Alarm and blocking method for illegal external connections

An external and legal technology, applied in the field of information security, can solve the problems of weak security protection, single function, complex mechanism, etc., to achieve the effect of improving security and transmission efficiency, avoiding leakage risks, and improving security performance

Active Publication Date: 2013-11-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of technology, there are various methods of outreach and complicated mechanisms, relying on a single technical means cannot meet the monitoring requirements, and various technical measures need to be taken for comprehensive protection
[0007] Although the above two architectures prevent intranet and outreach behaviors to a certain extent, there are still certain defects.
For example, for a dual-machine architecture system, if the network environment of the unit is complex, there are multiple network segments, and there are isolation restrictions between each network segment, multiple host detection agents are required to increase the complexity of the system; for the C / S mode architecture, The anti-outreach server is installed in the internal network, and cannot detect illegal outreach behaviors that are disconnected from the internal network
[0008] To sum up, most of the domestic and foreign products and technologies for illegal outreach focus on a certain function, lack of comprehensive, systematic and standardized solutions and technical solutions, and cannot provide comprehensive and effective technical support for modern confidentiality work. There are more or less the following problems:
[0011] (3) There is no unified alarm information format, and it is impossible to implement centralized monitoring of intranet computer violations and outreach;
[0012] (4) It can only detect and cannot realize the blocking function;
[0013] (5) It must be detected online, once it is disconnected from the intranet, it can be disconnected from the monitoring;
[0014] (6) The illegal outreach monitoring function is single, and it is impossible to comprehensively monitor all illegal outreach activities;
[0015] (7) The security protection of the software itself is weak, and the anti-shielding and anti-unloading capabilities are poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm and blocking method for illegal external connections
  • Alarm and blocking method for illegal external connections
  • Alarm and blocking method for illegal external connections

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0059] In an embodiment of the present invention, a method for violating outreach real-time alarm and blocking, the steps are:

[0060] The intranet host client monitors the intranet computer networking in real time;

[0061] Intranet host client monitors in real time the networking behaviors of intranet computers dial-up Internet access through ordinary telephone lines, ISDN Integrated Services Digital Network (Integrated Services Digital Network), ADSL, etc., and through wireless Internet access;

[0062] In an embodiment of the present invention, the intranet host client uses the libnet function library to actively send an alarm data packet to the external network alarm monitoring terminal to detect whether an external connection behavior has occurred. If the external network alarm monitoring terminal receives the external network data packet, it means t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an alarm and blocking method for illegal external connections. The alarm and blocking method comprises that 1), an intranet host client monitors networking behaviors of intranet computers in real time according to a plurality of external connection modes; 2), the intranet host client initiatively sends an encrypted alarm data packet to an external connection alarm monitoring terminal by using a Libnet function library to detect whether the intranet computers have external connection behaviors and gives an alarm for illegal external connection behaviors; 3), the intranet host client performs bottom layer packet capture on alarmed intranet hosts to obtain all data packets passing through network cards of the hosts to judge the illegal external connection behaviors; 4), blocking the network cards of the hosts having the illegal external connection behaviors through judgment. The alarm and blocking method is high in timeliness and good in monitoring performance in the aspect of illegal external connection monitoring. By means of the alarm and blocking method, the safety and the transmission efficiency of the alarm data packets in systems are improved, leaking risks caused by stealing of alarm information are effectively avoided, meanwhile, the safety of software is improved, and the software has anti-shielding and anti-unloading capacities.

Description

technical field [0001] The invention relates to a monitoring method for illegal outreach, in particular to an alarm and blocking method for illegal outreach, which belongs to the technical field of information security. Background technique [0002] In recent years, with the development of informatization, many units have attached great importance to illegal outreach. Many units have established their own illegal outreach monitoring systems, which can monitor intranet computers through modems, ADSL dial-up equipment, wireless network cards and other network equipment. Unauthorized and illegal outreach activities, thereby preventing the leakage of important internal information of the unit, and achieved a certain protective effect. [0003] There are currently two main monitoring mechanisms for outreach violations, one adopts a dual-machine architecture, and the other adopts a C / S (client / server) architecture: [0004] The dual-machine architecture consists of a monitoring c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 张珠君冯维淼张萌黄伟庆刘浩
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products