Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invasion detection method, device and system

An intrusion detection system and intrusion detection technology, applied in the field of data processing, can solve problems such as poor timeliness of monitoring client

Inactive Publication Date: 2017-11-07
ALIBABA GRP HLDG LTD
View PDF8 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a method, device and system for intrusion detection, to at least solve the problem of time-limited behavior of the monitoring client by adopting back-end detection or log data analysis and other analytical means for intrusion detection at the back-end in the prior art Poor technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion detection method, device and system
  • Invasion detection method, device and system
  • Invasion detection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] According to the embodiment of the present invention, a method embodiment of an intrusion detection method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, And, although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.

[0042] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of an intrusion detection method in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include, but is...

Embodiment 2

[0138] According to the embodiment of the present invention, there is also provided an intrusion detection system for implementing the above-mentioned intrusion detection method, such as Figure 5 As shown, the system includes:

[0139] The front-end client 50 is used to send interactive behaviors; the intermediate device 52, which has a communication relationship with the front-end client 50, is used to detect whether the interactive behavior is an attack behavior that attacks network applications, and when it is determined that the interactive behavior is an attack behavior that attacks network applications In this case, trigger the front-end client to monitor the local behavior.

[0140] In an optional solution, the above-mentioned intermediate device 52 may be a forwarding device such as a gateway or a switch deployed with an intrusion detection system, and an intrusion detection system deployed at the front-end application layer of the intermediate device may detect the interac...

Embodiment 3

[0166] According to the embodiment of the present invention, there is also provided an intrusion detection system for implementing the above-mentioned intrusion detection method, such as Figure 7 As shown, the system includes:

[0167] The first acquisition module 70 is used to acquire the interactive behavior of the front-end client; the detection module 72 is used to detect whether the interactive behavior is an attack behavior that attacks network applications; the monitoring module 74 is used to determine that the interactive behavior is an attack behavior that attacks network applications In the case of triggering the front-end client to monitor the local behavior.

[0168] It should be noted here that the above-mentioned first acquisition module 70, detection module 72, and monitoring module 74 correspond to steps S21 to S25 in Embodiment 1. The two modules have the same examples and application scenarios as the corresponding steps. But it is not limited to the content discl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an invasion detection method, an invasion detection device and an image transmission system. The method comprises the steps of acquiring an interactive behavior of a front-end client; detecting whether the interactive behavior is an attack behavior attacking a network application; and triggering the front-end client to monitor a local behavior in case of determining that the interactive behavior is the attack behavior attacking the network application. According to the method, the device and the system provided by the invention, the technical problem that in the prior art, the monitoring client is poor in behavior timeliness due to the fact that analysis means such as rear-end detection or log data analysis for detecting invasion at rear-end are used is solved.

Description

Technical field [0001] The present invention relates to the field of data processing, in particular to a method, device and system for intrusion detection. Background technique [0002] Due to the continuous development of Web2.0 technology and the continuous evolution of cloud computing service capabilities, more and more applications and services are presented to customers in the form of B / S (Browser / Server, browser / server model). The hacker's intrusion attack methods are increasingly biased towards attacking with the Web as a breach of intrusion. Traditional intrusion detection systems are more inclined to detect their own applications and match security strategies to achieve their goals. [0003] Currently, the methods of intrusion analysis commonly used in the industry are based on back-end detection, or data-driven analysis of the intrusion trajectory. It is necessary to extract and analyze possible potential intrusion features from a large amount of log data, which belongs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 李可弈
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products