Alarm and response system for inner-mesh network aggression detection

A network attack, intranet technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of difficult deployment and increased deployment costs.

Inactive Publication Date: 2009-04-22
ZHEJIANG UNIV
View PDF3 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this invention is that an intrusion detection and firewall system needs to be installed on each monitored host, w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm and response system for inner-mesh network aggression detection
  • Alarm and response system for inner-mesh network aggression detection
  • Alarm and response system for inner-mesh network aggression detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] An embodiment of an alarm and response system and implementation method for intranet network attack detection of the present invention will be described in detail below with reference to the accompanying drawings.

[0058] like figure 1 As shown in , an alarm and response system for intranet network attack detection in the intranet, the system includes a management center, a detection machine and a database.

[0059] The management center runs on a single host, and a single management center can be connected to multiple detectors, each detector is connected to a switch, and each switch can be connected to multiple PCs at the same time.

[0060] The management center receives the alarm information sent by the detector from time to time, stores the alarm information in the database of the management center, and displays it through the user interface to provide query and other functions. The management center also stores various configuration information of the detector in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a warning and responding system used for intranet network attack detection. The system comprises a management center, a detecting machine and a database. The management center is used for configuring and amending each parameter of the detecting machine, receiving and storing warning message sent by the detecting machine and inquiring the state of the detecting machine. Anomaly information detection is carried out on an intranet network by an anomaly detection algorithmic module of the detecting machine, the anomaly detection algorithmic module obtains anomaly detection information and confirms the reliability of the information. When the reliability of the anomaly detection information reaches a preset value, the warning message is sent. The isolation time and the isolation form of an IP address generating the anomaly detection information are confirmed according to the warning message, and the IP address is isolated. The IP address that the isolation time reaches the preset value is released from isolation. The method can detect and prevent the attack from an intranet mainframe to outer net or other intranet mainframes exactly and effectively in time.

Description

technical field [0001] The invention relates to the technical field of computer security protection, in particular to an alarm and response system and an implementation method for intranet network attack detection. Background technique [0002] Intranet security is currently neglected by many network security devices and systems. Existing methods usually collect traffic at the egress of the subnet to detect attacks, but the traffic between hosts inside the subnet cannot be collected, so it is impossible to detect attacks inside the subnet. abnormality, especially the abnormality of the traffic between ports under a single switch. At present, many network anomalies, especially worms, the initial stage of the outbreak is to scan the subnet and generate malicious traffic. If the traffic inside the subnet can be monitored and detected, it can effectively make up for the gaps in existing security measures and improve The security level of the network. [0003] At present, the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26H04L29/06
Inventor 董亚波郭晔鲁东明魏蔚王勇超
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products