Unlock instant, AI-driven research and patent intelligence for your innovation.

A Network Border Detection Method

A detection method and network boundary technology, applied in the field of network technology security, can solve problems such as business destruction, difficulty in identifying and controlling threats, and difficulty in network connection for users, achieving the effect of simple and convenient processing and improving the ability of enterprise information security protection

Active Publication Date: 2019-03-08
BEIJING VRV SOFTWARE CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, many units have two networks, one is an Internet-enabled network for Internet access, and the other is an intranet network for office work; with the rapid development of networks and information technology, business operations are increasingly dependent on the network , users’ network and information security are increasingly facing more and more risks: worms, Trojan horses, spyware, malicious webpages, spam, compound attacks that combine multiple infiltration and destruction technologies, denial of network infrastructure Service attack (DoS / DDoS), which caused huge damage to the operation of the enterprise
At the same time, new problems are still emerging, and network security threats are gradually developing from the network layer to the application layer, from the early attacks on TCP / IP protocol vulnerabilities to the attacks on operating system and application vulnerabilities by using the content of TCP / IP data packets. Identifying and containing these threats presents new difficulties
Therefore, for the sake of safety, in principle, the office network and the network that can be connected to the Internet are not allowed to be connected, but the physical connection between the internal network and the external network may occur under the misoperation of the network administrator.
At this time, the two networks are in different network segments, and it is difficult for users to find that the two networks are connected to each other, forming an illegal boundary.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Network Border Detection Method
  • A Network Border Detection Method
  • A Network Border Detection Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Attached below figure 1 , attached figure 2 , with image 3 The present invention is further analyzed.

[0019] A network boundary detection method, such as figure 1 The shown includes: network card capture engine, data packet analysis module, ARP detection module and ICMP detection module; the data packet analysis module is provided with a data packet queue module; the ICMP detection module is provided with a TTL detection module. Intranet detection methods such as figure 2 Shown:

[0020] Step (1): Set the network range of the intranet, set the IP address range of the intranet, we consider all packets not within the set intranet range to be suspicious packets;

[0021] Step (2): Start the network card packet capture engine to capture network data packets;

[0022] Step (3): Enter the data packet analysis module, analyze the network data packets, and find out the data packets whose source IP address is not within the range of the intranet; at the same time, ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network boundary detection method. A network card package capturing engine, a data packet analysis module, an ARP detection module and an ICMP detection module are included. The data packet analysis module is equipped with a data packet queue module. The ICMP detection module is provided with TTL detection. The method has the advantages that processing is simple, convenient, rapid and accurate; network safety performance can be effectively foreseen; and an enterprise information safety protection capability is increased.

Description

technical field [0001] The invention relates to a detection method of a network boundary, which belongs to the field of network technology security. . Background technique [0002] At present, many units have two networks, one is an Internet-enabled network for Internet access, and the other is an intranet network for office work; with the rapid development of networks and information technology, business operations are increasingly dependent on the network , users’ network and information security are increasingly facing more and more risks: worms, Trojan horses, spyware, malicious webpages, spam, compound attacks that combine multiple infiltration and destruction technologies, denial of network infrastructure Service attack (DoS / DDoS) has caused huge damage to the operation of the enterprise. At the same time, new problems are still emerging, and network security threats are gradually developing from the network layer to the application layer, from the early attacks on T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/12
Inventor 杨华宋美玉吴振芳
Owner BEIJING VRV SOFTWARE CO LTD