Network data security detection method and security detection server

A technology for security detection and network data, applied in the field of Internet security, to achieve rapid and effective identification, improve efficiency, and ensure network security

Active Publication Date: 2017-09-15
三六零数字安全科技集团有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the current "cloud scanning and killing technology" can only scan and process the downloaded files, and for those virus or Trojan files that need to consume a lot of network resources to download, it is possible to find and delete them only after the download command is executed.
But for the content that is being transmitted in the network, it is powerless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data security detection method and security detection server
  • Network data security detection method and security detection server
  • Network data security detection method and security detection server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages ​​can be used to implement the content of the present invention described herein, and the above description of specific languages ​​is for disclosing the best mode of the present invention.

[0040] figure 1 It is a schematic diagram of a network data security detection server 100 according to an embodiment of the present invention. As shown in the figure, the network data security detection server 100 generally includes: a data packet capture interface 110, a packet assembly device 120, and a protocol identification device 130...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network data safety detection method and a safety detection server. Among them, the security detection method of network data includes: grabbing the data packets transmitted in the network; grouping the data packets to restore the transmission control protocol TCP connection data, identifying the application layer protocol used by the TCP connection data; The security scanning module performs security scanning on TCP connection data. Utilize the technical scheme of the present invention, after grabbing data packets and grouping them, perform data security monitoring according to the application layer protocol corresponding to the data packets, and perform protocol analysis on the basis of the reorganized application layer protocol data, which is highly targeted and can Identify network attacks quickly and efficiently, improving network security.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a network data security detection method and a security detection server. Background technique [0002] Malicious program is an umbrella term for any software program intentionally created to perform unauthorized and often harmful acts. Computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.), Trojan horses, crimeware, spyware and adware, etc., These are examples of what could be called malicious programs. [0003] Traditional anti-malware programs mainly rely on signature database matching or behavior analysis. The identification method of signature database matching is as follows: the antivirus engine reads the local file and matches all the signature code "keywords" in the signature database. If the file program code is found to be hit, it can be determined that th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 张聪唐海邱鹏
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products