Intrusion detection system and method based on role access control

An intrusion detection system and role access control technology, applied in the field of network security, can solve problems that cannot meet the needs of daily life, and achieve the goal of solving the loss of internal system resources and failure of the detection system, ensuring integrity, and reducing the probability of errors Effect

Active Publication Date: 2019-01-04
喻伟
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, denial of service attack, internal leak, logic bomb, i...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and method based on role access control
  • Intrusion detection system and method based on role access control
  • Intrusion detection system and method based on role access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 A schematic structural diagram of the intrusion detection system according to Embodiment 1 of the present disclosure is shown.

[0023] refer to figure 1 , Embodiment 1 of the present disclosure introduces an intrusion detection system based on role access control, including: a network environment detection module 101, which is used to perform intrusion security detection on user access, and / or filter and purify user application information The role management module 102 is used to determine whether the user's operation exceeds the authority assigned to the user's role; the system resource allocation module 103 is used to allocate system resources to the user according to the user's role; and a monitoring module 104, used to determine whether the work in the system is normal according to the abnormal activities in the network environment detection module 101, the role management module 102 and / or the system resource allocation module 103.

[0024] It should b...

Embodiment 2

[0101] Embodiment 2 of the present disclosure introduces an intrusion detection method based on role access control, including: performing intrusion security detection on the user's access, and / or filtering and purifying the user's application information; determining whether the user's operation exceeds The authority assigned to the user's role; according to the user's role, allocate system resources to the user; monitor the abnormal activities in the above operations, and determine whether the work in the system is normal.

[0102] Therefore, by implementing the intrusion detection method based on role access control described in Embodiment 2, the purpose of ensuring system security is achieved, and the identity authentication of users, the monitoring and detection of internal resources of the system, and timely detection of attacked The technical effect of system recovery solves the technical problems of internal system resource loss and detection system failure that occur w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an intrusion detection system and method based on role access control. The system comprises a network environment detection module which is used for performing intrusionsecurity detection on the access of a user and/or filtering and purifying the application information of the user, a role management module which is used for judging whether the operation of the userexceeds an authority assigned by a role assigned to the user, a system resource allocation module which is used for allocating system resources to the user according to the role of the user, and a monitoring module which is used for judging whether the working in the system is normal or not according to abnormal activities in the network environment detection module, the role management module and/or the system resource allocation module. According to the intrusion detection system based on role access control, the function of an intrusion detection system is further improved, the probabilityof occurrence of errors is reduced, and the security of the system is ensured.

Description

【Technical field】 [0001] The invention relates to the field of network security, in particular to an intrusion detection system based on role access control and its working method. 【Background technique】 [0002] The computer structure tends to be simple and easy to carry, technological innovation promotes the rapid development of the network, network security has gradually become a new discipline, and network security has penetrated into all aspects of life. It is a combination of computer science, network technology, communication technology, and information security technology. Large-scale and highly complex development and transformation of the network, through the monitoring, investigation and application of the network, the probability of network intrusion is reduced, and the risk of property information leakage is reduced. At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, denial of service att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1416
Inventor 喻伟喻亮
Owner 喻伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products