Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion character configuration method and system

A network intrusion and configuration method technology, applied in the field of network security, can solve problems such as service termination, difficulty in obtaining upgrade packages, and difficulty in user acceptance

Inactive Publication Date: 2010-10-27
BEIJING LEADSEC TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two hidden dangers in this system: 1) In a large-scale network or complex software system environment, the installation of an upgrade package will lead to service termination, which is generally difficult for users to accept; 2) Similar to dynamic WEB websites, OA systems, and user business system software, They are codes developed by users themselves or commissioned to customize. Unlike commonly used software such as office, even if very dangerous security holes (such as SQL injection) are scanned, it is difficult to obtain upgrade packages within a time acceptable to customers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion character configuration method and system
  • Network intrusion character configuration method and system
  • Network intrusion character configuration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention provide a network intrusion feature configuration method and system, which are used to provide IPS product users with a network intrusion feature configuration set that best matches the actual environment, so as to block illegal attacks on system loopholes in a targeted manner.

[0042] In order to facilitate the understanding of those skilled in the art, the best implementation of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] see figure 1 , which is a flow chart of the first embodiment of the network intrusion feature configuration method according to the present invention.

[0044] The network intrusion feature configuration method described in the first embodiment of the present invention includes the following steps:

[0045] S100, respectively setting a configuration mode of "vulnerability-related features" and a configuration mode of "non-vulnerability-related f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network intrusion character configuration method, which comprises the following steps of: 1) respectively setting a configuration mode for flaw related characteristics and a configuration mode for non flaw related characteristics; 2) establishing a flaw-characteristic correspondence association list, wherein the correspondence association list comprises two fields, namely a flaw name field and an attack characteristic identifier field; 3) scanning a user system to acquire a network security flaw list; 4) searching related characteristics of the network security flaw list of 3) according to the flaw-characteristic correspondence association list established by 2), wherein the flaw related characteristics found in the network security flaw list are called by a joint name, namely the flaw related characteristics, and the characteristics which are not found are called non flaw related characteristics; and 5) setting the configuration modes for the flaw related characteristics found by 4) and the non flaw related characteristics according to the configuration modes set by 1) so as to form an IPS characteristic set configuration example.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network intrusion feature configuration method and system. Background technique [0002] Cyber ​​attackers can achieve the purpose of destroying or obtaining illegal benefits by exploiting the loopholes in computer software or hardware systems. For example, using other people's computers as a springboard to steal files from other computers, causing other people's computers to crash, formatting disks, monitoring other people's computers or spying on other people's privacy, remotely controlling other people's computers, invading characteristic website servers to replace the homepage of the website, Download the user database to cause commercial losses, attack the website server so that it cannot be accessed by users, etc. Network attack technology has now been gradually mastered and developed by more and more people, and more and more "fool-type" network attack software is develo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 高鹏
Owner BEIJING LEADSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products