processing on the network information to be monitored of the second network service type according to the type association relationship of each network information type in the network information database, so that the complexity of monitoring processing is further reduced.

Description

Network information security monitoring method, device, server and readable storage medium
Technical Field
The present application relates to the field of big data technologies, and in particular, to a network information security monitoring method, device, server, and readable storage medium.
Background
With the development of network technology, network information security monitoring becomes especially important. However, in the conventional scheme, since the amount of information included in the network information security monitoring information is getting larger and larger, and the amount of data is also getting larger and larger, more and more time is consumed when the network service to be monitored is directly processed through the conventional security monitoring method, so that the protection efficiency is lowered.
Disclosure of Invention
In order to overcome at least the above-mentioned deficiencies in the prior art, the present application provides a network information security monitoring method, device, server and readable storage medium.
In a first aspect, the present application provides a network information security monitoring method, applied to a server, the method including:
writing the information of the network to be monitored of the first network service type into the shared monitoring area; the shared monitoring area is shared by a central processing process and a network monitoring processing process;
sending a network monitoring processing instruction to the network monitoring processing process, wherein the network monitoring processing instruction is used for instructing the network monitoring processing process to read the network information to be monitored from the shared monitoring area and to perform network monitoring processing after converting the network information to be monitored from a first network service type to a second network service type, and the monitoring level of the first network service type is greater than that of the second network service type;
when a network monitoring processing result acquisition instruction is received, and the target network information obtained through network monitoring processing is converted from a second network service type into a first network service type by the network monitoring processing process and then written into the shared monitoring area, reading the target network information of the first network service type from the shared monitoring area;
loading and analyzing a database file of a network information database, writing the type parameters and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instructing a network monitoring processing process to perform network monitoring processing on the network information to be monitored of the second network service type through the type parameters of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameters and the type association relationship of each network information type in the shared monitoring area.
In a possible design of the first aspect, the step of sending a network monitoring processing instruction to the network monitoring processing process includes:
calling a network monitoring processing process interface to create a plurality of network monitoring processing process threads;
sending a network monitoring processing instruction to the plurality of network monitoring processing process threads;
the network monitoring processing instruction is used for indicating the plurality of network monitoring processing process threads to read the network information to be monitored from the shared monitoring area in parallel, and carrying out network monitoring processing after the network information to be monitored is converted from a first network service type to a second network service type;
the step of reading the target network information of the first network service type from the shared monitoring area when the network monitoring processing process receives the network monitoring processing result obtaining instruction and the target network information obtained through the network monitoring processing process is written into the shared monitoring area after the second network service type is converted into the first network service type, includes:
and when a network monitoring processing result acquisition instruction is received, and the target network information obtained through network monitoring processing is converted from the second network service type to the first network service type by the plurality of network monitoring processing process threads and then is written into the shared monitoring area in parallel, reading the target network information of the first network service type from the shared monitoring area.
In a possible design of the first aspect, the network information to be monitored includes a plurality of network transaction behavior information; the behavior characteristics of each network transaction behavior information in the network transaction behavior information have security monitoring values representing the network transaction behaviors corresponding to the network transaction behavior information;
the writing of the to-be-monitored network information of the first network service type into the shared monitoring area includes:
writing a plurality of network transaction behavior information of a first network service type into a shared monitoring area one by one; the network monitoring processing instruction is further used for instructing a network monitoring processing process to convert a plurality of network transaction behavior information into network security monitoring information and then perform information processing, wherein the monitoring behavior information in the network security monitoring information corresponds to the network transaction behavior information in the network information to be monitored.
In a possible design of the first aspect, the sending a network monitoring processing instruction to the network monitoring processing process includes:
calling a network monitoring processing process control interface to create a plurality of network monitoring processing process threads;
and sending a network monitoring processing instruction to the plurality of network monitoring processing process threads, wherein the network monitoring processing instruction is used for instructing the plurality of network monitoring processing process threads to read a plurality of network transaction behavior information from a shared monitoring area in parallel, converting the plurality of network transaction behavior information into network security monitoring information, converting the network security monitoring information from a first network service type into a second network service type, and then processing different monitoring behavior information in the network security monitoring information in parallel.
In a possible design of the first aspect, the step of performing network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type includes:
acquiring compatible information related to the current network monitoring processing of the network information to be monitored of the second network service type in the process of carrying out network monitoring processing on the network information to be monitored of the second network service type through the type parameter of each network information type;
if the compatible information contains network monitoring processing indication information, based on the indication of the network monitoring processing indication information, after the network monitoring processing is completed by the network information to be monitored of the second network service type, determining a monitoring indication identifier to be added to the service to be monitored according to the network information to be monitored of the second network service type after the network monitoring processing is completed for each service to be monitored in all the services to be monitored;
if the added monitoring indication mark exists in the service to be monitored currently, detecting whether a user-defined label exists in the added monitoring indication mark, wherein the user-defined label is the monitoring indication mark added in a manual mode;
