Attack Response Method and System

A technology of coping methods and objects, applied in the field of coping, can solve the problem that there is no way to ensure the smooth application of products, and achieve the effect of preventing attacks and receiving

Active Publication Date: 2021-07-13
NANNING FUGUI PRECISION IND CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if relevant remedial measures are available on the Internet in real time, there is no way to ensure that all products will be applied smoothly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack Response Method and System
  • Attack Response Method and System
  • Attack Response Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] see figure 1 , in a preferred embodiment, an attack response system includes a connection module 10 , a collection module 20 , a judging module 30 and a processing module 50 . The attack response system may be set on a HeNB (Home evolved Node B, home evolved base station), or on a central office (HeMS) connected to the HeNB.

[0022] The connection module 10 is used for connecting the HeNB to an attack database 60 . Attack information is stored in the attack database 60 . The attack information includes an attack name, an attack object, an attack object version, an attack severity, a corresponding solution, and the like.

[0023] The name of the attack is a file or program with attack power. The attack object is the module or file attacked by the attack name. Said solutions include patching, raising an alert, stopping the use of the attack object, etc.

[0024] The attack database 60 can be directly stored on a cloud server or other servers, and the attack informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An attack response method, comprising: connecting an attack response system to an attack database; collecting and recording all modules and module version information of a Home evolved Node B (HeNB); judging the attack objects and Whether the target version of the attack matches the module and the module version information; download the patch of the attack target and the target version of the attack that matches the module and the module version information, and patch the vulnerability; and update and patch the vulnerability successfully version of the mod. The invention also discloses an attack response system. Through the above method and system, the potential risk of HeNB being attacked can be found and the risk can be eliminated in time, so as to prevent the HeNB from being attacked.

Description

technical field [0001] The invention relates to a coping method and system, in particular to a coping method and system for data attacks. Background technique [0002] A Home evolved Node B (HeNB) refers to a local area, an office or a similar small area. Deploy small Universal Terrestrial Radio Access (UTRA) or Evolved Universal Terrestrial Radio Access (E-UTRA) cells to provide users with local wireless access services similar to wireless LANs . There are often major attacks and security vulnerabilities on the network, but we have no way of knowing whether this attack is related to HeNB's current products. Even if relevant remedial measures are available on the Internet in real time, there is no way to ensure that all products are applied smoothly. Contents of the invention [0003] In view of the above, it is necessary to provide an attack response method and system for preventing HeNB from being attacked, which can detect potential risks of being attacked and elimin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L63/1441H04L67/1097
Inventor 苏仁桢
Owner NANNING FUGUI PRECISION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products