Invasion detection method, device and system
An intrusion detection system and intrusion detection technology, applied in the field of data processing, can solve problems such as poor timeliness of monitoring client
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] According to the embodiment of the present invention, a method embodiment of an intrusion detection method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, And, although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
[0042] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of an intrusion detection method in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include, but is...
Embodiment 2
[0138] According to the embodiment of the present invention, there is also provided an intrusion detection system for implementing the above-mentioned intrusion detection method, such as Figure 5 As shown, the system includes:
[0139] The front-end client 50 is used to send interactive behaviors; the intermediate device 52, which has a communication relationship with the front-end client 50, is used to detect whether the interactive behavior is an attack behavior that attacks network applications, and when it is determined that the interactive behavior is an attack behavior that attacks network applications In this case, trigger the front-end client to monitor the local behavior.
[0140] In an optional solution, the above-mentioned intermediate device 52 may be a forwarding device such as a gateway or a switch deployed with an intrusion detection system, and an intrusion detection system deployed at the front-end application layer of the intermediate device may detect the interac...
Embodiment 3
[0166] According to the embodiment of the present invention, there is also provided an intrusion detection system for implementing the above-mentioned intrusion detection method, such as Figure 7 As shown, the system includes:
[0167] The first acquisition module 70 is used to acquire the interactive behavior of the front-end client; the detection module 72 is used to detect whether the interactive behavior is an attack behavior that attacks network applications; the monitoring module 74 is used to determine that the interactive behavior is an attack behavior that attacks network applications In the case of triggering the front-end client to monitor the local behavior.
[0168] It should be noted here that the above-mentioned first acquisition module 70, detection module 72, and monitoring module 74 correspond to steps S21 to S25 in Embodiment 1. The two modules have the same examples and application scenarios as the corresponding steps. But it is not limited to the content discl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com