if the added monitoring indication mark has a custom label, updating other monitoring indication marks, except for the custom label, which are currently added to the service to be monitored, into the monitoring indication mark to be added to the service to be monitored, wherein the network monitoring processing indication information indicates that the service to be monitored is processed again after the network monitoring processing is performed on the network information to be monitored of the second network service type;
if the compatible information does not contain the network monitoring processing indication information, after the network monitoring processing of the network information to be monitored of the second network service type is completed, the action of automatically calling the network information to be monitored of the second network service type after the network monitoring processing to correspondingly process the service to be monitored is not executed.
In a possible design of the first aspect, the step of performing the network monitoring processing after the network information to be monitored is converted from the first network service type to the second network service type includes:
after the network information to be monitored is converted from a first network service type to a second network service type, monitoring and identifying the network information to be monitored converted into the second network service type, and if a first monitoring behavior is identified, acquiring a first monitoring identifier of the first monitoring behavior;
determining first monitoring area information corresponding to a first monitoring identifier according to a pre-stored corresponding relationship between the monitoring identifier and a monitoring area;
acquiring a monitoring area to be monitored, position information and attribute information of the monitoring area and corresponding first monitoring processing information in the first monitoring area information based on the first monitoring area information;
acquiring a monitoring processing type and a monitoring processing parameter in the first monitoring processing information;
and based on the position information and the attribute information of the monitoring area, monitoring the monitoring area to be monitored in the first monitoring area information according to the monitoring processing type and the monitoring processing parameter in the first monitoring processing information.
In a second aspect, an embodiment of the present application provides a network information security monitoring apparatus, which is applied to a server, and the apparatus includes:
the writing module is used for writing the network information to be monitored of the first network service type into the shared monitoring area; the shared monitoring area is shared by a central processing process and a network monitoring processing process;
a sending module, configured to send a network monitoring processing instruction to the network monitoring processing process, where the network monitoring processing instruction is used to instruct the network monitoring processing process to read network information to be monitored from the shared monitoring area, and perform network monitoring processing after the network information to be monitored is converted from a first network service type to a second network service type, where a monitoring level of the first network service type is greater than a monitoring level of the second network service type;
the reading module is used for reading the target network information of the first network service type from the shared monitoring area when a network monitoring processing result acquisition instruction is received and the target network information obtained through network monitoring processing is written into the shared monitoring area after the network monitoring processing process converts the second network service type into the first network service type;
and the loading and analyzing module is used for loading and analyzing a database file of the network information database, writing the type parameter and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instructing a network monitoring processing process to perform network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameter and the type association relationship of the shared monitoring area.
In a third aspect, an embodiment of the present application provides a server, including a processor, a memory, and a network interface. The memory and the network interface processor can be connected through a bus system. The network interface is configured to receive a message, the memory is configured to store a program, instructions or code, and the processor is configured to execute the program, instructions or code in the memory to perform the operations of the first aspect or any possible design of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, which stores instructions that, when executed on a server, cause the server to perform the method of the first aspect or any possible design manner of the first aspect.
Based on any one of the above aspects, the monitoring processing efficiency can be greatly improved by reducing the data volume when the monitoring level of the second network service type meets the monitoring processing requirement by writing the to-be-monitored network information of the first network service type into the shared monitoring area shared by the central processing process and the network monitoring processing process, because the accuracy of the first network service type is greater than the monitoring level of the second network service type. On the basis, the type parameters and the type association relationship of each network information type in the analyzed network information database are written into the shared monitoring area, so that the network monitoring processing process is indicated to perform network monitoring processing on the network information to be monitored of the second network service type according to the type association relationship of each network information type in the network information database by writing the type parameters and the type association relationship of the shared monitoring area, and the complexity of the monitoring processing is further reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic flowchart of a network information security monitoring method according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating the sub-steps included in step S120 in one possible embodiment shown in FIG. 1;
FIG. 3 is a flow chart illustrating various sub-steps included in step S140 in one possible implementation shown in FIG. 1;
fig. 4 is a functional block diagram of a network information security monitoring apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic block diagram of a server for performing the network information security monitoring method according to an embodiment of the present application.
Detailed Description
The present application will now be described in detail with reference to the drawings, and the specific operations in the method embodiments may also be applied to the apparatus embodiments or the system embodiments. In the description of the present application, "at least one" includes one or more unless otherwise specified. "plurality" means two or more. For example, at least one of A, B and C, comprising: a alone, B alone, a and B in combination, a and C in combination, B and C in combination, and A, B and C in combination. In this application, "/" means "or, for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
Fig. 1 is a schematic flow chart of a network information security monitoring method according to an embodiment of the present application, and the network information security monitoring method is described in detail below.
Step S110, writing the information of the network to be monitored of the first network service type into a shared monitoring area; the shared monitoring area is shared by a central processing process and a network monitoring processing process.
