Network security defensive system, method and security management server

A defense system and security management technology, applied in the field of network security defense, can solve the problems of scattered security defense mechanism, inability to carry out unified management and technical statistics, and proliferation of network security problems, and achieve the effect of preventing continued proliferation and spread

Active Publication Date: 2008-03-12
RUIJIE NETWORKS CO LTD
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing network security defense mechanism, the security defense mechanism for servers is fragmented, and the network attack events discovered by network administrators on various network security defense devices are all independent, and unified management and technical statistics cannot be carried out;
[0005] In the existing network security defense mechanism, the security defense mechanism for the server is passive. When a network attack occurs, it can only be passively intercepted. When the network administrator discovers a network attack, it is impossible to locate ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security defensive system, method and security management server
  • Network security defensive system, method and security management server
  • Network security defensive system, method and security management server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiment of the present invention provides a method and system for security defense of servers in the network to solve the defects in the network security defense mechanism in the prior art, and is mainly used for active and efficient network security defense of key servers .

[0047]The embodiment of the present invention achieves the purpose of network security defense for servers, especially key servers, through the linkage and interaction of various security components, thereby effectively preventing malicious users from network attacks on servers, mainly involving the following security components: Authentication client (Supplicant), authentication and accounting management system (Security Accounting management System, SAM), security access functional components, security management platform (Security Manager Platform, SMP), security event parser (Security Event Parser, SEP), Network attack detection system (Net Intrusion Detection System, NIDS), in which: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model relates to a data communication network safety technology, more particularly, provides a network security defense system and the method as well as a safety management server, so as to conduct the active defense against the terminal equipment which attacks the severs in the network. The network security defense system comprises a safety certification client, a safety access exchanger, a certification charging server, a network attack monitoring unit and a safety management server. The network security defense mechanism provided can ascertain the terminal equipment which attacks the network and assume the active defense against such terminal equipment, so as to effectively guard against the continuous diffuseness of network attach incident.

Description

technical field [0001] The invention relates to data communication network security technology, in particular to a network security defense technology. Background technique [0002] With the continuous advancement of network technology, network intrusion activities are also developing and becoming increasingly active. Among all kinds of network intrusion activities, network attacks against servers, especially key servers, can be said to be the most threatening and likely to cause the greatest loss. A key server refers to a server that stores important information in the network. A large amount of important information is stored on a key server as an intangible asset. Once it is threatened by network security, it will inevitably affect the stored important information, resulting in immeasurable losses. What's more deadly is that these network intrusions come not only from external hackers, but also from insiders. [0003] At present, various enterprises and units mainly ado...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L9/32
Inventor 吴晶晶林雁敏王湧
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products