Network intrusion cooperative detection method based on security cloud

A network intrusion and collaborative detection technology, applied in electrical components, transmission systems, etc., can solve problems such as lack of big data storage and in-depth analysis capabilities, communication delays, communication forwarding performance bottlenecks, etc.

Active Publication Date: 2016-11-16
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the life cycle of some phishing websites is only a few hours, according to the current upgrade method, it is basically impossible to guarantee that the feature rule library will take effect within the life cycle of the phishing website
[0010] 2. There are many false positives and negative negatives, because NIDS is mainly based on the misuse detection technology, which needs to collect the behavior characteristics of abnormal network traffic or attacks in advance, and establish the relevant intrusion feature rule base. When the characteristics match, the system considers this behavior as an intrusion
However, due to the fact that the definition of feature rules is often not accurate and comprehensive enough, and there is a lack of analysis and judgment mechanism for suspected events, resulting in many false positives and missed negatives
[0011] 3. There are performance bottlenecks and single points of failure in the management node, which cannot achieve large-scale deployment
For NIDS under the centralized management mode, we often encounter such problems: due to the continuous expansion of enterprise scale, the deployment of NIDS products has developed from a single point to global deployment across regions, and the product architecture is required to support hundreds or thousands of IDS detection nodes and management nodes; secondly, it must be able to handle the alarm events generated by all detection nodes; in addition, it is also necessary to solve the establishment, configuration and upgrade of the feature rule base
However, general management nodes are deployed on a single piece of hardware. Due to the lack of hardware resources, they basically do not have the ability to store big data and analyze in depth, let alone display the overall security situation, and even have performance bottlenecks in communication forwarding. , it is difficult to meet the needs of users for large-scale deployment. At the same time, there is still a single point of failure. Once the upper management node has a hardware or software failure, it will affect the normal operation of the entire system.
[0012] 4. There are problems of slow and unstable access speed in cross-regional access
If the management node and the detection node are in different regions or in different operator networks, when the detection node accesses the management node, it will cause communication delay and instability due to cross-network and cross-region

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the specific implementation, features and characteristics of a security cloud-based network intrusion collaborative detection method proposed according to the present invention will be combined with preferred embodiments below. Its efficacy is described in detail later.

[0031] The security cloud-based network intrusion collaborative detection method of the present invention includes the following steps:

[0032] S1: NIDS initiates an authorization application to the security cloud, and the authorization subsystem of the security cloud completes authorization management.

[0033] NIDS is the top-level node of NIDS in different regions, and the top-level node is a management node or a detection node.

[0034] The role of authorization is:

[0035] a) Only authorized devices can actively access the secure cloud for dynamic registration, reducing n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion cooperative detection method based on security cloud. The network intrusion cooperative detection method comprises the following steps: S1, an NIDS initiates an authorization application to the security cloud; S2, the authorized NIDS is dynamically registered; and the dynamically registered NIDS obtains a unique identifier ID from the security cloud; S3, for antagonistic requirements of intrusion detection, the NIDS obtains a characteristic rule library from the security cloud in real time; and S4, the NIDS performs comprehensive detection by using a network security detection technology, including: the NIDS detects all generated network security threat events, and uploads the network security threat events to the security cloud according to requirements; storing, analyzing, filtering and judging of the events are carried out at the security cloud side; and then, the security cloud returns the security threat events to the NIDS in a fixed point.

Description

Technical field [0001] The invention relates to a network intrusion detection method, in particular to a network intrusion collaborative detection method based on a security cloud. Background technique [0002] The Network-based Intrusion Detection System (NIDS) is a useful supplement to the firewall. It is considered the second security gate after the firewall. NIDS bypasses the network traffic to detect network traffic without affecting network performance. Under the circumstances, real-time monitoring of internal attacks, external attacks and misoperations is provided, thereby improving the security of the network. [0003] The existing NIDS is generally composed of a detection unit and a management unit, which we call detection nodes and management nodes respectively. The working mode of NIDS can be summarized as: single-point detection and multi-level management. [0004] Single point detection: The detection node is generally a single software and hardware system. The bypass i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/145H04L63/1483H04L2463/144
Inventor 张腾李佳李志辉张帅高胜张洪刘丙双严寒冰丁丽何世平赵慧姚力朱芸茜郭晶朱天胡俊王小群陈阳何能强李挺李世淙王适文刘婧饶毓贾子骁肖崇蕙吕志泉韩志辉
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products