Network intrusion detection and active defense linkage control device

A technology of active defense and network intrusion, applied in the field of network security, it can solve the problems of ambiguous alarm meaning, inability to achieve linkage defense, and high false alarm rate.

Active Publication Date: 2017-01-11
CHENGDU UNIV OF INFORMATION TECH
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a network intrusion detection and active defense linkage control device, which aims to solve the traditional intrusion detection has its own inherent defects in the face of ever-changing network attacks, the meaning of the alarm is vague, and th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection and active defense linkage control device
  • Network intrusion detection and active defense linkage control device
  • Network intrusion detection and active defense linkage control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] The present invention combines the traditional network anomaly detection PHAD (packet headeranomaly detection) model method, and at the same time adds appropriate network traffic feature vectors, through limited detection and analysis of the key fields of the data packet content, and strives to accurately determine whether there is an attack behavior Network traffic characteristics, on this basis, through the dynamic intervention of the forwarding rule table of the data packet forwarding module (mainly refers to the modification of the effective time and effective time of the rules), the blocking of abnormal data traf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection and active defense linkage control device, comprising a packet forwarding module, a packet mirroring traffic preprocessing module, a linkage control device module, a network behavior detection and analysis module and a traffic database cluster system.The invention combines the traditional network anomaly detection PHAD model method, combines the limited depth detection and analysis to the critical segment of the packet and tries to accurately determine whether the network traffic has the characteristic with attack behavior. On this basis, implement the dynamic intervention through the forwarding rules table of the packet forwarding module to achieve the abnormal data traffic block.The main characteristic of the device is to analyze the attack behavior and reverse control the forwarding behavior. When the abnormal network attack is detected, the data flow can be effectively cut off in real time so as to achieve the active detection attack and the active defense.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network intrusion detection and active defense linkage control device. Background technique [0002] Traditional intrusion detection techniques are divided into two types: misused-based techniques and anomaly-based techniques. The former detects by describing the special pattern of each attack, which is the main technique used in intrusion detection commercial products at present. It relies on artificial preset alarm rules to achieve, so it has its own advantages in the face of ever-changing network attacks. inherent flaws. The behavior of network attacks is changing, and the methods and methods are constantly changing. Traditional intrusion detection technologies almost fix the detection methods in the program, and it is difficult to cope with real-time changing intrusion methods (although some products currently provide upgrade strategies, but The imple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 何林波
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products