Data merging mechanism for large distributive intrusion inspecting system

An intrusion detection system and real-time data technology, applied in the field of network security, can solve problems such as technical means that are difficult to prevent and economic losses

Inactive Publication Date: 2008-08-27
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] With the continuous expansion of the network scale, the network attack methods are also constantly developing. For example, the distributed denial of service attack has caused huge economic losses and is difficult to prevent with the current technical means. At this time, the intrusion detection system based on the host and small-scale network It shows its limitations, and the application of intrusion detection system to large-scale high-speed network has become a new foothold of intrusion detection system research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data merging mechanism for large distributive intrusion inspecting system
  • Data merging mechanism for large distributive intrusion inspecting system
  • Data merging mechanism for large distributive intrusion inspecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The data fusion method proposed by the invention has good expansibility, is very suitable for the characteristics of a large-scale distributed intrusion detection system, and can adopt different numbers of data fusion modules for different system scales.

[0099] 1) Small network

[0100] For a smaller network environment, such as an enterprise network with less than 100 computers, use the following figure 1 A data fusion component as shown will suffice.

[0101] 2) Large network

[0102] For a large-scale distributed network environment, such as the China Education Network, which has millions of computers, some preparatory work is required to deploy the data fusion module: Step 1: Divide the network by domain: use network security authorization Based on the principle of regionalization, a large network is divided into multiple security domains, and a data fusion module is placed in each domain; the second step is to choose an appropriate way to organize these data fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is a real time warning merging system for a large scale distributive type of invasion detecting system. In a large scale high speed network, the invasion detecting system generally adopts the stratified distributive type of structure, which can meet the requirements of a large scale high speed network through the dispersive collection, the distributive process and the concentrative administration. In a large scale network there can be disposed a plurality of invasion detecting systems, each of which covers a part of the network, and other safety members such as fire wall and like. In order to obtain a global aeroview of invasion, all of these safety members must operate in coordination with each other.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a real-time fusion method of alarms in a large-scale distributed intrusion detection system. Background technique [0002] The wave of global informatization represented by the Internet is deepening day by day, the application of information network technology is becoming more and more popular and extensive, and the application level is deepening. The application field is gradually expanding from traditional and small business systems to large and key business systems. Typical such as Party and government department information system, financial business system, enterprise business system, etc. With the popularization of the network, security has increasingly become an important issue that affects network performance. The openness, internationality and freedom of the Internet increase the degree of freedom of application and put forward higher requirements for security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/00H04L12/26H04L12/24G06F17/00
Inventor 江为强吕慧勤杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products