Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of linking network equipment and invading detection system

An intrusion detection system and network equipment technology, applied in the field of network security, can solve problems affecting normal use, achieve simple implementation, and improve the overall protection ability

Inactive Publication Date: 2008-11-19
NEW H3C TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This linkage method of prohibiting the abnormal data flow of a certain port can ensure the security of the network to a certain extent, but it will also affect the normal use of other users under the port.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of linking network equipment and invading detection system
  • Method of linking network equipment and invading detection system
  • Method of linking network equipment and invading detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The core of the present invention is to set up listening port on the network equipment, copy all the data messages that start the intrusion detection port to the intrusion detection system, detect whether these data streams are offensive by the intrusion detection system, and report to the network equipment according to the detection result. Send the characteristics of the data flow that needs to be blocked, and the network device implements the blocking of the data flow through the ACL (Access Control List) according to the characteristics of these data flows.

[0033] Those skilled in the art know that intrusion detection refers to collecting information from several key points in a computer network or computer system and analyzing it to find out whether there are behaviors violating security policies and signs of being attacked in the network or system. The combination of software and hardware for intrusion detection is IDS (Intrusion Detection System). The network i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for coupling network device with intrusion detection system includes detecting network device port by intrusion system for obtaining data stream control data including character data of doubtful data stream and its corresponding block time, sending said control data to network device , setting up corresponding access control list according to received data stream control data by network device to block data stream .

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for linkage between network equipment and an intrusion detection system. Background technique [0002] When more and more companies transfer their core business to the Internet, network security appears to people as an unavoidable problem. Traditionally, companies generally use firewalls as the first line of defense for security. As the knowledge of attackers becomes more mature, and the attack tools and methods become more complex and diverse, a simple firewall strategy can no longer meet the needs of departments that are highly sensitive to security. Network defense must adopt a deep and diverse means. Intrusion detection technology is a network security technology that actively protects itself from attacks. As a reasonable supplement to the firewall, intrusion detection technology can help the system deal with network attacks, expand the security management...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 周万张志群乐识非郑高龚志伟
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products