Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion Detection System and Method Based on Role Access Control

An intrusion detection system and role access control technology, applied in the field of network security, can solve problems that cannot meet the needs of daily life, achieve the effect of solving internal system resource loss and detection system failure, ensuring confidentiality, and ensuring integrity

Active Publication Date: 2021-06-08
喻伟
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, denial of service attack, internal leak, logic bomb, information loss and password cracking, etc. Traditional network protection is based on firewall technology , the rest of the network technology can no longer meet the needs of daily life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion Detection System and Method Based on Role Access Control
  • Intrusion Detection System and Method Based on Role Access Control
  • Intrusion Detection System and Method Based on Role Access Control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 A schematic structural diagram of the intrusion detection system according to Embodiment 1 of the present disclosure is shown.

[0023] refer to figure 1 , Embodiment 1 of the present disclosure introduces an intrusion detection system based on role access control, including: a network environment detection module 101, which is used to perform intrusion security detection on user access, and / or filter and purify user application information The role management module 102 is used to determine whether the user's operation exceeds the authority assigned to the user's role; the system resource allocation module 103 is used to allocate system resources to the user according to the user's role; and a monitoring module 104, used to determine whether the work in the system is normal according to the abnormal activities in the network environment detection module 101, the role management module 102 and / or the system resource allocation module 103.

[0024] It should b...

Embodiment 2

[0101] Embodiment 2 of the present disclosure introduces an intrusion detection method based on role access control, including: performing intrusion security detection on the user's access, and / or filtering and purifying the user's application information; determining whether the user's operation exceeds The authority assigned to the user's role; according to the user's role, allocate system resources to the user; monitor the abnormal activities in the above operations, and determine whether the work in the system is normal.

[0102] Therefore, by implementing the intrusion detection method based on role access control described in Embodiment 2, the purpose of ensuring system security is achieved, and the identity authentication of users, the monitoring and detection of internal resources of the system, and timely detection of attacked The technical effect of system recovery solves the technical problems of internal system resource loss and detection system failure that occur w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an intrusion detection system and method based on role access control, including a network environment detection module, which is used to perform intrusion security detection on user access, and / or filter and purify user application information; a role management module, It is used to determine whether the user's operation exceeds the authority granted by the role assigned to the user; the system resource allocation module is used to allocate system resources to the user according to the user's role; and the monitoring module is used to detect the module and role management according to the network environment Unusual activity in modules and / or system resource allocation modules to determine whether the system is working properly. The intrusion detection system based on role access control of the present invention further improves the function of the intrusion detection system, reduces the probability of errors, and ensures the safety of the system.

Description

【Technical field】 [0001] The invention relates to the field of network security, in particular to an intrusion detection system based on role access control and its working method. 【Background technique】 [0002] The computer structure tends to be simple and easy to carry, technological innovation promotes the rapid development of the network, network security has gradually become a new discipline, and network security has penetrated into all aspects of life. It is a combination of computer science, network technology, communication technology, and information security technology. Large-scale and highly complex development and transformation of the network, through the monitoring, investigation and application of the network, the probability of network intrusion is reduced, and the risk of property information leakage is reduced. At present, the main ways of network intrusion include hacker intrusion, system backdoor intrusion, computer virus intrusion, denial of service att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1416
Inventor 喻伟喻亮
Owner 喻伟