Step S120, sending a network monitoring processing instruction to the network monitoring processing process, where the network monitoring processing instruction is used to instruct the network monitoring processing process to read the to-be-monitored network information from the shared monitoring area, and perform network monitoring processing after the to-be-monitored network information is converted from a first network service type to a second network service type, where a monitoring level of the first network service type is greater than a monitoring level of the second network service type.
Step S130, when receiving the network monitoring processing result obtaining instruction and the network monitoring processing process converts the target network information obtained through the network monitoring processing from the second network service type to the first network service type and writes the target network information into the shared monitoring area, reading the target network information of the first network service type from the shared monitoring area.
Step S140, loading and analyzing a database file of the network information database, writing the type parameter and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instructing a network monitoring processing process to perform network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameter and the type association relationship of the shared monitoring area.
Based on the above steps, in this embodiment, the to-be-monitored network information of the first network service type is written into the shared monitoring area shared by the central processing process and the network monitoring processing process, and since the accuracy of the first network service type is greater than the monitoring level of the second network service type, when the monitoring level of the second network service type meets the monitoring processing requirement, the monitoring processing efficiency can be greatly improved by reducing the data amount. On the basis, the type parameters and the type association relationship of each network information type in the network information database obtained by analysis are written into the shared monitoring area to indicate the network monitoring processing process to perform network monitoring processing on the network information to be monitored of the second network service type according to the type association relationship of each network information type in the network information database, so that the complexity of monitoring processing is further reduced.
In some possible designs, for step S120, sending a network monitoring processing instruction to the network monitoring processing process may specifically be: and calling a network monitoring processing process interface to create a plurality of network monitoring processing process threads, and then sending a network monitoring processing instruction to the plurality of network monitoring processing process threads. The network monitoring processing instruction can be used for instructing the plurality of network monitoring processing process threads to read the network information to be monitored from the shared monitoring area in parallel, and converting the network information to be monitored from the first network service type to the second network service type and then performing network monitoring processing in parallel, so that the reading efficiency and the network monitoring processing efficiency of the network information to be monitored are improved.
Therefore, optionally, when a network monitoring processing result obtaining instruction is received, and the target network information obtained through the network monitoring processing is converted from the second network service type to the first network service type by the plurality of network monitoring processing process threads and then written into the shared monitoring area in parallel, the target network information of the first network service type is read from the shared monitoring area.
In some possible designs, the network information to be monitored may specifically include a plurality of network transaction behavior information, a behavior feature of each network transaction behavior information in the plurality of network transaction behavior information has a security monitoring value indicating a network transaction behavior corresponding to the network transaction behavior information, and the plurality of network transaction behavior information of the first network service type may be written into the shared monitoring area one by one in a process of writing the network information to be monitored of the first network service type into the shared monitoring area. Optionally, the network monitoring processing instruction may be further configured to instruct a network monitoring processing process to convert the multiple pieces of network transaction behavior information into network security monitoring information and then perform information processing, where monitoring behavior information in the network security monitoring information corresponds to network transaction behavior information in the to-be-monitored network information. Therefore, by associating the network transaction behaviors, the monitoring processing efficiency of the network transaction behaviors can be greatly improved.
On the basis of the network transaction behavior information, in some possible designs, a network monitoring processing instruction is sent to the network monitoring processing process, specifically, a network monitoring processing process control interface is called to create a plurality of network monitoring processing process threads, then the network monitoring processing instructions are sent to the plurality of network monitoring processing process threads, and the network monitoring processing instructions are used for instructing the plurality of network monitoring processing process threads to read a plurality of network transaction behavior information from a shared monitoring area in parallel, convert the plurality of network transaction behavior information into network security monitoring information, convert the network security monitoring information from a first network service type into a second network service type, and then process different monitoring behavior information in the network security monitoring information in parallel.
In some possible designs, regarding step S120, the present embodiment further considers the situation that all monitoring areas need to be reserved or identified monitoring areas need to be removed in the prior art, but a mechanical singleness problem exists when the monitoring areas are processed due to a large difference between different monitoring behaviors and monitoring efficiency is affected, so please refer to fig. 2, and step S120 can be specifically implemented by the following sub-steps:
and a substep S121, after the network information to be monitored is converted from the first network service type to the second network service type, monitoring and identifying the network information to be monitored converted into the second network service type, and if a first monitoring behavior is identified, acquiring a first monitoring identifier of the first monitoring behavior.
And a substep S122, determining first monitored area information corresponding to the first monitored identification according to a pre-stored corresponding relationship between the monitored identification and the monitored area.
And a substep S123 of acquiring, based on the first monitored area information, a monitored area to be monitored in the first monitored area information, position information and attribute information of the monitored area, and corresponding first monitoring processing information.
And a substep S124, obtaining the monitoring processing type and the monitoring processing parameter in the first monitoring processing information.
And a substep S125, performing monitoring processing on the monitored area to be monitored in the first monitored area information according to the monitoring processing type and the monitoring processing parameter in the first monitoring processing information based on the position information and the attribute information of the monitored area.
Based on the above design, this embodiment further considers that all monitoring areas need not be reserved in the prior art, or identified monitoring areas need not be removed, but because different monitoring behaviors have great differences, there is a problem of mechanical singleness when processing the monitoring areas easily, and the monitoring efficiency is affected, so that different monitoring identifications correspond to different monitoring areas through different monitoring areas, the problem of mechanical singleness when processing the monitoring areas is avoided, different monitoring processing requirements are met, and the monitoring efficiency is improved.
