Network security protection method and network security protection system

A network security and protection system technology, applied in the field of network security protection methods and network security protection systems, can solve problems such as indistinguishable, unclear context and semantics, and inability to determine attacks, and achieve the effect of business system security

Inactive Publication Date: 2016-12-07
SANGFOR TECH INC
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing security solutions simply look at the content of the data flow statically, but do not know the context and semantics, and cannot distinguish between normal business and malicious behavior of attackers
[0007] (3) Existing security solutions are based on con

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and network security protection system
  • Network security protection method and network security protection system
  • Network security protection method and network security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The invention provides a network security protection method and a network security protection system, which are used for improving the protection of unknown attack modes and judging malicious attacks, so as to make the business system more secure.

[0050] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0051] The present invention constructs a schematic diagram of a network secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security protection method and a network security protection system and is used for improving protection of an unknown attack mode and judgment of a malicious attack, and enabling a service system to be more secure. The method provided by the embodiment of the invention comprises the steps that a security agent receives a request data stream; the security agent sends the request data stream to a shadow system; a monitor monitors performance of the request data stream carried out by the shadow system, thereby obtaining a monitoring result, and sends the monitoring request to the security agent; the security agent judges whether the monitoring result satisfies a security standard or not; and the security agent forwards the request data stream to the service system if the monitoring result satisfies the security standard.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a network security protection method and a network security protection system. Background technique [0002] The rapid development of Internet technology has brought revolutionary changes to traditional business. Many enterprises have migrated their business to the Internet, which greatly facilitates people's life, but it also brings many security problems. Attackers seek related benefits by exploiting system vulnerabilities and business vulnerabilities. [0003] Existing security solutions center on attack methods and vulnerabilities. Through the analysis of existing attack methods and vulnerabilities, extract character strings and regular expressions as static features described by rules, and find and clear them based on static feature matching. known threats. [0004] However, existing security solutions have the following problems: [0005] (1) The development of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1433
Inventor 李凯赵振洋
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products