Attack response method and system

A technology of coping methods and objects, applied in the field of coping, can solve the problem that there is no way to ensure the smooth application of products, and achieve the effect of preventing attacks and receiving

Active Publication Date: 2018-06-08
NANNING FUGUI PRECISION IND CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if relevant remedial measures are available on the Internet in real time, there is no way to ensure that all products will be applied smoothly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack response method and system
  • Attack response method and system
  • Attack response method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] see figure 1 , in a preferred embodiment, an attack response system includes a connection module 10 , a collection module 20 , a judging module 30 and a processing module 50 . The attack response system may be set on a HeNB (Home evolved Node B, home evolved base station), or on a central office (HeMS) connected to the HeNB.

[0022] The connection module 10 is used for connecting the HeNB to an attack database 60 . Attack information is stored in the attack database 60 . The attack information includes an attack name, an attack object, an attack object version, an attack severity, a corresponding solution, and the like.

[0023] The name of the attack is a file or program with attack power. The attack object is the module or file attacked by the attack name. Said solutions include patching, raising an alert, stopping the use of the attack object, etc.

[0024] The attack database 60 can be directly stored on a cloud server or other servers, and the attack informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack response method, which comprises the following steps: connecting an attack response system to an attack database; collecting and recording all modules and module version information of a home evolved node B (HeNB); judging whether attack objects in the attack database and the attacked object versions are matched with the modules and the module version information;downloading patches for the attack object and the attacked object version matched with the modules and the module version information to fix bugs; and updating the module version successful in bug fixing. The invention also discloses the attack response system. The method and system can find potential attack risks of the HeNB and can eliminate the risk timely, and prevent the HeNB from being attacked.

Description

technical field [0001] The invention relates to a coping method and system, in particular to a coping method and system for data attacks. Background technique [0002] A Home evolved Node B (HeNB) refers to a local area, an office or a similar small area. Deploy small Universal Terrestrial Radio Access (UTRA) or Evolved Universal Terrestrial Radio Access (E-UTRA) cells to provide users with local wireless access services similar to wireless LANs . There are often major attacks and security vulnerabilities on the network, but we have no way of knowing whether this attack is related to HeNB's current products. Even if relevant remedial measures are available on the Internet in real time, there is no way to ensure that all products are applied smoothly. Contents of the invention [0003] In view of the above, it is necessary to provide an attack response method and system for preventing HeNB from being attacked, which can detect potential risks of being attacked and elimin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L63/1441H04L67/1097
Inventor 苏仁桢
Owner NANNING FUGUI PRECISION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products