Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion detection system and method adopting unified detection framework

An intrusion detection system and intrusion detection technology, applied in the transmission system, electrical components, etc., to achieve the effect of saving time and system resources

Inactive Publication Date: 2013-01-23
BEIJING VENUS INFORMATION TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the diversification of intrusion methods, some attacks such as slow scanning, SQL injection, XSS and other attack methods can no longer be described by simple features. When new attack methods appear, the IDS system needs to make more modifications to the software to add new detection methods. When some detection methods are no longer needed due to some reasons, more modifications are required before deletion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and method adopting unified detection framework
  • Intrusion detection system and method adopting unified detection framework
  • Intrusion detection system and method adopting unified detection framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The detection frame capable of dynamically mounting detection units adopted in the present invention can flexibly mount and unmount a single detection unit on the detection frame.

[0034] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0035] In this embodiment, the intrusion detection system using a unified detection framework includes multiple message processing units on each protocol layer, multiple detection units for intrusion detection of network attack events, a configuration unit, an initialization unit, and a detection control unit, wherein :

[0036] The configuration unit is used to respectively implant mount points after the selected packet processing unit, and configure the mount points to be mounted for each detection unit, and each detection unit performs intrusion detection on network attack events. The file feature information must be obtained during the message processing process ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intrusion detection method and system adopting a unified detection framework. The method comprises the following steps: mount points are embedded in a selected message handling unit and configured for each detecting unit; the required message characteristic information is obtained before the message handling process of each mount point; all the active detecting units are registered to the corresponding mount points; when the message passes through one mount point with the detecting unit, the detecting unit on the mount point performs intrusion detection to the message; and after the detection, for one mount point which is not the last level of mount point, the message enters the message handling unit after the mount point or the mount point for continuous handling. The system of the invention comprises a plurality of message handling units, a plurality of detecting units, a configuration unit, an initialization unit and a detection control unit on each protocol layer. The method and system can fast add or delete the detecting unit without changing the software architecture, thus saving time and system resources.

Description

technical field [0001] The invention relates to an intrusion detection system (Intrusion Detection System, IDS for short) system and an intrusion detection method. Background technique [0002] The IDS system is composed of hardware and software. It is used to detect systems or networks to find possible intrusions or attacks. At present, mainstream commercial IDS systems use feature detection as the core, which is to combine the collected information with known network information. Intrusion and system misuse pattern databases are compared to discover behaviors that violate security policies, and the timely update of signature databases becomes the key to system detection capabilities. [0003] Such as figure 1 As shown, the traditional IDS processing flow is to first capture network packets, and then pre-process the captured packets, including fragment processing, flow reassembly and protocol identification, and then send the data to the attack signature detection unit for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 焦玉峰鲁文忠牛妍萍
Owner BEIJING VENUS INFORMATION TECH