Router threat perception method and system

A router and consistent technology, applied in the field of network information security, can solve problems such as lack of router threat perception means

Inactive Publication Date: 2019-08-20
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of lack of router threat perception means for unknown loopholes and zero-day attacks, the present invention provides a new router threat pe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Router threat perception method and system
  • Router threat perception method and system
  • Router threat perception method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] The logical block diagram of the router threat awareness system provided by the embodiment of the present invention is as follows figure 1 shown. In order to distinguish the monitored router from the router threat awareness system (hereinafter referred to as the threat awareness system), the output data of the monitored router is called the first output data, and the outp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a router threat perception method and system. The method comprises the following steps that: the threat perception system is consistent with the input of a monitored router; theoutput data of the monitored router is sent to the threat perception system at the same time; wherein the configuration information of the monitored router needs to be synchronously configured to thethreat perception system; and the state information of the monitored router needs to be timely collected to the threat perception system. The output data and state of the monitored router are compared with the output data and state of the threat sensing system, if the output data or state of the monitored router is inconsistent with the output data or state of the threat sensing system, the monitored router may have a threat, and alarm information is sent to a management system. The threat perception system comprises an input processing unit, a function equivalent actuator unit, a state comparison unit, an output comparison unit and an analysis alarm unit. According to the method, the problem of high difficulty in judging router threats caused by various vulnerability and attack technicalmeans can be solved, and unknown vulnerabilities and zero-day attacks can be perceived.

Description

technical field [0001] The present invention relates to the technical field of network information security, in particular to a router threat perception method and system. Background technique [0002] As the basic core element of cyberspace, routers are located at the bottom layer of cyberspace, interconnecting multiple heterogeneous networks, and realizing end-to-end network intercommunication through route lookup and data forwarding. As the core equipment of cyberspace information infrastructure, it covers the core layer, convergence layer and access layer of the entire Internet. Due to its complexity and intelligence, it has become one of the main targets of network security attacks, and its security directly affects or even restricts the security of cyberspace. Since the router is in the basic position in the network, once its vulnerabilities and backdoors are exploited, it will cause immeasurable harm. This is not only related to the security of the router itself, but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 于婧马海龙陈祥陈博韩伟涛白冰周锟张鹏袁征李路晗
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products