Agent-free illegal external-connection monitoring method and system

A monitoring system and outreach technology, applied in the field of information security, can solve problems such as difficulty in monitoring illegal outreach behavior of subnets, monitoring failure, and inaccurate monitoring results.

Inactive Publication Date: 2018-02-23
BEIJING VRV SOFTWARE CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in an intranet without a proxy client, it is often difficult to detect illegal outreach behaviors in the subnet
In the past, there was an agentless outreach monitoring method using source addres

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent-free illegal external-connection monitoring method and system
  • Agent-free illegal external-connection monitoring method and system
  • Agent-free illegal external-connection monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0029] figure 1 It is an application deployment diagram of a preferred non-agent violation monitoring system of the present invention. Such as figure 1 As shown, the application model of the present invention is shown. Install and deploy the intranet monitoring server on the intranet, install and deploy the extranet monitoring server on the extranet, and embed JS code on the intranet business website.

[0030] figure 2 It is a flow chart of an agentless outreach monitoring method for violations of the present invention, such as figure 2 As shown, the method flowchart includes the following steps:

[0031] Step S201, when the intranet terminal host visits the webpage of the business website, the JS code is downloaded to the terminal host through the browser along with the webpage;

[0032] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an agent-free illegal external-connection monitoring method. The agent-free illegal external-connection monitoring method comprises the steps that: when an intranet terminal host accesses a service website page, a JS code together with the page is downloaded to the terminal host through a browser; the JS code accesses an extranet monitoring server from the terminal host; once the extranet monitoring server receives access data from the JS code, an illegal external-connection alarm is given instantly; simultaneously, the extranet IP address in the access data is returnedto the JS code; the JS code sends the extranet IP address of the terminal host together with the internet IP address to an internet monitoring server; and, once the internet monitoring server receivesthe data sent by the JS code, an illegal external-connection alarm is given instantly. The invention further provides an agent-free illegal external-connection monitoring system. The agent-free illegal external-connection monitoring system comprises an internet monitoring module, an extranet monitoring module and the JS code. By means of the method and the system provided by the invention, illegal external-connection behaviour monitoring can be realized on the terminal host without an agent client side.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a monitoring technology for illegal outreach of an intranet terminal host, in particular to an agentless monitoring method and system for illegal outreach. Background technique [0002] With the continuous development and popularization of Internet technology, various terminal devices emerge in an endless stream, and it has become an inevitable trend for future development that more and more desktop terminals and diversified private terminals are connected to the enterprise intranet. In the network environment of some enterprises or units, they are often directly connected to the network, and computers in the network are not allowed to connect to the intranet and the Internet at the same time. However, some employees privately build subnets in the intranet and connect to the Internet in the subnets, and employees violate the rules and external connections, which will bring great...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L63/0236H04L63/1408H04L63/30
Inventor 林皓宋美玉钟力毕永东冯艳何建萌
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products