Network safety protection system, network safety protection method and storage medium

A technology of network security and protection system, applied in the field of network security protection method and storage medium, network security protection system, can solve problems such as system crash, unable to quickly put forward opinions, inconvenient suspension of business system recovery, etc., to promote self-improvement and Effects of repairing and enhancing security

Inactive Publication Date: 2017-12-19
北京云衢科技有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the business platform will conduct a network attack test before going online, this test cannot truly simulate the various attacks received in the actual operating environment, and if the existence of such an attack is realized during operation, it may also be caused by the attack. Too much load causes the system to crash. In addition, it is not convenient to suspend the business system for recovery
In addition, for network attacks, the existing technology is mainly to temporarily close the service port and reject the attack. For better upgrades and updates, a third-party analysis is required, and opinions cannot be quickly provided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety protection system, network safety protection method and storage medium
  • Network safety protection system, network safety protection method and storage medium
  • Network safety protection system, network safety protection method and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention is described below based on examples, but the present invention is not limited to these examples.

[0032] These processes, processes, logic blocks, functions, etc. are generally considered to be a self-consistent sequence of steps or instructions to achieve an ideal or expected result. The steps generally involve physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, optical, or quantum signals capable of being stored, transferred, combined, compared, and otherwise manipulated by a computer or data processing system. It turns out that it is sometimes convenient, for reasons of sharing, to refer to these signals as bits, waves, waveforms, streams, values, elements, symbols, letters, terms, numbers, and similar names, and to refer to them in computer programs or software as It is code (which may be object code, source code or binary code).

[0033] In order to obtain ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network safety protection system, a network safety protection method and a storage medium. The system comprises a safety bridge and safety cloud. The safety bridge is arranged on the front end of a first service system, and used for monitoring access requests of the first service system and guiding the access request with the invasion risk to the safety cloud. The safety cloud is equipped with a second service system and used for corresponding access requests and for recording and analyzing all kinds of access behaviors. The first service system can be actual production system, the second service system can be a simulation service system and the first service system and the second service system are basically the same. According to the invention, network attacking pressure of the first service system can be reduced; safety of the system is improved; safety performance of the first service system can be truly evaluated; network attacks can be analyzed; upgrading suggestions can be automatically provided; and self-improvement of the first service system is prompted.

Description

technical field [0001] The present invention relates to network security, in particular, to a network security protection system, a network security protection method and a storage medium, capable of attracting and reducing network attacks against business systems, and providing upgrade suggestions for business systems. Background technique [0002] With the development of "Internet +", more and more businesses are transferred from offline to online, and business systems also carry more access requirements. At the same time, network security has also become a very important issue. Various network attacks will target various loopholes in the business platform itself, conduct network attacks on the Internet business platform, or conduct network stealing, all of which will affect the normal operation of the business. Moreover, the methods and means of network attacks will evolve with the development of time and different methods and means. So far, there are no suitable method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433
Inventor 谢鹏
Owner 北京云衢科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products