In some possible designs, for step S140, in this embodiment, it is further considered that in the process of performing network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type, repeated processing is often performed on the to-be-monitored service again, and this process needs to consume certain computing resources and computing time, which results in a situation that monitoring efficiency is low, and therefore, please refer to fig. 3 in combination, step S140 may be specifically implemented by the following sub-steps:
in the sub-step S141, in the process of performing the network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type, compatible information related to the current network monitoring processing of the to-be-monitored network information of the second network service type is obtained.
And a substep S142, if the compatible information includes the network monitoring processing indication information, determining, based on the indication of the network monitoring processing indication information, a monitoring indication identifier to be added to the service to be monitored according to the network information to be monitored of the second network service type after the network monitoring processing of the second network service type is completed, for each service to be monitored in all the services to be monitored of the current time, after the network information to be monitored of the second network service type completes the network monitoring processing of the current time.
And a substep S143, if the service to be monitored currently has the added monitoring indication identifier, detecting whether a custom tag exists in the added monitoring indication identifier, wherein the custom tag is the monitoring indication identifier added in a manual mode.
And a substep S144, if a custom tag exists in the added monitoring indication identifier, updating other monitoring indication identifiers, except for the custom tag, which are currently added to the service to be monitored, to the monitoring indication identifier to be added to the service to be monitored, where the network monitoring processing indication information indicates that the service to be monitored is processed again after the network monitoring processing is performed on the network information to be monitored of the second network service type.
If the compatible information does not include the network monitoring processing indication information, the sub-step S145 does not execute the action of automatically calling the network information to be monitored of the second network service type to perform corresponding processing on the service to be monitored after the network information to be monitored of the second network service type completes the network monitoring processing of the current time
Based on the above design, in the process of performing the network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type, the embodiment can avoid performing repeated processing on the to-be-monitored service again, reduce the consumption of computing resources and computing duration, and further improve the monitoring efficiency.
Fig. 4 is a schematic functional module diagram of a network information security monitoring device 300 according to an embodiment of the present disclosure, and the embodiment can divide the functional modules of the network information security monitoring device 300 according to the above method embodiments. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one processing block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the present application is schematic, and is only a logical function division, and there may be another division manner in actual implementation. For example, in the case of dividing each function module according to each function, the network information security monitoring apparatus 300 shown in fig. 4 is only a schematic diagram of the apparatus. The network information security monitoring apparatus 300 may include a writing module 310, a sending module 320, an exclusive right module 330, and a loading and analyzing module 340, and the functions of the functional modules of the network information security monitoring apparatus 300 will be described in detail below.
A writing module 310, configured to write the to-be-monitored network information of the first network service type into the shared monitoring area. The shared monitoring area is shared by a central processing process and a network monitoring processing process.
A sending module 320, configured to send a network monitoring processing instruction to the network monitoring processing process, where the network monitoring processing instruction is used to instruct the network monitoring processing process to read the to-be-monitored network information from the shared monitoring area, and perform network monitoring processing after the to-be-monitored network information is converted from a first network service type to a second network service type, where a monitoring level of the first network service type is greater than a monitoring level of the second network service type.
The reading module 330 is configured to, when a network monitoring processing result obtaining instruction is received and the target network information obtained through the network monitoring processing is written into the shared monitoring area after the network monitoring processing process converts the second network service type into the first network service type, read the target network information of the first network service type from the shared monitoring area.
The loading and analyzing module 340 is configured to load and analyze a database file of a network information database, write the type parameter and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instruct a network monitoring processing process to perform network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameter and the type association relationship of the shared monitoring area.
In some possible designs, the sending module 320 sends the network monitoring processing instruction to the network monitoring processing process specifically by:
calling a network monitoring processing process interface to create a plurality of network monitoring processing process threads;
sending a network monitoring processing instruction to the plurality of network monitoring processing process threads;
the network monitoring processing instruction is used for indicating the plurality of network monitoring processing process threads to read the network information to be monitored from the shared monitoring area in parallel, and carrying out network monitoring processing after the network information to be monitored is converted from a first network service type to a second network service type;
in some possible designs, the reading module 330 reads the target network information of the first network service type from the shared monitored area by specifically:
and when a network monitoring processing result acquisition instruction is received, and the target network information obtained through network monitoring processing is converted from the second network service type to the first network service type by the plurality of network monitoring processing process threads and then is written into the shared monitoring area in parallel, reading the target network information of the first network service type from the shared monitoring area.
In some possible designs, the network information to be monitored includes a plurality of network transaction behavior information; the behavior characteristics of each network transaction behavior information in the network transaction behavior information have security monitoring values representing the network transaction behaviors corresponding to the network transaction behavior information; .
The writing module 310 may specifically write the to-be-monitored network information of the first network service type into the shared monitoring area by the following manners:
