A security defense system and method

A security defense and security technology, applied in the field of security defense systems, can solve the problems of lateral translation, large security risks, and weak defense capabilities, and achieve the effect of enhancing security, improving defense capabilities, and improving defense capabilities.

Active Publication Date: 2022-03-22
SANGFOR TECH INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method is too simple and the defense capability is weak. Once the interception fails, the attack traffic enters the private cloud, and it is easy to move horizontally between terminals, which poses a great security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security defense system and method
  • A security defense system and method
  • A security defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] see figure 1 As shown, it is a schematic structural diagram of a security defense system provided by an embodiment of the present invention. The system includes a core switch 110 deployed in a private cloud, a security resource pool 120, and multiple terminals, such as a terminal 131, a terminal 132, and a terminal 133. , a terminal 134, the security resource pool 120 includes a micro-isolation subsyst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security defense system, which includes a core switch, a security resource pool and multiple terminals, the security resource pool contains a micro-isolation subsystem and multiple security components; the core switch is used to guide received access traffic to the security The resource pool is cleaned and protected by each security component in the security resource pool and then sent to the corresponding terminal; each terminal is used to accept the corresponding access when the received access traffic is determined to be safe traffic based on its own micro-isolation strategy; Report its own traffic information to the micro-isolation subsystem; the micro-isolation subsystem is used to output and display the traffic details and access relationship of each terminal, so as to adjust the micro-isolation strategy of the corresponding terminal based on the traffic details and access relationship of each terminal. By applying the technical solution provided by the embodiment of the present invention, the unified security protection of the east-west and north-south traffic is carried out, and the security of the private cloud is enhanced. The invention also discloses a safety defense method, which has corresponding technical effects.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security defense system and method. Background technique [0002] With the application of the Internet in various fields more and more widely, various network attacks are also changing and increasing. In the private cloud built by enterprises and institutions, a large number of terminals may be deployed. Once attacked by the network, it will cause large economic losses to enterprises and institutions. Terminals under network attack are mainly due to weak security defense capabilities or loopholes in the system and application itself. [0003] At present, there are many kinds of network attacks. The traditional defense method is mainly to defend through firewalls. Firewalls are deployed at network ingress and egress to clean incoming and outgoing traffic and intercept attack traffic. [0004] This method is too simple and the defense capability is weak. Once the inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/02H04L63/1458H04L63/205
Inventor 邓胜利
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products