A computer information security defense system

An information security and defense system technology, applied in the field of network computer security, can solve problems such as firewalls are not omnipotent, and achieve the effect of improving the pertinence of defense

Active Publication Date: 2018-09-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it is static, while network security is dynamic and holistic, hackers have countless attack methods, firewalls are not omnipotent, and it is impossible to completely prevent these intentional or unintentional attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] A computer information security defense system of the present invention includes an initialization module, an intelligent acquisition module, a log analysis module connected between the initialization module and the intelligent acquisition module, a server analysis module, a client analysis module, an online analysis module, and a high-speed retrieval module, Attack analysis engine module.

[0012] Among them, the initialization module determines the category of the server according to the system parameters, determines the general category and access frequency of the customer according to the access log, and determines the corresponding parameters according to the attack in the event log, the access content and method in the access log, and the currently configured rule function , according to the grouped data, the data in the corresponding group is initialized to N particles respectively, and the optimal position and initial velocity in the group are set, and the overal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security defense system, which includes an initialization module, an intelligent acquisition module, a log analysis module connected between the initialization module and the intelligent acquisition module, a server analysis module, a customer analysis module, an online analysis module, and a high-speed Retrieval module, attack analysis engine module. According to the present invention, various factors such as the current network environment, the service type provided by the server, the type of access objects, the attacks suffered, and the access time period are used as initial values, and the best rule deployment scheme is determined through a period of learning, and can be based on The common attacks and potential threats of the entire network are dynamically deployed, and the templates of security defense rules are set through the learning and dynamic observation of various factors to ensure network security, which improves the defense pertinence of network security.

Description

technical field [0001] The invention belongs to the technical field of network computer security, and relates to a computer information security defense system. Background technique [0002] The traditional deployment of security rules is to add all or some rules to the system artificially according to the needs. Since the network environment targeted by security products is not unique, many security rules are not necessary for specific network environments, but which rules are Necessary, this requires diagnostics and intelligent learning. It is unscientific to configure security rules blindly. Configuring too many redundant rules will have a great impact on the resource waste of security products and the speed of the entire network. If inaccurate rules are configured, that is, the rules that should be configured for the environment are not matched, it will affect the defense effect of the security product, thus releasing loopholes to the protected server. The configurati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 路廷文
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products