writing a plurality of network transaction behavior information of a first network service type into a shared monitoring area one by one; the network monitoring processing instruction is further used for instructing a network monitoring processing process to convert a plurality of network transaction behavior information into network security monitoring information and then perform information processing, wherein the monitoring behavior information in the network security monitoring information corresponds to the network transaction behavior information in the network information to be monitored.
In some possible designs, the sending module 320 sends the network monitoring processing instruction to the network monitoring processing process specifically by:
calling a network monitoring processing process control interface to create a plurality of network monitoring processing process threads;
and sending a network monitoring processing instruction to the plurality of network monitoring processing process threads, wherein the network monitoring processing instruction is used for instructing the plurality of network monitoring processing process threads to read a plurality of network transaction behavior information from a shared monitoring area in parallel, converting the plurality of network transaction behavior information into network security monitoring information, converting the network security monitoring information from a first network service type into a second network service type, and then processing different monitoring behavior information in the network security monitoring information in parallel.
In some possible designs, the sending module 320 may specifically perform the network monitoring process after the network information to be monitored is converted from the first network service type to the second network service type by the following method:
after the network information to be monitored is converted from a first network service type to a second network service type, monitoring and identifying the network information to be monitored converted into the second network service type, and if a first monitoring behavior is identified, acquiring a first monitoring identifier of the first monitoring behavior;
determining first monitoring area information corresponding to a first monitoring identifier according to a pre-stored corresponding relationship between the monitoring identifier and a monitoring area;
acquiring a monitoring area to be monitored, position information and attribute information of the monitoring area and corresponding first monitoring processing information in the first monitoring area information based on the first monitoring area information;
acquiring a monitoring processing type and a monitoring processing parameter in the first monitoring processing information;
and based on the position information and the attribute information of the monitoring area, monitoring the monitoring area to be monitored in the first monitoring area information according to the monitoring processing type and the monitoring processing parameter in the first monitoring processing information.
In some possible designs, the load parsing module 340 may specifically perform network monitoring processing on the to-be-monitored network information of the second network service type by:
acquiring compatible information related to the current network monitoring processing of the network information to be monitored of the second network service type in the process of carrying out network monitoring processing on the network information to be monitored of the second network service type through the type parameter of each network information type;
if the compatible information contains network monitoring processing indication information, based on the indication of the network monitoring processing indication information, after the network monitoring processing is completed by the network information to be monitored of the second network service type, determining a monitoring indication identifier to be added to the service to be monitored according to the network information to be monitored of the second network service type after the network monitoring processing is completed for each service to be monitored in all the services to be monitored;
if the added monitoring indication mark exists in the service to be monitored currently, detecting whether a user-defined label exists in the added monitoring indication mark, wherein the user-defined label is the monitoring indication mark added in a manual mode;
if the added monitoring indication mark has a custom label, updating other monitoring indication marks, except for the custom label, which are currently added to the service to be monitored, into the monitoring indication mark to be added to the service to be monitored, wherein the network monitoring processing indication information indicates that the service to be monitored is processed again after the network monitoring processing is performed on the network information to be monitored of the second network service type;
if the compatible information does not contain the network monitoring processing indication information, after the network monitoring processing of the network information to be monitored of the second network service type is completed, the action of automatically calling the network information to be monitored of the second network service type after the network monitoring processing to correspondingly process the service to be monitored is not executed.
Fig. 5 is a schematic structural diagram of a server 100 for performing the network information security monitoring method according to an embodiment of the present invention, and as shown in fig. 5, the server 100 may include a network interface 110, a machine-readable storage medium 120, a processor 130, and a bus 140. The number of the processors 130 may be one or more, and one processor 130 is taken as an example in fig. 5; the network interface 110, the machine-readable storage medium 120, and the processor 130 may be connected by a bus 140 or otherwise, as exemplified by the connection by the bus 140 in fig. 5.
The machine-readable storage medium 120 is used as a computer-readable storage medium, and can be used for storing a software program, a computer-executable program, and modules, such as program instructions/modules corresponding to the method for establishing network information security monitoring in the embodiment of the present application (for example, the writing module 310, the sending module 320, the exclusive right module 330, and the loading and parsing module 340 in the network information security monitoring apparatus 300 shown in fig. 4, the processor 130 executes various functional applications and data processing of the terminal device by detecting the software program, instructions, and modules stored in the machine-readable storage medium 120, that is, implementing the above-mentioned network information security monitoring method, and details are not repeated herein.
The machine-readable storage medium 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the machine-readable storage medium 120 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), adaptive random access memory (DRAM), Synchronous adaptive random access memory (Synchronous DRAM, SDRAM), Double data rate Synchronous adaptive random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link adaptive DRAM (SLDRAM), and direct memory bus RAM (DR RAM). It should be noted that the memories of the systems and methods described herein are intended to comprise, without being limited to, these and any other suitable memories at any other time. In some examples, the machine-readable storage medium 120 may further include memory located remotely from the processor 130, which may be connected to the terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor 130 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 130. The processor 130 may be a general-purpose processor, a digital signal processor (digital signal processor dsp), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
The server 100 can perform information interaction with other devices (e.g., the external server 200) through the communication interface 110. Communication interface 110 may be a circuit, bus, transceiver, or any other device that may be used to exchange information. Processor 130 may send and receive information using communication interface 110.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (10)

