Information security defense rule intelligent deployment method based on improved particle swarm optimization

A particle swarm algorithm and information security technology, applied in the field of security products, can solve problems such as lack of science and deployment of defense rules, and achieve the effect of reducing overhead, reducing load, and improving defense pertinence

Inactive Publication Date: 2014-08-06
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the settings of many security defense systems are artificial and mech...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security defense rule intelligent deployment method based on improved particle swarm optimization
  • Information security defense rule intelligent deployment method based on improved particle swarm optimization
  • Information security defense rule intelligent deployment method based on improved particle swarm optimization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Below with reference to accompanying drawing, the present invention is further described by specific embodiment:

[0055] An intelligent deployment method of information security defense rules based on an improved particle swarm optimization algorithm, the method includes an intelligent learning algorithm, a deployment strategy of security rules, and optimizes the frequency, type and potential of attacks in the system log according to the improved particle swarm optimization algorithm of parameters Attacks, using intelligent learning algorithms to deploy without affecting the normal resource overhead of the security defense system, deploying rules for the actual network environment, using the ability to defend against existing attacks and gain insight into potential attacks based on network conditions, with The access log attack analysis engine capable of autonomously analyzing attacks can identify common attacks through access logs.

[0056] The method includes: an ini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security defense rule intelligent deployment method based on an improved particle swarm optimization. The method comprises the steps of deployment strategies of the intelligent learning algorithm and security rules; according to attack frequency and type and potential attacks in parametric improved particle swarm optimization system logs, the intelligent learning algorithm is adopted for deployment on the condition that normal resource overheads of a security defense system are not influenced, rule deployment is conducted for the actual environment of the network, an access log attack analysis engine which can defend existing attacks and see through the potential attacks according to network conditions and has the independent attack analysis ability is adopted, and common attacks can be recognized through the access logs. According to the information security defense rule intelligent deployment method, on the condition that an existing security rule defense flow or principle is not influenced, intelligent deployment is conducted on the rules, and the intelligent deployment is different from manual deployment. On the basis of the existing manual deployment, defense pertinence of security products is improved, and server overheads are reduced to a greater degree.

Description

technical field [0001] The present invention relates to many security products currently on the market that need to configure defense rules. For example, firewalls and SS series security products of Inspur Group, the configuration of security rules needs to be set according to the needs of customers. Firewall is one of the most basic, economical and effective measures to realize network security. The firewall can strictly control all access (allow, prohibit, alarm). But it is static, while network security is dynamic and holistic. There are countless attack methods of hackers. Firewalls are not omnipotent, and it is impossible to completely prevent these intentional or unintentional attacks. There are hidden dangers here, and intelligent rule deployment can play a comprehensive defense and early warning function. technical background [0002] The traditional deployment of security rules is to add all or some rules to the system artificially according to the needs. Since t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 路廷文
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products