Protection system for network access behavior

A network access and protection system technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to determine the purpose of network access requests, the inability to timely and effectively intercept malicious program network access behaviors, etc., and achieve the effect of timely interception

Active Publication Date: 2013-02-06
三六零数字安全科技集团有限公司
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the program uses these high-level protocols to request network access, the purpose of the network access request cannot be determined solely by the IP address and port; moreover, the IP address and port change very frequently in the network, such as when the network provider is changed. However, it takes a certain amount of time to update the local database, so the existing network protection methods cannot effectively block the network access behavior of malicious programs in a timely manner.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection system for network access behavior
  • Protection system for network access behavior
  • Protection system for network access behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0021] A program is an ordinary file, a collection of machine code instructions and data, and a static concept. A process is an execution process of a program on a computer and is a dynamic concept. The same program can run on several data sets at the same time, that is to say, the same program can correspond to multiple processes. Network access behaviors are initiated by running programs (that is, processes). The current networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection system for network access behavior. The system comprises a client device and a network side device; the client device comprises a protection apparatus for network access behavior; the network side device comprises a cloud database, a network side receiving module suitable for receiving at least one kind of domain information transmitted by the client device, a network side inquiry module suitable for inquiring whether the cloud database stores any type of the at least one type of domain information, and obtaining the inquiry result, and a network side transmitting module suitable for transmitting the inquiry result to the client device; and the protection apparatus for network access behavior comprises a driver layer module and an application layer module. The system provided by the invention directly uses the targets of these high layer protocols to judge whether the network access request is safe, thereby intercepting the network access behavior of rogue programs more effectively.

Description

technical field [0001] The invention relates to the technical field of network communication security, in particular to a protection system for network access behavior. Background technique [0002] With the rapid development of Internet technology and the general reduction of Internet access costs, the Internet has become an indispensable and important part of the daily life of most ordinary people. However, in order to express themselves and prove their abilities or other needs (such as politics, military, religion, nationality, patents, etc.), some programmers often write some malicious programs that affect the normal operation of the computer, so that those malicious programs Intruded users cannot achieve their own purpose of surfing the Internet, and may even paralyze the entire system. Therefore, network security has become the focus of attention today. [0003] Existing network protection methods are based on TCP (Transmission Control Protocol, Transmission Control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 熊昱之张聪刘海粟
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products