1. A network information security monitoring method is applied to a server, and comprises the following steps:
writing the information of the network to be monitored of the first network service type into the shared monitoring area; the shared monitoring area is shared by a central processing process and a network monitoring processing process;
sending a network monitoring processing instruction to the network monitoring processing process, wherein the network monitoring processing instruction is used for instructing the network monitoring processing process to read the network information to be monitored from the shared monitoring area and to perform network monitoring processing after converting the network information to be monitored from a first network service type to a second network service type, and the monitoring level of the first network service type is greater than that of the second network service type;
when a network monitoring processing result acquisition instruction is received, and the target network information obtained through network monitoring processing is converted from a second network service type into a first network service type by the network monitoring processing process and then written into the shared monitoring area, reading the target network information of the first network service type from the shared monitoring area;
loading and analyzing a database file of a network information database, writing the type parameters and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instructing a network monitoring processing process to perform network monitoring processing on the network information to be monitored of the second network service type through the type parameters of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameters and the type association relationship of each network information type in the shared monitoring area.
2. The method for monitoring network information security according to claim 1, wherein the step of sending the network monitoring processing command to the network monitoring processing procedure includes:
calling a network monitoring processing process interface to create a plurality of network monitoring processing process threads;
sending a network monitoring processing instruction to the plurality of network monitoring processing process threads;
the network monitoring processing instruction is used for indicating the plurality of network monitoring processing process threads to read the network information to be monitored from the shared monitoring area in parallel, and carrying out network monitoring processing after the network information to be monitored is converted from a first network service type to a second network service type;
the step of reading the target network information of the first network service type from the shared monitoring area when the network monitoring processing process receives the network monitoring processing result obtaining instruction and the target network information obtained through the network monitoring processing process is written into the shared monitoring area after the second network service type is converted into the first network service type, includes:
and when a network monitoring processing result acquisition instruction is received, and the target network information obtained through network monitoring processing is converted from the second network service type to the first network service type by the plurality of network monitoring processing process threads and then is written into the shared monitoring area in parallel, reading the target network information of the first network service type from the shared monitoring area.
3. The method for monitoring network information security according to claim 1, wherein the network information to be monitored comprises a plurality of network transaction behavior information; the behavior characteristics of each network transaction behavior information in the network transaction behavior information have security monitoring values representing the network transaction behaviors corresponding to the network transaction behavior information;
the writing of the to-be-monitored network information of the first network service type into the shared monitoring area includes:
writing a plurality of network transaction behavior information of a first network service type into a shared monitoring area one by one; the network monitoring processing instruction is further used for instructing a network monitoring processing process to convert a plurality of network transaction behavior information into network security monitoring information and then perform information processing, wherein the monitoring behavior information in the network security monitoring information corresponds to the network transaction behavior information in the network information to be monitored.
4. The method for monitoring network information security according to claim 3, wherein the sending a network monitoring processing command to the network monitoring processing process includes:
calling a network monitoring processing process control interface to create a plurality of network monitoring processing process threads;
and sending a network monitoring processing instruction to the plurality of network monitoring processing process threads, wherein the network monitoring processing instruction is used for instructing the plurality of network monitoring processing process threads to read a plurality of network transaction behavior information from a shared monitoring area in parallel, converting the plurality of network transaction behavior information into network security monitoring information, converting the network security monitoring information from a first network service type into a second network service type, and then processing different monitoring behavior information in the network security monitoring information in parallel.
5. The method for monitoring network information security according to any one of claims 1 to 4, wherein the step of performing network monitoring processing on the network information to be monitored of the second network service type through the type parameter of each network information type includes:
acquiring compatible information related to the current network monitoring processing of the network information to be monitored of the second network service type in the process of carrying out network monitoring processing on the network information to be monitored of the second network service type through the type parameter of each network information type;
if the compatible information contains network monitoring processing indication information, based on the indication of the network monitoring processing indication information, after the network monitoring processing is completed by the network information to be monitored of the second network service type, determining a monitoring indication identifier to be added to the service to be monitored according to the network information to be monitored of the second network service type after the network monitoring processing is completed for each service to be monitored in all the services to be monitored;
if the added monitoring indication mark exists in the service to be monitored currently, detecting whether a user-defined label exists in the added monitoring indication mark, wherein the user-defined label is the monitoring indication mark added in a manual mode;
if the added monitoring indication mark has a custom label, updating other monitoring indication marks, except for the custom label, which are currently added to the service to be monitored, into the monitoring indication mark to be added to the service to be monitored, wherein the network monitoring processing indication information indicates that the service to be monitored is processed again after the network monitoring processing is performed on the network information to be monitored of the second network service type;
