Method, device and system for network security auditing

A network security and virtual network technology, which is applied in the field of network security audit methods, devices and systems, and can solve problems such as the inability to realize file transfer and audit between local equipment and remote servers

Active Publication Date: 2012-12-12
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a network security audit method, device and system to solve the problem in the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for network security auditing
  • Method, device and system for network security auditing
  • Method, device and system for network security auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Since the VNC protocol itself does not support file transfer, file transfer and auditing between the local device and the remote server cannot be implemented when the network security audit is performed through the bastion host. In the embodiment of the present invention, while realizing the remote desktop link from the remote server to the local device through the VNC protocol, the file transfer between the local device and the remote server is realized through FTP, so the bastion host can audit the files uploaded by the local device, and according to The audit result controls the file, which improves the security of the remote server.

[0035] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] figure 2 The network security audit process provided for the embodiment of the present invention specifically includes the following steps:

[0037] S201: The bastion host establishes a remote desktop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for network security auditing. The method, the device and the system are used for solving the problem of poor security of a remote server in the prior art. The method includes that a bastion host sets up a remote desktop link from a remote server to local equipment through the VNC (virtual network computing) protocol, receives a file uploaded by the local equipment through the FTP (file transfer protocol), audits the file according to stored auditing strategies, transmits the file to be stored in the remote server when audit is eligible and abandons the file when the audit is ineligible. In the method, file transmission between the local equipment and the remote server is realized by the aid of the FTP, so that the bastion host can audit the file when receiving the file uploaded by the local equipment through the FTP and can control the file according to the audit results, and security of the remote server is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security audit method, device and system. Background technique [0002] The bastion machine is a user-oriented centralized control operation and maintenance security audit product. Its main function is to control the centralized access of users and audit the entire operation behavior of users from login to logout. The user can use the device account on the local device to access target devices such as remote servers through the bastion host. The device accesses the corresponding target device. Among them, the local device and the remote server are distributed in two physically isolated networks, and the bastion host acts as a "middleman", that is, the user's operation data through the local device is forwarded to the remote server by the bastion host, and the data returned by the remote server Forward it to the local device through the bastion host. [0003] figure 1...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L12/46
Inventor 王伟
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products