Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protection method, device and storage medium

A network security and protection device technology, applied in the field of network security, can solve the problems of general malicious attack behavior detection and protection effects, inability to specific attack defense, difficulty in adapting to network attack situation, etc., and achieve the effect of reducing the risk of being attacked

Active Publication Date: 2017-12-01
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the security protection of the host mainly depends on the terminal security protection system, such as anti-virus software. Malicious attack behavior detection and protection effect is average
With the passage of time, it is difficult to adapt to the constantly changing network attack situation, so it is necessary to carry out technical transformation of the traditional terminal security protection system to adapt to the new network security requirements
[0003] Usually, firewalls, intrusion detection systems, and intrusion prevention systems are deployed at the network egress to discover and block malicious attacks by formulating relevant security policies. , The open services are different, resulting in a general security strategy that cannot effectively defend against specific attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method, device and storage medium
  • Network security protection method, device and storage medium
  • Network security protection method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiments of the present invention provide a network security protection method, device, and storage medium, which can effectively block multiple attacks and reduce the risk of attacks on business systems, which are described in detail below.

[0041] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work shall fall within the protection scope of the present invention.

[0042] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network security protection method, a device and storage medium. Various attacks can be effectively intercepted, and the risk that a business system is attacked is relieved. The method disclosed by the embodiment of the invention comprises the following steps: detecting network traffic entering a host, and determining whether an attack behavior is existent by querying an attack behavior feature base; if the attack behavior is existent, generating a virtual honeypot with a corresponding loophole according to the attack behavior, and importing the network traffic into the virtual honeypot; analyzing the network traffic in the virtual honeypot to acquire the attack feature of the novel attack behavior; writing the novel attack behavior containing the attack feature in the attack behavior feature base; if the network traffic is unreceived within the preset time, destroying the virtual honeypot.

Description

Technical field [0001] The present invention relates to network security technology, in particular to a network security protection method, device and storage medium. Background technique [0002] With the development and popularization of computer networks, various illegal network attacks such as hackers and worms on the network are becoming more and more rampant. In order to protect computer networks and systems, various security protection systems have emerged. At present, the security protection of the host mainly depends on the terminal security protection system, such as anti-virus software, etc. However, although the traditional terminal security protection system has a certain effect on the detection and removal of malicious code, it is aimed at password guessing and exploiting. The detection and protection of malicious attack behaviors are not effective. As time goes by, it is difficult to adapt to the constantly changing network attack situation. Therefore, it is neces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1466
Inventor 万巍龙春申罕骥高鹏赵静付豫豪杨帆
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products