A security defense system and method

A security defense and security technology, applied in the field of security defense systems, can solve problems such as lateral translation, large security risks, and weak defense capabilities.

Active Publication Date: 2019-01-08
SANGFOR TECH INC
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method is too simple and the defense capability is weak. Once the interception fails, the attack traf...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security defense system and method
  • A security defense system and method
  • A security defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] see figure 1 As shown, it is a schematic structural diagram of a security defense system provided by an embodiment of the present invention. The system includes a core switch 110 deployed in a private cloud, a security resource pool 120, and multiple terminals, such as a terminal 131, a terminal 132, and a terminal 133. , a terminal 134, the security resource pool 120 includes a micro-isolation subsyst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security defense system, comprising a core exchange, a security resource pool and a plurality of terminals. The security resource pool comprises a micro-isolation subsystem and a plurality of security components. The core switch is used for directing the received access flow to the secure resource pool, and sending the received access flow to the corresponding terminal after cleaning and protecting each security component in the secure resource pool. Each terminal is used for accepting corresponding access when the received access traffic is determined to be safe traffic based on its own micro-isolation policy. Its own traffic information is reported to the micro-isolation subsystem. The micro-isolation subsystem is used for outputting traffic details and access relationships of each terminal to adjust the micro-isolation policy of the corresponding terminal based on the traffic details and access relationships of each terminal. The technical proposal providedby the embodiment of the invention is used for unified security protection of east-west flow and south-north flow, and the security of the private cloud is enhanced. The invention also discloses a security defense method, which has corresponding technical effect.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security defense system and method. Background technique [0002] With the application of the Internet in various fields more and more widely, various network attacks are also changing and increasing. In the private cloud built by enterprises and institutions, a large number of terminals may be deployed. Once attacked by the network, it will cause large economic losses to enterprises and institutions. Terminals under network attack are mainly due to weak security defense capabilities or loopholes in the system and application itself. [0003] At present, there are many kinds of network attacks. The traditional defense method is mainly to defend through firewalls. Firewalls are deployed at network ingress and egress to clean incoming and outgoing traffic and intercept attack traffic. [0004] This method is too simple and the defense capability is weak. Once the inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1458H04L63/205
Inventor 邓胜利
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products