Distributed hacker tracking system in controllable computer network

A computer network and distributed network technology, applied in the field of hacker tracking of controllable computer networks, can solve the problems of difficult to provide the real source of hacker tracking, large errors, application difficulties, etc., achieve good scalability, reduce the need for storage the content and the effect of the data to be processed

Inactive Publication Date: 2008-04-02
SHANGHAI JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it still needs to save the sequence number information of all TCP connections, and it can only be compared centrally, which is difficult in large-scale network applications; at the same time, if the network transmission time fluctuates greatly, the error generated by this method will also follow. increases; for connections with shorter durations, the resulting error is also larger
[0072] However, most of the existing intrusion detection systems focus on the discovery and prevention of attacks. Although most network-based attacks can be detected, it is difficult to trace the real source of hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed hacker tracking system in controllable computer network
  • Distributed hacker tracking system in controllable computer network
  • Distributed hacker tracking system in controllable computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0140] Below we will further illustrate the present invention through embodiments in conjunction with the accompanying drawings.

[0141] A complete hacker tracking technology consists of two parts: hacker identification and hacker tracking. The invention adopts the intrusion detection technology to complete the hacker identification, and completes the hacker tracking according to the alarm information and the data fingerprint of the intrusion detection. The hacker tracking system model established by the present invention is shown in FIG. 5 .

[0142] In Fig. 5, the hacker is the attacker 11, the attacked target host is the victim 13, gateway 1 (Gateway1) 56, gateway 2 (Gateway2) 57... gateway n-1 (Gateway (n- 1) 58. Network monitor 1 (NM1) 52, network monitor 2 (NM2) 53, ... network monitor n (NMn) 54, distributed on the network path from the attacker to the attacked The network monitor completes the monitoring and analysis of network packets, and if an attack is found, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is one distributed hacker tracking system in controllable computer network based on network invasion detection and data fingerprint technology. Inside one enclosed and controllable network system, network monitors are set in all shared network sections to send the invasion alarm information to the managing device. In case that some monitor finds invasion, the managing device will check corresponding record to back track the message path and to determine the network section the hacker is in or to determine the initial source. The system has excellent expandability and real-time property and is suitable for large hetero network.

Description

technical field [0001] The invention relates to distributed processing of computer information network security, in particular to a hacker tracking method of a controllable computer network. Background technique [0002] Computers and the Internet have become one of the most important information infrastructures of a country. Protecting the security of these facilities so that they are not damaged by hostile countries, computer hackers and other computer criminals is a necessary condition for protecting the country's sovereign integrity and information security, and ensuring the normal operation of industries and departments such as government, finance, commerce, and technology. . [0003] If you can obtain the real address of the hacker, record relevant evidence, and take it to law, you can effectively deter cybercrime and computer crime, and maintain the security of the network and computer system. Although hacker tracking is of great security significance, in the networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/18H04L12/24H04L9/00G06F9/44
Inventor 谷大武李小勇陆海宁
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products