Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion prevention method, device and system and computer readable storage medium

A network intrusion and defense system technology, applied in the Internet field, can solve problems such as bandwidth consumption and productivity, infiltration, and snatching of network bandwidth

Pending Publication Date: 2018-04-03
深圳市利谱信息技术有限公司
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many businesses fail to distinguish between applications used on the network that have a legitimate business purpose and those that are not critical (those that consume bandwidth or pose danger)
Malware and cyber attackers target the venue, exposing businesses to risks such as data breaches, potential infiltrations, and more
In addition to presenting security risks, these applications also consume bandwidth and productivity, and compete with business-critical applications for network bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion prevention method, device and system and computer readable storage medium
  • Network intrusion prevention method, device and system and computer readable storage medium
  • Network intrusion prevention method, device and system and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily realize them. Also, for clarity, parts not related to describing the exemplary embodiments are omitted in the drawings.

[0051] In the present disclosure, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts or combinations thereof disclosed in the specification, and are not intended to exclude one or a plurality of other features, numbers, steps, acts, parts, parts or combinations thereof exist or are added.

[0052] In addition, it should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a network intrusion prevention method, device and system and a computer readable storage medium. The method includes: receiving a data packet, and subjecting the received data packet to protocol analysis; performing fire wall policy matching on the data packet subjected to protocol analysis, and processing the data packet by a matched fire wall policy; recognizing an application corresponding to the data packet, and processing the data packet according to an application access control policy corresponding to the recognized application; subjecting the data packet to content analysis, adopting a content obtained by analysis to obtain a content safety protection policy by matching, and processing the data packet by the content safety protection policy.After protocol analysis of the data packet, protocol and port detection is performed according to the fire wall policy, then application layer information is deeply read on the basis of application feature code recognition, and an application type is determined by comparison of analyzed application information with a background feature library.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular to a network intrusion prevention method, device, system and computer-readable storage medium. Background technique [0002] With the rapid development of the Internet and the explosion of various applications, enterprises are faced with risks brought by vulnerabilities in commonly used applications. [0003] Network communication is no longer solely dependent on store-and-forward applications such as e-mail, as it once was, but has expanded to include real-time collaboration tools, Web 2.0 applications, instant messaging (IM) and P2P applications, voice over IP telephony (VoIP), streaming media and conference calling, all of which pose potential risks. Many enterprises fail to distinguish between applications used on the network that have a legitimate business purpose and those that are not critical (those that consume bandwidth or pose danger). Malware and cybe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1425H04L63/1433
Inventor 杨文超耿忠尧杨志聪欧中五
Owner 深圳市利谱信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products