Intrusion detection methods, detection rule generation method, device and system

An intrusion detection and rule technology, applied in the field of network security, can solve the problem of inability to confirm the success of a specific type of file intrusion, etc.

Active Publication Date: 2017-11-14
ALIBABA GRP HLDG LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an intrusion detection method and device to solve the problem that the existing s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection methods, detection rule generation method, device and system
  • Intrusion detection methods, detection rule generation method, device and system
  • Intrusion detection methods, detection rule generation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0110] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementations disclosed below.

[0111] In this application, an intrusion detection method and device, a detection rule generation method and device, an intrusion detection system, and another intrusion detection method are respectively provided. Each will be described in detail in the following examples. Before describing the embodiments, the technical solution of the present application will be briefly explained.

[0112] In the technical solution of this application, an internal network refers to an internal private network with a specific boun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method, an intrusion detection device, a detection rule generation method, a detection rule generation device, an intrusion detection system and another intrusion detection method. The intrusion detection method comprises the steps of: acquiring a network message sent to an external network; and determining that equipment sending the network message is successfully intruded by a file of a specific type if the network message matches an arbitrary rule in a network message detection rule set successfully, wherein rules in the network message detection rule set are pre-generated according to external network address information of the specific type. By adopting the methods, an internal network can be determined to be successfully intruded by the file of the specific type, and the equipment sending the network message can be determined to be victim equipment, thereby facilitating the network security operation and maintenance staff to dispose the victim equipment quickly and effectively, simplifying the complexity of security operation and maintenance of the internal network, and providing guarantee for improving the security of the internal network.

Description

technical field [0001] The present application relates to network security technology, in particular to an intrusion detection method and device. The present application also relates to a detection rule generation method and device, an intrusion detection system, and another intrusion detection method. Background technique [0002] With the development of computer and Internet technology, internal networks with specific boundaries such as enterprise networks, campus networks, and community networks not only realize the interconnection and resource sharing of internal devices, but also access external networks through routers and other devices, for example: access Various resources or services provided by the Internet network. Due to the communication between the internal network and the external network, in order to ensure security, the internal network usually uses network security detection products. [0003] Taking the enterprise network as an example, the current secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/0236H04L63/1416H04L63/1425H04L63/1466
Inventor 姚文顶
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products