Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host machine monitoring system based on plugin architecture

A monitoring system and plug-in technology, applied in the field of network security, can solve the problems that terminal computer security functions cannot be added, modified or deleted, terminal users are difficult to know the terminal status security policy, and administrators are difficult to ensure performance degradation or even crashes. , to achieve the effect of ensuring high concurrency and high fault tolerance, reducing communication overhead, and high customizability

Inactive Publication Date: 2018-05-29
BEIJING INST OF COMP TECH & APPL
View PDF14 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this system realizes the authentication and monitoring of the monitored computer, the management of its security functions lacks flexibility and ease of use: First, the server administrator cannot dynamically add, modify or modify the security functions on the terminal computer. Delete; Secondly, end users lack an intuitive and clear grasp of the current security status of the terminal
[0005] From the above, from the perspective of software users, the current host monitoring system still has software usability and scalability problems: after the software is successfully deployed, it is difficult for end users to know the current terminal status and specific security policies , causing inconvenience in use; at the same time, if the administrator wants to add or repair a certain security function, he must ask the technician to modify the entire client software, and then upgrade the installation, causing inconvenience in management; in addition, when the network scale gradually increases, it is difficult for the administrator to Ensure that a large number of terminals can be managed at the same time without causing performance degradation or even crashes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host machine monitoring system based on plugin architecture
  • Host machine monitoring system based on plugin architecture
  • Host machine monitoring system based on plugin architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] figure 1 Shown is the module diagram of the host monitoring system based on the plug-in architecture of the present invention, as figure 1 As shown, the host monitoring system based on the plug-in architecture of the present invention is mainly composed of two parts: a server and a client. This embodiment includes a server 1 , a client 2 and a client 3 . The client 2 includes: a plug-in container 21 , security plug-ins 1-k, and a client interface 23 . The client 3 includes: a plug-in container 31 , a security plug-in 1-t, and a client interface 33 .

[0026] Such as figure 1 As shown, in order to meet the high concurrency requirements generated by tens of thousands of terminals, the server uses Nginx load ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host machine monitoring system based on a plugin architecture, wherein the host machine monitoring system comprises a server side and at least one client side; the client side comprises a plugin container and various security plugins, and the plugin container is used for configuring the various security plugins; the server side comprises a monitoring system, the monitoring system comprises a system management module, an auditing management module, a strategy management module, an asset management module, a situation monitoring module, an organizational management module and a file management module; the system management module is used for managing configuration management of the server side; the auditing management module is used for managing client side logs; the strategy management module is used for managing security strategies and sending the strategies to the client side, and the client side configures the security plugins according to the security strategies; the asset management module is used for managing the client side; the situation monitoring module is used for monitoring states of each client side; the organizational management module is usedfor managing user information; and the file management module is used for managing upgrading of the security plugins of the client side.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a host monitoring system based on a plug-in architecture. Background technique [0002] In recent years, with the increasing scale and complexity of computer network applications, network security issues have increasingly become the focus of attention. At present, most governments and enterprises have deployed a series of security protection software such as anti-virus software, firewall, intrusion detection system, etc., which solves the external security problems to a certain extent. But according to statistics, more than 50% of network security problems originate from insiders. Therefore, in order to meet the needs of internal information security monitoring, the host monitoring system came into being. It can effectively control the use of terminal hosts and networks by internal users, prevent internal violations, and has a powerful log audit function, so that releva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F11/30
CPCH04L63/10H04L63/20H04L67/025G06F11/3051H04L67/1001
Inventor 周炼赤高景生孙宇赵朋川张岩黄晨宋鹏飞冉龙翔
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products