Check patentability & draft patents in minutes with Patsnap Eureka AI!

Core design method and system based on real-time network security monitoring

A network security and real-time monitoring technology, applied in the transmission system, electrical components, etc., can solve the problem that ordinary firewalls are difficult to resist attacks, and achieve the effect of avoiding damage and improving security performance

Inactive Publication Date: 2017-11-17
深圳市卓讯信息技术有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, it is difficult for most kernels to detect network security in real time during the design process. Therefore, it is easy to encounter similar SYN / ACK FLOOD supply. The ordinary firewall equipped with the kernel is difficult to resist such attacks, and most attacks are difficult to be blocked. Hazards such as causing the kernel to suffer major trauma and crash before attacking the target

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Core design method and system based on real-time network security monitoring
  • Core design method and system based on real-time network security monitoring
  • Core design method and system based on real-time network security monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to fully understand the technical content of the present invention, the technical solutions of the present invention will be further introduced and illustrated below in conjunction with specific examples, but not limited thereto.

[0059] Such as Figure 1-8 In the specific embodiment shown, the kernel design method based on real-time monitoring of network security provided by this embodiment can be used in the process of secure kernel management design to implement interception for special characters, prevent attacks before the attack, and avoid The kernel is damaged, and the security performance of the kernel is improved.

[0060] Such as figure 1 As shown, the present embodiment provides a kernel design method based on real-time monitoring network security, the method comprising:

[0061] S1. Setting and caching security risk characters and request time intervals;

[0062] S2. When accessing, obtain and process potential safety hazard characters;

[0063...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a core design method and a core design system based on real-time network security monitoring. The method comprises the steps of setting and caching a security hazard character and a request time interval; acquiring and processing the security hazard character when in accessing; acquiring an access request IP; judging whether the access request is a hostile attack; and if yes, performing a limited access; and if not, responding to the access request. According to the method and the system provided by the invention, the transmitted special character is filtered, intercepted, transferred or replaced by setting the security hazard character and the request time interval, the time interval for sending the request is compared with the preset request time interval, limited access treatment is performed on the access not accordant with requirements, so that the special character is intercepted, the attack is prevented before attack, the core is prevented from being damaged, and security performance of the core is improved.

Description

technical field [0001] The invention relates to a kernel design method, more specifically a kernel design method and system based on real-time monitoring of network security. Background technique [0002] The kernel is the most basic part of the operating system. It is responsible for managing the system's processes, memory, device drivers, files and network systems, and determines the performance and stability of the system. Generally, the kernel design process involves the security of the network information system. The security technology system of the network information system is usually reasonably configured and deployed under the guidance of security policies: network isolation and access control, intrusion detection and response, vulnerability scanning, Anti-virus, data encryption, identity authentication, security monitoring and auditing and other technical equipment, and between various equipment or systems, system functions can be complemented and coordinated. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1416H04L63/1466
Inventor 邹纪根赖旭军易典陈建军李建明
Owner 深圳市卓讯信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More