Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APT firewall

A firewall and abnormal traffic technology, applied in the field of information security, can solve the problem that there is no suitable solution for APT attack

Inactive Publication Date: 2017-07-28
深圳耀东安全科技有限公司
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Traditional firewalls can do nothing about this, and there is no suitable solution to APT attacks. Therefore, a firewall system for APT attacks is very necessary

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APT firewall
  • APT firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] figure 1 A structural diagram of the APT firewall system provided by the embodiment of the present invention is shown.

[0026] In one of the examples, for a home network or a small office network with only routers, the present invention can only be deployed in workstations, such as PCs and mobile terminals, because routers in such networks only have routing functions and packet filtering functions. Under such network conditions, the host program monitoring module is in the same system as other modules, the host program monitoring module exists as a resident program, and other modules exist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and specifically, the invention relates to an APT firewall system. An extranet interface module 101, an abnormal flow detection module 102, an intranet interface module 103, an abnormal association module 104, a retrospective evaluation module 105 and a host program monitoring module 106 are integrated in the system for detecting the flow of an extranet and an intranet in real time, monitoring the program process in real time and further decomposing and identifying abnormal flow and abnormal behaviors containing APT threats so as to locate the APT threat level, intercept the APT communication, clear the APT Trojan program and eliminate the threat attacks and the potential safety hazards.

Description

technical field [0001] The patent of the present invention relates to the field of information security, in particular, the present invention relates to an APT firewall system. Background technique [0002] APT is the abbreviation of Advanced Persistent Threat in English, that is, advanced persistent threat. [0003] An APT attack is a persistent attack launched against a specific target using various attack methods. The purpose of APT attack is very clear. APT is a network attack and intrusion behavior launched by hackers for the purpose of stealing core data. It is a long-planned "malicious espionage threat". This kind of behavior is often operated and planned for a long time, and has a high degree of concealment. APT's attack method is to hide itself and steal data in a long-term, planned and organized manner for specific objects. [0004] The general process of an APT attack is as follows: First, the attacker collects user-related information through various means, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/0209H04L63/1425
Inventor 陈德元高振铁
Owner 深圳耀东安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products