Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for managing security of general network

A security management, general network technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of weak functional completeness, poor scalability, poor openness, etc., and achieve the advantages of functional completeness, scalability, good openness

Inactive Publication Date: 2012-05-09
XIDIAN UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] 1. Poor openness
All kinds of network security management products are mostly launched as subsidiary products of large network equipment manufacturers. The purpose is to realize the linkage and management between various mainstream network equipment and network security equipment produced by them. When it comes to an independent hardware platform, they are not very friendly to other manufacturers' products. Competitors' products and non-mainstream security technologies are difficult to integrate into it. Some existing interactive and linkage products are also based on industry alliances or In the form of technical specifications, other security products or defense technologies must passively comply with their standards if they want to be supported by these platforms, which is often difficult to achieve in the highly competitive network security market
[0017] 2. Poor scalability
[0018] 3. Weak functional integrity
The defects in openness and scalability of network security products also directly lead to incomplete product functions. For example, some products can only provide linkage between firewalls and intrusion detection systems, and some products only query and monitor logs of managed devices. analysis, but cannot provide a valid response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for managing security of general network
  • System and method for managing security of general network
  • System and method for managing security of general network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] refer to figure 1 , the general network security management system of the present invention comprises:

[0048] A. The security agent terminal is installed on the peripheral network equipment, connected with the security management center, and provides security services for the network environment where it is located. It is mainly composed of detectors, response components and interface components. The detector is loaded and configured by the security management center according to the characteristics of the peripheral equipment, and completes the functions of equipment operation status monitoring, intrusion detection, behavior monitoring, log collection, and vulnerability detection; the response component guides the network according to the response command of the security management center Configure the device and eliminate threats, and can complete the functions of configuring the device, blocking intruders, sending warnings to intranet users, and repairing vulnerabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for managing security of a general network, and mainly overcomes the defects of poor openness and expansibility and weak functional completeness existing in the prior network security management system. The system mainly comprises peripheral equipment, a security agent terminal, a security management center and terminal management equipment, wherein the security management center applies security technology of network access control, intrusion detection, virus detection and vulnerability management to the security agent terminal through an interface component, a data base module and a user interface component; and under the unified management and control, all security technology is mutually complemented and matched to detect and control networkbehaviors, so that a distributed security protection system structure in which security strategies are under central management and the security detection is separately distributed is formed. The system and the method have the advantages of flexible configuration, easy expansion, good openness, support of the different level management, and suitability for the security management and protection of the computer network in governments, colleges and universities, and large- and medium-sized enterprises.

Description

technical field [0001] The invention belongs to the technical field of computer networks, in particular to a management system and method related to network security, which is used for centralized management and monitoring of network equipment including routers, switches, firewalls, intrusion detection systems and servers. Background technique [0002] The security protection technology related to network security has been developed so far, and the following effective technical solutions have been formed: [0003] 1. Firewall technology——Firewall is an access control system set between the protected network and the Internet. Its feature is to check network communication at the network entry point. According to the security rules set by the administrator, the premise of protecting internal network security Next, it provides internal and external network communication, and has the characteristics of security, anti-attack, manageability, authentication and encryption, and dynam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
Inventor 朱辉李晖张卫东尹钰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products