if the compatible information does not contain the network monitoring processing indication information, after the network monitoring processing of the network information to be monitored of the second network service type is completed, the action of automatically calling the network information to be monitored of the second network service type after the network monitoring processing to correspondingly process the service to be monitored is not executed.
6. The method for monitoring network information security according to any one of claims 1-4, wherein the step of performing network monitoring processing after converting the network information to be monitored from the first network service type to the second network service type comprises:
after the network information to be monitored is converted from a first network service type to a second network service type, monitoring and identifying the network information to be monitored converted into the second network service type, and if a first monitoring behavior is identified, acquiring a first monitoring identifier of the first monitoring behavior;
determining first monitoring area information corresponding to a first monitoring identifier according to a pre-stored corresponding relationship between the monitoring identifier and a monitoring area;
acquiring a monitoring area to be monitored, position information and attribute information of the monitoring area and corresponding first monitoring processing information in the first monitoring area information based on the first monitoring area information;
acquiring a monitoring processing type and a monitoring processing parameter in the first monitoring processing information;
and based on the position information and the attribute information of the monitoring area, monitoring the monitoring area to be monitored in the first monitoring area information according to the monitoring processing type and the monitoring processing parameter in the first monitoring processing information.
7. A network information security monitoring device is applied to a server, and comprises:
the writing module is used for writing the network information to be monitored of the first network service type into the shared monitoring area; the shared monitoring area is shared by a central processing process and a network monitoring processing process;
a sending module, configured to send a network monitoring processing instruction to the network monitoring processing process, where the network monitoring processing instruction is used to instruct the network monitoring processing process to read network information to be monitored from the shared monitoring area, and perform network monitoring processing after the network information to be monitored is converted from a first network service type to a second network service type, where a monitoring level of the first network service type is greater than a monitoring level of the second network service type;
the reading module is used for reading the target network information of the first network service type from the shared monitoring area when a network monitoring processing result acquisition instruction is received and the target network information obtained through network monitoring processing is written into the shared monitoring area after the network monitoring processing process converts the second network service type into the first network service type;
and the loading and analyzing module is used for loading and analyzing a database file of the network information database, writing the type parameter and the type association relationship of each network information type in the network information database obtained through analysis into the shared monitoring area, and instructing a network monitoring processing process to perform network monitoring processing on the to-be-monitored network information of the second network service type through the type parameter of each network information type according to the type association relationship of each network information type in the network information database by writing the type parameter and the type association relationship of the shared monitoring area.
8. The device for monitoring network information security according to claim 7, wherein the loading parsing module performs the network monitoring processing on the network information to be monitored of the second network service type by specifically:
acquiring compatible information related to the current network monitoring processing of the network information to be monitored of the second network service type in the process of carrying out network monitoring processing on the network information to be monitored of the second network service type through the type parameter of each network information type;
if the compatible information contains network monitoring processing indication information, based on the indication of the network monitoring processing indication information, after the network monitoring processing is completed by the network information to be monitored of the second network service type, determining a monitoring indication identifier to be added to the service to be monitored according to the network information to be monitored of the second network service type after the network monitoring processing is completed for each service to be monitored in all the services to be monitored;
if the added monitoring indication mark exists in the service to be monitored currently, detecting whether a user-defined label exists in the added monitoring indication mark, wherein the user-defined label is the monitoring indication mark added in a manual mode;
if the added monitoring indication mark has a custom label, updating other monitoring indication marks, except for the custom label, which are currently added to the service to be monitored, into the monitoring indication mark to be added to the service to be monitored, wherein the network monitoring processing indication information indicates that the service to be monitored is processed again after the network monitoring processing is performed on the network information to be monitored of the second network service type;
if the compatible information does not contain the network monitoring processing indication information, after the network monitoring processing of the network information to be monitored of the second network service type is completed, the action of automatically calling the network information to be monitored of the second network service type after the network monitoring processing to correspondingly process the service to be monitored is not executed.
9. A server, characterized in that the server comprises a machine-readable storage medium and a processor, the machine-readable storage medium stores machine-executable instructions, and the processor, when executing the machine-executable instructions, implements the network information security monitoring method according to any one of claims 1 to 7.
10. A readable storage medium, wherein the readable storage medium stores instructions, which when executed on a server, cause the server to execute the network information security monitoring method according to any one of claims 1 to 7.
CN201911176505.2A 2019-11-26 2019-11-26 Network information security monitoring method, device, server and readable storage medium Active CN110855529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911176505.2A CN110855529B (en) 2019-11-26 2019-11-26 Network information security monitoring method, device, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911176505.2A CN110855529B (en) 2019-11-26 2019-11-26 Network information security monitoring method, device, server and readable storage medium

