Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

ASN (attack security interaction) and implementation method thereof

A technology of linkage system and implementation method, which is applied in the direction of transmission system, digital transmission system, electrical components, etc., can solve the problems of poor network control ability and weak defense attack ability, and achieve convenient operation, improved active operability, and avoidance of management chaotic effect

Inactive Publication Date: 2011-06-08
成都飞鱼星科技股份有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an ASN anti-attack security linkage system, which overcomes the problems in the prior art that the server has poor control over the network and weak defense against attacks, and realizes unified management of the client without affecting the server. In the case of their own work, improve their ability to control the network and self-protection ability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ASN (attack security interaction) and implementation method thereof
  • ASN (attack security interaction) and implementation method thereof
  • ASN (attack security interaction) and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] In this embodiment, the present invention is described by taking the server side including two-level clients connected by ladders as an example.

[0039] Such as Figure 1 ~ Figure 3 As shown, the ASN anti-attack security linkage system mainly includes a server and a first-level client connected to the server. The first-level client has three second-level clients, and each second-level client has Set up two user hosts. Wherein, the server is embedded with a system management module, an exception processing module, a protocol processing module and a data storage, and the first-level client and the second-level client are respectively embedded with an instruction execution module. The implementation method of the system is as follows:

[0040] 1. The server implements restrictions on all clients

[0041] 1. Client registration: The server periodically sends out scanning instructions from the system management module, and transmits it to clients at all levels according to the ...

Embodiment 2

[0055] Such as figure 1 , Figure 4 As shown, the ASN anti-attack security linkage system mainly includes a server and three first-level clients connected to the server, and each first-level client has two user hosts. Wherein, the server is embedded with a system management module, an exception processing module, a protocol processing module and a data memory, and all first-level clients are embedded with an instruction execution module.

[0056] Regarding the implementation method, the main difference between the two embodiments is that in this embodiment, when the server actively defends and attacks the attack source, the exception handling module directly sends the operation instructions to the first-level client directly connected to the attack source. Data is no longer transmitted through other clients in the middle. After filtering the data transmitted by the attack source, the first-level client also directly transmits data back to the server without passing through other c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ASN (attack security interaction), which belongs to the technical field of network communications and is used for solving the problem that the self-protection capacity of a network service end in the prior art is too weak. The ASN comprises a service end, a client-side and a user host machine, wherein the service end and the client-side are in a mapping relation; the client-side and the user host machine are in a mapping relation; a system management module, an exception handling module, a protocol processing module and a data storage are embedded in the service end; an instruction execution module is embedded in the client-side; the data storage, the exception handling module and the instruction execution module are directly connected with the system management module and controlled by the system management module; and the protocol management module is respectively connected with the exception handling module and the instruction execution module. The invention also provides an implementation method of the ASN. By using the implementation method of the ASN, the active defense and attack of the service end and the client-side is implemented, the network safety is improved, and the practical value is very high.

Description

Technical field [0001] The invention relates to an anti-attack security system in network communication, and specifically relates to an ASN anti-attack security linkage system and an implementation method thereof. Background technique [0002] In the current communication network architecture, routers generally work on the third layer of ISO / RM, that is, the network layer, while switches work on the second layer, that is, the data link layer. Routers in the third layer cannot be The switch on the second layer issues instructions, controls or manages. In this case, the router's self-protection function is extremely limited. [0003] If you want to manage a large number of switches in a unified manner, you need to use network management technologies such as SNMP or TR069, use independent control software or server, and all devices support the above protocols, and you need to configure all devices in advance Information such as IP, port, etc. is very cumbersome, and the construction ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/56
Inventor 周龙
Owner 成都飞鱼星科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products