Safe protection system and method

A security protection and subsystem technology, applied in transmission systems, electrical components, etc., can solve the problems of insufficient controllability, inflexible deployment, poor scalability, etc., to reduce packet copying, flexible deployment, and easy operation and maintenance. management effect

Inactive Publication Date: 2018-02-09
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to solve the problems of poor scalability, inflexible deployment, poor performance and insufficient controllability in the security protection system in the prior art, the present invention provides a security protection system and method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe protection system and method
  • Safe protection system and method
  • Safe protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0054] figure 1 It is a schematic diagram of the overall structure of a safety protection system according to an embodiment of the present invention, such as figure 1 As shown, the embodiment of the present invention provides a security protection system, which is characterized in that it includes a controller subsystem 1, an intrusion detection subsystem 2 and a firewall subsystem 3, wherein:

[0055] The controller subsystem 1 is configured to update the rules of the intrusion detection subsystem and the rules of the firewall subsystem according to the illegal data in the detection results reported by the intrusion detection subsystem 2, and update the rules of the intr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe protection system and a method. The system comprises an invasion detection subsystem, a firewall subsystem and a controller subsystem. The controller subsystem is used for updating an invasion detection subsystem rule and a firewall subsystem rule, and issuing the updated invasion detection subsystem rule and the updated firewall subsystem rule to the invasion detection subsystem and the firewall subsystem respectively. The invasion detection subsystem is used for acquiring and detecting any one data packet based on DPDK and reporting illegal data in a detection result to the controller subsystem. The firewall subsystem is used for carrying out filtering processing on any one data packet based on the DPDK. By using the safe protection system and the method, deployment is flexible and expandability is good, and the system and the method can well adapt to virtualization and a cloud computing platform; characteristics of message copy reduction, nucleophilicity and the like are possessed, and the system and the method can adapt to a high throughput network environment; and a control interface is opened for an upper layer, good controllability is possessed,and operation and management are convenient to perform.

Description

technical field [0001] The present invention relates to the field of computer technology, and more specifically, to a safety protection system and method. Background technique [0002] The security protection system includes two major functional systems, an intrusion detection system (Intrusion Detection System, IDS) and a firewall system. [0003] Traditional intrusion detection systems are usually composed of hardware, manufactured and developed by professional equipment manufacturers, and need to rely on a variety of equipment and software to operate together. IDS products can basically be divided into two categories according to the source of their input data: host-based intrusion detection system (HIDS) and network-based network intrusion detection system (NIDS). [0004] In addition to hardware intrusion detection systems, there are also many intrusion detection software. Common intrusion detection software includes Snort, Suricata, and Pfsense. [0005] Among them,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0227H04L63/1416
Inventor 杨慧然刘超玲张棪于光喜韩言妮崔华俊安伟
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products