Security detection method and security detection server for network data

A technology for security detection and network data, applied in the field of Internet security, to achieve the effect of rapid and effective identification, strong pertinence, and improvement of network security

Active Publication Date: 2014-03-12
三六零数字安全科技集团有限公司
View PDF3 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the current "cloud scanning and killing technology" can only scan and process the downloaded files, and for those virus or Trojan files that need to consume a lot of netw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and security detection server for network data
  • Security detection method and security detection server for network data
  • Security detection method and security detection server for network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages ​​can be used to implement the content of the present invention described herein, and the above description of specific languages ​​is for disclosing the best mode of the present invention.

[0040] figure 1 It is a schematic diagram of a network data security detection server 100 according to an embodiment of the present invention. As shown in the figure, the network data security detection server 100 generally includes: a data packet capture interface 110, a packet assembly device 120, and a protocol identification device 130...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security detection method and a security detection server for network data. The security detection method for network data comprises the steps: capturing data packets transmitted in a network; performing packet composing on the data packets so as to restore TCP (Transmission Control Protocol) connection data; recognising an application layer protocol used by the TCP connection data; performing security scanning on the TCP connection data by a security scanning module corresponding to the application layer protocol. According to the technical scheme, after the data packets are captured and subjected to packet composing, security monitoring is performed on the data according to the application layer protocol corresponding to the data packets; protocol analysis is carried out based on the repacked data of the application layer protocol; the pertinence is strong, network attack can be fast and effectively recognised, and the network security is improved.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a network data security detection method and a security detection server. Background technique [0002] Malicious program is an umbrella term for any software program intentionally created to perform unauthorized and often harmful acts. Computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.), Trojan horses, crimeware, spyware and adware, etc., These are examples of what could be called malicious programs. [0003] Traditional anti-malware programs mainly rely on signature database matching or behavior analysis. The identification method of signature database matching is as follows: the antivirus engine reads the local file and matches all the signature code "keywords" in the signature database. If the file program code is found to be hit, it can be determined that th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 张聪唐海邱鹏
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products