Publications (2)

Publication Number Publication Date
CN110855529A true CN110855529A (en) 2020-02-28
CN110855529B CN110855529B (en) 2021-04-23

Family

ID=69604717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911176505.2A Active CN110855529B (en) 2019-11-26 2019-11-26 Network information security monitoring method, device, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN110855529B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800481A (en) * 2020-06-18 2020-10-20 杨进雄 Internet-based network interaction method and device and server
CN111800482A (en) * 2020-06-18 2020-10-20 杨进雄 Dynamic security protection, device and server of industrial internet
CN113852636A (en) * 2021-09-28 2021-12-28 上海威固信息技术股份有限公司 Safety storage control method based on big data and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103749002B (en) * 2010-06-09 2012-02-08 北京理工大学 Acquisition of information general-purpose system for internal network security monitoring
CN104574251A (en) * 2015-01-06 2015-04-29 熊国顺 Intelligent public safety information system and application method
CN105261239A (en) * 2015-09-02 2016-01-20 大连海事大学 Mobile-internet-based VTS safety information service system and method
CN106372069A (en) * 2015-07-20 2017-02-01 深圳市奇辉电气有限公司 Method and system for monitoring electric energy quality
CN107657419A (en) * 2016-07-25 2018-02-02 武汉票据交易中心有限公司 The processing method and relevant apparatus and server of a kind of operation flow
US10326803B1 (en) * 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103749002B (en) * 2010-06-09 2012-02-08 北京理工大学 Acquisition of information general-purpose system for internal network security monitoring
US10326803B1 (en) * 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence
CN104574251A (en) * 2015-01-06 2015-04-29 熊国顺 Intelligent public safety information system and application method
CN106372069A (en) * 2015-07-20 2017-02-01 深圳市奇辉电气有限公司 Method and system for monitoring electric energy quality
CN105261239A (en) * 2015-09-02 2016-01-20 大连海事大学 Mobile-internet-based VTS safety information service system and method
CN107657419A (en) * 2016-07-25 2018-02-02 武汉票据交易中心有限公司 The processing method and relevant apparatus and server of a kind of operation flow

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800481A (en) * 2020-06-18 2020-10-20 杨进雄 Internet-based network interaction method and device and server
CN111800482A (en) * 2020-06-18 2020-10-20 杨进雄 Dynamic security protection, device and server of industrial internet
CN111800482B (en) * 2020-06-18 2022-09-13 北京智优集品科技有限公司 Dynamic security protection, device and server of industrial internet
CN113852636A (en) * 2021-09-28 2021-12-28 上海威固信息技术股份有限公司 Safety storage control method based on big data and readable storage medium

Also Published As

Publication number Publication date
CN110855529B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN110209652B (en) Data table migration method, device, computer equipment and storage medium
CN110855529B (en) Network information security monitoring method, device, server and readable storage medium
CN105260202A (en) Client file updating method and system
CN110069217B (en) Data storage method and device
CN109213448B (en) Method, device, equipment and storage medium for erasing and writing data of smart card
US10715628B2 (en) Attribute operating method and device
CN111523844B (en) Warehouse management method, device, server and readable storage medium
CN108563774B (en) GPS data processing method and device
CN111722857A (en) Updating method and device of software development kit, electronic equipment and storage medium
CN111680293A (en) Information monitoring management method and device based on Internet and server
CN111680645A (en) Garbage classification processing method and device
CN111814052A (en) Mobile internet user management method, device, server and readable storage medium
CN112364515B (en) Ecological environment intelligent monitoring method and device and server
CN112417668B (en) Ecological protection intelligent early warning method and device and server
CN111800481B (en) Internet-based network interaction method and device and server
CN114186976A (en) Workflow transfer method and device, computer equipment and storage medium
CN110083509B (en) Method and device for arranging log data
CN111324368B (en) Data sharing method and server
CN112101412A (en) Intelligent classification garbage information processing method and device and server
CN111459819A (en) Software testing method and device, electronic equipment and computer readable medium
CN111427868B (en) Processing method and device for operation request in database migration and electronic equipment
CN111800482B (en) Dynamic security protection, device and server of industrial internet
CN111953535B (en) Network fault positioning method, terminal and storage medium
CN111652323B (en) Water quality monitoring method, device and server
CN112543213B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210402

Address after: Room 307, No.235, Gaotang Road, Tianhe District, Guangzhou, Guangdong 510630

Applicant after: Guangdong Wuyi Information Technology Co.,Ltd.

Address before: 408200 No.78, group 3, longjiagou village, rensha Town, Fengdu County, Chongqing

Applicant before: Li Mingxi

GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Network information security monitoring methods, devices, servers, and readable storage media

Granted publication date: 20210423

Pledgee: Agricultural Bank of China Limited Guangzhou Tianhe sub branch

Pledgor: Guangdong Wuyi Information Technology Co.,Ltd.

Registration number: Y2024980027988