Method for realizing data safe transmission of distribution cooperating intrusion detection system

An intrusion detection system and data security technology, applied in key distribution, can solve problems such as difficult to adapt to the situation, unable to deal with attack behavior, etc., and achieve the effect of safe transmission and reliable transmission service

Inactive Publication Date: 2007-09-19
BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The original network intrusion detection uses the detection engine to independently detect the intrusi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing data safe transmission of distribution cooperating intrusion detection system
  • Method for realizing data safe transmission of distribution cooperating intrusion detection system
  • Method for realizing data safe transmission of distribution cooperating intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention provides a method for realizing data security transmission of a distributed cooperative intrusion detection system. The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.

[0029] Fig. 1 shows the schematic diagram of composition of the distributed cooperative network intrusion detection system of the present invention and Fig. 2 shows the working flow diagram of the distributed cooperative intrusion detection system system of the present invention, and the distributed cooperative intrusion detection system of the present invention will be described later in conjunction with Fig. 1 and Fig. 2 The workflow of collaborative intrusion detection system is described in detail.

[0030] First, in step 201 , a data collection engine collects intrusion information in the network, and sends an alarm message or suspicious behavior message to the intrusion detection engine 101 .

[0031] In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method of distributed cooperation intrusion detection system data security transmission, which belongs the computer network security technology field. By adopting data code, message exchange and key management of the intrusion alarm information, the method ensures the security of information transmission from end to end in distributed cooperation intrusion detection system, solves the problems of maintenance and key management for data encryption and data discrimination, and data integrality, realizes an security transmission of intrusion detection system alarm information, and provides a reliable transmission service for monitoring cooperation.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a method for realizing secure data transmission of a distributed cooperative intrusion detection system. Background technique [0002] Network intrusion detection (Intrusion Detection) is the discovery of intrusion behavior. It collects and analyzes information from several key points in a computer network or computer system, and discovers whether there are signs of violations of security policies and attacks in the network or system. With the development of high-speed networks and the development of various distributed network technologies, the means and technologies of intrusion have also "progressed and developed". The development and evolution of intrusion technology are mainly reflected in the following aspects: [0003] Synthesis and complexity of intrusions or attacks. There are many methods of intrusion, and intruders often use one method of attack. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L9/32H04L9/08H04L29/06H04L12/24G06F17/30
Inventor 姜圳
Owner BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products