Computer information security defense system

An information security and defense system technology, applied in the field of network computer security, can solve problems such as firewalls are not omnipotent, and achieve the effect of improving the pertinence of defense

Active Publication Date: 2014-07-09
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it is static, while network security is dynamic and holistic, hackers have countless attack methods, firewalls are not omnipotent, and it is impossible to completely prevent these intentional or unintentional attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0013] Such as figure 1 As shown, a computer information security defense system of the present invention includes an initialization module, an intelligent acquisition module, a log analysis module connected between the initialization module and the intelligent acquisition module, a server analysis module, a customer analysis module, an online analysis module, and a high-speed Retrieval module, attack analysis engine module.

[0014] Among them, the initialization module determines the server category according to the system parameters, determines the customer's general category and access freq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security defense system. The computer information security defense system comprises an initialization module, an intelligent acquisition module, a log analysis module, a server analysis module, a client analysis module, an on-line analysis module, a high-speed retrieval module and an attack analysis engine module, wherein the log analysis module, the server analysis module, the client analysis module and the on-line analysis module are connected between the initialization module and the intelligent acquisition module. According to the computer information security defense system, the optimal rule deployment scheme is determined through a period of study with the various factors such as the network environment, the type of services provided by a server, the type of access objects, attacks which the server suffers from and the access time period as initial values, dynamic rule deployment can be carried out according to common attacks and potential threats of a whole network, a security defense rule template is set through study and dynamic observation on the various factors for guaranteeing network security, and network security defense pertinence is improved.

Description

Technical field [0001] The invention belongs to the technical field of network computer security, and relates to a computer information security defense system. Background technique [0002] The traditional deployment of security rules is to add all rules or some of the rules to the system as needed. Because the network environment targeted by security products is not unique, many security rules are not necessary for a specific network environment, but which ones are Necessary, this requires diagnosis and intelligent learning. It is unscientific to configure security rules blindly. Too many redundant rules are configured, which has a great impact on the waste of resources of security products and the speed of the entire network. The inaccurate rules are configured, that is, the rules that should be configured for the environment are not matched, which will affect the defense effect of the security product, thereby releasing the loopholes for the protected server. The configura...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 路廷文
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products