Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proactive audit system and method

An active and subsystem technology, applied in the field of network security, can solve problems such as data content omission, difficulty in analyzing the content of user data packets, and inability to detect leaking behaviors, etc., to achieve the effect of comprehensive auditing and risk reduction

Active Publication Date: 2013-07-24
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, such traditional content security auditing systems have some inherent limitations
First of all, these systems generally only analyze data packets passing through key nodes of the network, so these systems can only cover the behavior of network users passing through key nodes of the network, that is, these systems can only cover limited areas, and cannot achieve comprehensive security content audit
For example, if an enterprise user releases internal enterprise data to the public network through the wireless network card that comes with the laptop computer, the existing content security audit system will have no way to detect the leaking behavior
In addition, the existing content security audit system can only passively analyze the user data packets passing through the key nodes of the network, and the omission of data content due to various technical reasons is unavoidable
For example, if the website visited by the user adopts an encrypted transmission protocol (such as the HTTPS protocol), it is difficult for the existing content security audit system to analyze the content of the user data packet, so it is difficult to monitor the bad behavior of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proactive audit system and method
  • Proactive audit system and method
  • Proactive audit system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Before describing the specific embodiments of the present invention, the term URL, which is often used in the technical field, is firstly outlined, that is, a Uniform Resource Locator, which is an identification of a webpage existing on the Internet. As long as the URL is input in the web browser, the content of the webpage pointed to by the URL can be displayed in the web browser. Since there is a one-to-one correspondence between the URL and the content of the web page pointed to by the URL, the two can be used interchangeably hereinafter. For example, a URL containing illegal content means that the webpage pointed to by the URL contains illegal content.

[0022] figure 1 A structural block diagram of the content security audit system 100 according to the embodiment of the present invention is illustrated. The configuration means 101 obtains a URL list designated to be actively audited, and provides the URL list to the web page extraction means 103 . For each URL i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a content security audit system, which comprises an allocation device, a webpage extracting device, a content analysis and audit device, and a passive content security audit subsystem, wherein the allocation device acquires a URL list appointed to be proactively audited; the webpage extracting device extracts a webpage source code of a webpage pointed by the URL for each URL in the URL list; the content analysis and audit device performs content analysis on the webpage source code to determine whether the webpage source code comprises sensitive content or malicious codes; and the passive content security audit subsystem is used for acquiring data at network essential nodes, and analyzing the data to determine the URL list. The invention also provides a content security audit method used by the system.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network audit system and its method. Background technique [0002] With the rapid development of information technology and the development of network information system applications, more and more government agencies and enterprises realize that the increasingly complex IT business systems and the behavior of business users with different backgrounds have brought potential threats to the network. For example, the internal business data and important sensitive documents of the system can be tampered with, leaked and stolen through e-mail, database access, remote terminal access (TELNET, FTP, etc.), network file sharing (NETBIOS), etc.; netizens access illegal websites, publish illegal Illegal Internet behaviors such as speeches are increasingly rampant; there are also sabotage behaviors such as malicious users on the Internet that severely damage the information system security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 张云海
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products