Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for discovering illegally-accessed equipment

A technology of illegal access and equipment, applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problems of heavy maintenance workload, unsatisfactory effect, complicated operation settings, etc., and achieve remarkable results

Active Publication Date: 2011-07-06
上海北塔软件股份有限公司
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that this mechanism is based on user and password authentication. For large and medium-sized LANs, there are many network users and complex personnel, and the security of multiple users and multiple passwords cannot be effectively guaranteed. As a result, illegal access users cannot effectively control
[0012] As mentioned above, the above two currently used technologies have high requirements for users, the operation settings are very complicated, and the maintenance workload in the future is also very large, and the effect is not very satisfactory, and both have obvious defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for discovering illegally-accessed equipment
  • Method for discovering illegally-accessed equipment
  • Method for discovering illegally-accessed equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] As above-mentioned concrete method step of the inventive method is:

[0033] The first step is to use the physical topology map of the network management software to place all the network management servers, core switches and switches connected to each PC client in the local area network (or internal network) under its jurisdiction on the physical topology map. And show their relative positions and interconnection lines between them on the physical topology map. In this embodiment, the physical topology map is a physical topology map in BTNM3.6 network management software (hereinafter referred to as network management software) provided by Shanghai Beita Software Co., Ltd. The distribution of the company's internal network (local area network) equipment is shown on the physical topology map. like figure 1 As shown, including the core switch 2 of the head office as the core switch, the core switch 3 of the office building connected to the core switch 2 of the head offi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for discovering illegally-accessed equipment. According to the method, two defense lines are adopted. The first defense line comprises the following steps: utilizing a topological physical graph of network management software to display all equipment in a controlled local network onto the topological physical graph; obtaining all PC client side information connected with switches in the local network through an SNMP (Simple Network Management Protocol), an ARP (Address Resolution Protocol), and an Netbios (Network Basic Input / Output System Protocol); adopting an MAC address discrimination method to establish a standard comparison table containing the content of legal equipment in the local network; carrying out binding operations on IP addresses of PC client sides, MAC and port numbers of the switches according to the standard comparison table. The second defense line comprises the following steps: randomly adopting the MAC address discrimination method to obtain port information of the switches connected with the all PC client sides, comparing the port information with that of the comparison table, and determining the client sides which do not exist as new-emerging ones and as illegally-accessed equipment and blocking. The method provides double safety.

Description

technical field [0001] The invention relates to a method for discovering illegal access equipment, which is especially suitable for timely discovering unauthorized access equipment on an internal network (local area network), and can accurately locate the position of the illegal access equipment on the network. Background technique [0002] The problem of illegal access to the internal network (local area network) is an important issue facing the internal network security of large and medium-sized enterprises. How to effectively monitor and manage the computers and network devices connected to the network is the prerequisite for the safe operation of the internal LAN. [0003] With the advancement and development of informatization, the internal networks of large and medium-sized enterprises are becoming larger and larger, and network applications are becoming more frequent. The size and complexity of the network has led to more and more serious network security risks. Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王俊
Owner 上海北塔软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products