Network intrusion detection system

A network intrusion detection and intrusion detection technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the complexity of intrusion attacks or the speed of propagation, and cannot detect network intrusion attacks in real time. Network intrusion detection system The responsiveness cannot keep up with the problems, so as to achieve better and faster processing speed

Inactive Publication Date: 2009-06-10
INVENTEC CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, no matter what kind of network intrusion detection system it is, it needs to consume considerable system resources when performing intrusion detection.
The network intrusion detection system needs to analyze the type of each packet and even analyze the content of the packet. Therefore, in some networks with r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection system
  • Network intrusion detection system
  • Network intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The purpose and proposed of the present invention are described in detail in the following preferred embodiments. However, the concept of the invention can also be used in other areas. The following examples are only used to illustrate the purpose and implementation method of the present invention, and are not intended to limit the scope thereof.

[0035] figure 1 It is a schematic diagram of the network topology of the network intrusion detection system according to the preferred embodiment of the present invention. Please refer to figure 1 , the network intrusion detection system 120 is often set up at important network nodes of the internal network (intra-net) to detect and monitor network packets, and then find abnormal network activities and filter them out, so as to protect the security of each host in the internal network Data is protected from theft or malicious damage to host systems. In this preferred embodiment, the network intrusion detection system 120 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network intrusion detection system, which is arranged at an important network node, and used for detecting and monitoring a network packet. The network intrusion detection system comprises a network card and a system core processor. When the network packet is received, a microprocessor of the network card performs a packet parsing program and a packet preprocessing program to distinguish packet type and source address and convert the packet into an intrusion detection format packet in advance. Later, the system core processor judges whether the intrusion detection format packet is an intrusion packet. Because calculation burden of the programs for parsing the packet and preprocessing is shared by the network card, the network intrusion detection system is not easy to lose the packet due to overweight calculation burden, and improves accuracy greatly.

Description

technical field [0001] The invention relates to an intrusion detection system, and in particular to an intrusion detection system, which has a network card capable of performing packet analysis and packet preprocessing. Background technique [0002] In the past, network security solutions mostly consisted of antivirus software and firewalls to achieve basic network security protection. The anti-virus software prevents the computer system from being infected with computer viruses, and the firewall protects private data from being stolen. Although firewalls and anti-virus viruses can control most malicious intrusions by those who intend to invade computer systems, some hackers can still break through firewalls and invade computer systems. The network intrusion detection system (Intrusion Detection System, IDS) technology has developed into an important technology to protect the computer system from being stolen data or maliciously destroying the computer. The intrusion detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
Inventor 曹苍眸马春梅孟聪陈玄同刘文涵
Owner INVENTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products