Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security method

A technology for network security and network security analysis, applied in the direction of security devices, network topology, electrical components, etc., to achieve the effect of improving performance

Inactive Publication Date: 2017-02-22
武汉腾烽信息技术有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional antivirus software can only be used to prevent computer viruses, firewalls can only filter illegal access communications, and intrusion detection systems can only be used to identify specific malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with specific examples.

[0014] Mobile terminal computers and wireless access points connected to the Internet constitute the basic WLAN environment. Firewall, antivirus wall and intrusion detection and prevention system constitute WLAN protection system. The integrated network safety management system adopts the method proposed by the invention to analyze the safety event information provided by the firewall, the antivirus wall and the intrusion detection and defense system.

[0015] The complete workflow of the cybersecurity approach is as follows:

[0016] Step 1: The firewall, antivirus wall and intrusion detection and defense system analyze the data packets transmitted by the mobile terminal computer through the wireless access point, and generate corresponding security event data;

[0017] Step 2: The integrated network security management system reads out the above security event data;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The purpose of the invention is to provide a network security method in order to respond to WLAN security alerts at computer speed, shorten the existence time of loopholes, reduce the burden of management and enable users to get a unified WLAN defense function. Based on information provided by a firewall, an intrusion detection / prevention system and an anti-virus system, WLAN network data and terminal behaviors are comprehensively analyzed using a neural network learning algorithm-a Chebyshev rule, so that users can discover, weaken and stop security threats in a timely manner. The performance of WLAN network security analysis and network behavior analysis can be improved, and a secure WLAN network which has the function of global automatic response and integrates multi-layer defense and system service support is realized.

Description

technical field [0001] The invention relates to a network security method. Background technique [0002] Wireless interconnection technology is gradually changing people's work and life from wired to wireless. Wireless local area network (Wireless Local Area Network, WLAN) is the application of wireless communication technology in computer networks. It adopts wireless multi-access channels to support communication between computers, and provides implementation methods for mobile communication, personal communication, and multimedia applications. . Due to its simplicity, speed and convenience, WLAN is gradually favored by people. Especially with the successive release of 802.11 protocols, the application of wireless networks has been promoted. [0003] But with the further application of wireless local area network, the subsequent security issues have gradually attracted people's attention. [0004] According to the survey report on the security aspects of enterprise WLAN...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04W84/12H04W12/088H04W12/122H04W12/126
CPCH04L63/02H04L63/1408H04L63/1433H04L63/1441H04W12/08H04W84/12
Inventor 刘彦均
Owner 武汉腾烽信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products