Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security policy

A network security and policy configuration technology, applied in the field of network security, can solve problems such as the inability to formulate network security policies in real time

Active Publication Date: 2019-07-12
HANGZHOU GUYI NETWORK TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, with the development of technology, even if a certain network security self-learning ability is realized, it is still impossible to formulate a network security strategy that meets the needs of network applications in an efficient, accurate and real-time manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security policy
  • Network security policy
  • Network security policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present disclosure are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the contents disclosed in this specification. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The present disclosure can also be implemented or applied through different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security policy manual configuration method, a network security policy configuration device and a computer readable storage medium. The method comprises the followingsteps: in a network operation process, trial operation of an alternative security rule of each node of a network is carried out; according to the configured security criterion, the security performance of each node operating the alternative security rule is evaluated; and under the condition of higher safety performance, the currently running safety rule on each node is replaced with the alternative safety rule. The security policy configuration of the whole network has higher security performance by continuously self-learning and updating the running security rule through each node of the network, the high security performance is kept in real time, and the network security requirement is met.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular to a configuration method, device and computer-readable storage medium of a network security policy. Background technique [0002] The network has been widely used and popularized in daily production and life, making people more and more inseparable from the network. However, network security issues are becoming more and more prominent and cause great troubles to network users. Especially in the field of industrial control, with the continuous deepening of industrial control automation process, the industrial control network itself and the information interaction with the external Internet or enterprise office network are becoming more and more frequent, which makes the industrial control network constantly face malicious attacks and threats from the external Internet. Threats such as misoperation by insiders. [0003] It is precisely because of the openness and standardiz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0263H04L63/205
Inventor 白云祥夏伟东苗维杰
Owner HANGZHOU GUYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products