Method, system and detecting device for network security interaction

A network security and linkage system technology, applied in the field of network security linkage methods, systems and detection devices, can solve the problems of high false alarm rate, lack of interaction, and inability to achieve cross-network domain linkage, so as to reduce the false alarm rate and ensure effective sexual effect

Inactive Publication Date: 2009-09-09
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the OPSEC and TOPSEC linkage technology system can respond efficiently, it is a relatively closed system that lacks interaction with upper-level analysts, making it difficult to guarantee the effectiveness of linkage, and has a high false alarm rate
In addition, the entities of the linkage system need to be configured in advance, and in most cases it can only solve problems within the same network, and cannot achieve linkage across network domains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and detecting device for network security interaction
  • Method, system and detecting device for network security interaction
  • Method, system and detecting device for network security interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] like figure 1 As shown, it is a schematic flowchart of the first embodiment of the network security linkage method of the present invention. This embodiment includes the following steps:

[0026] Step 101, after the detection module detects the intrusion behavior in the network, judge whether the intrusion behavior is a known intrusion behavior, if yes, then perform step 102 and step 103; otherwise, then perform step 104, step 105 and step 106 .

[0027] The known intrusion behavior is a known and definite security threat. In this step, the detection module can perform pattern matching according to the preset known attack pattern rule base to determine whether the intrusion behavior is a known intrusion behavior;

[0028] Step 102, the detection module executes the first linkage decision, the first linkage decision is that the detection module directly sends the first command carrying the processing method to the response module, so as to directly notify the response ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, a system and a detecting device for network security interaction. The method comprises the following steps: determining whether an invasion action type in a network belongs to known invasion actions; sending a first instruction carried with a processing mode to a response module if the invasion action type in the network belongs to the known invasion actions; sending unkown invasion action related information to an analysis module if the invasion action type in the network does not belong to the known invasion actions, and acquiring a corresponding processing mode after the analysis module analyzes the related information; and sending a second instruction carried with the processing mode to the response module. The embodiment of the invention realizes safety information and safety response through the upper and under layer relation of the analysis module and the detection module, and can realize the real-time response to safety events through the parallel response relation between under layers of the detecting module and the response module to ensure the effectiveness of the interaction and reduce the rate of false alarm.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, in particular to a network security linkage method, system and detection device. Background technique [0002] With the continuous development of network technology, network security has become an important issue that people pay attention to. The existing security protection technology relies on a single security device to complete network security protection, but each security device is independent of each other and cannot interoperate. Any problem with any security device may lead to a security incident. Faced with network security issues, many organizations have configured network security products, such as firewalls (Fire Wall, FW), system scanners, system real-time monitors, virtual private network (Virtual Private Network, VPN) gateways, and network antivirus software. Network security is a comprehensive issue, and the simple superposition of network secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 刘冰王绍斌位继伟王小妹辛阳
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products