Design of Information Network Security Situation Monitoring System Based on Python Language

Author(s):  
Yang Ying
KOMTEKINFO ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 159-170
Author(s):  
Heri Yanto ◽  
Febri Hadi

Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.


2013 ◽  
Vol 648 ◽  
pp. 319-322
Author(s):  
Shao Feng Lin ◽  
Xiao Peng Li

In the network security monitoring system, it is important to trace information source timely and accurately, which is an important way to investigate and collect evidence. But because of public network’s IP limited resources, LAN hosts usually share the public network’s IP resources by NAT way, and conceal internal network structure, which make the network security monitoring system unable to locate the real effective sensitive information source in LAN. Based on the study of WINPCAP network sniffing technology and the ARP deception protocol in exchange network environment, a network security monitoring system with mechanical properties suitable for LAN environment is designed and realized, which locate information source accurately through filtering and matching the sensitive information transmitting in LAN by setting the capture factors as key words of document, web site shared by FTP, QQ number etc.


2014 ◽  
Vol 602-605 ◽  
pp. 1538-1541
Author(s):  
Peng Fei Peng ◽  
Liang Huang ◽  
Jian Qiang Zhang

Demands for remote monitoring of underwater targets are analyzed, and the basic concept of autonomous underwater target remote monitoring system is put forward in this paper. The working principle of autonomous underwater target remote monitoring system, the composition of the structure and the overall design of function modules are given. The underwater target detection device is designed in detail.Through the analysis and design of the system, the feasibility and practicability of autonomous underwater target remote monitoring system are fully demonstrated, which has broad application prospects in the water information network construction.It will further improve the detection and reconnaissance capability for remote underwater targets.


Author(s):  
Shaochi Cheng ◽  
Yuan Gao ◽  
Xiangyang Li ◽  
Yanchang Du ◽  
Yang Du ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document