Intrusion detection system and method based on traceability information

An intrusion detection system and traceability information technology, applied in the field of computer system security, can solve the problem of low real-time intrusion detection, and achieve the effect of improving the real-time detection.

Inactive Publication Date: 2016-10-12
HUAZHONG UNIV OF SCI & TECH
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above defects or improvement needs of the prior art, the present invention provides an intrusion detection system and method based on traceability information, the purpose of which is to solve the technical problem of low real-time intrusion detection in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and method based on traceability information
  • Intrusion detection system and method based on traceability information
  • Intrusion detection system and method based on traceability information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0052] The functional schematic diagram of the intrusion detection system based on traceability information provided by the embodiment of the present invention is as follows figure 1 shown; the system includes collectors, detectors and analyzers;

[0053] The collector is used to convert the system call sequence of the system call according to the system call to generate traceability information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection system and method based on traceability information. The system includes a collector, a detector and an analyzer; the collector includes a traceability generation unit, a traceability trimming unit and a traceability storage unit, and the detector includes a rule base establishing unit , a rule matching unit and an output warning report unit, the analyzer includes a propagation query unit and a traceability query unit; the method is to collect the traceability information, store the traceability information in the form of a file on the file system, and store it in the traceability database at the same time. Based on the dependency information in the traceability database, a rule database is established based on the dependency information. During intrusion detection, the detected traceability information is compared with the traceability information in the rule base. When an intrusion is found, an early warning report is output, and the intrusion detection provided by the early warning report is used. The system and the method provided by the present invention improve the real-time performance of the intrusion detection.

Description

technical field [0001] The invention belongs to the technical field of computer system security, and more specifically relates to an intrusion detection system and method based on traceability information. Background technique [0002] At present, incidents of using computer networks to commit crimes are by no means uncommon. Facing an increasingly open network environment, data security is also under great threat. The security of information systems is generally protected by security mechanisms such as identification and authentication, access control, and encryption technologies. Firewall technologies are used to protect internal networks and external networks. However, these methods cannot completely prevent intrusions, and attackers may Use various system vulnerabilities (such as unpatched operating systems, program bugs, firewall configuration errors, simple passwords, etc.) to endanger computer systems, resulting in sensitive data being leaked or modified. Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L2463/146
Inventor 谢雨来石珍珍谭支鹏冯丹
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products