Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent network firewall equipment and network attack protection method

An intelligent network and firewall technology, applied to electrical components, transmission systems, etc., can solve problems such as difficulty in adapting to network attack situations and rigid firewall policies

Active Publication Date: 2016-03-30
CHINA TELECOM CORP LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the firewall has a certain protective effect on network attacks, the traditional firewall's strategy against network attacks is relatively rigid. As time goes by, it is difficult to adapt to the constantly changing network attack situation. Adapt to new network security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent network firewall equipment and network attack protection method
  • Intelligent network firewall equipment and network attack protection method
  • Intelligent network firewall equipment and network attack protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions of the present invention will be further described in detail below through the accompanying drawings and embodiments.

[0038] First, explain the honeypot technology. A honeypot (or honeypot system) is a system specially used to trap hackers. It can be a physically existing host with various vulnerabilities and monitoring systems deployed on it; also It can be the IP address, port, and service virtualized by the network device. It does not exist in itself, but from the perspective of an attacker on the network, this host does exist and can respond and provide services.

[0039] In the context of the present invention, the honeypot exists to attract various scans, attacks, and compromises in the network. By monitoring the network traffic flowing into / out of the honeypot, these behaviors can be analyzed to determine whether they may be malicious Cyber ​​attacks.

[0040] Such as figure 1 Shown is a schematic structural diagram of an embodiment of an inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intelligent network firewall device which comprises a firewall module used for limiting data traffic in accordance with a blocking strategy according to the issued blocking strategy, a honey pot module used for arranging a virtual honey pot system in accordance with preset requirements using unoccupied Internet protocol (IP) addresses and / or ports in a network, monitoring access traffic to the virtual honey pot system, and then determining and recording attack IP addresses and / or ports according to the access traffic, and a safety strategy module used for generating a new blocking strategy according to the attack IP addresses and / or ports recorded by the honey pot module and issuing the net blocking strategy to the firewall module. The invention further relates to a network attack protection method. The virtual honey pot system in a firewall device is used for attracting illegal network attacks, and therefore network attack IP addresses and / or ports can be identified, the safety strategies of the firewall device are dynamically adjusted, the network attack situation which changes dynamically can be adapted to, and new network safety requirements can be adapted to.

Description

Technical field [0001] The invention relates to firewall technology in the field of computer network communication, in particular to an intelligent network firewall device and a network attack protection method. Background technique [0002] With the development and popularization of computer networks, illegal network attacks such as hackers and worms on the network are becoming more and more rampant. In order to protect computer networks and systems, firewalls have emerged. Firewall, also known as Firewall, is a device that helps ensure information security. The device allows or restricts the transmission of data in accordance with specific rules. Specifically, the earlier implementation of firewalls was based on packet filtering, that is, simply comparing IP addresses and ports, and later added the function of state detection on this basis, which has become the main working method of current firewalls. The firewall can be a dedicated piece of hardware or a set of software buil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 余晓光王帅
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products