Unified control method and system for network security equipment

A security device and network security technology, which is applied in the field of network security, can solve the problems that network threat intelligence and defense strategies cannot be well utilized, single network defense, and lack of collaborative defense of LAN

Active Publication Date: 2019-08-30
HARBIN ENG UNIV
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current network defense is single, and can only be defended through statically configured security devices in the LAN. It cannot make good use of network threat intelligence and defense strategies, and lacks coordinated defense between various LANs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified control method and system for network security equipment
  • Unified control method and system for network security equipment
  • Unified control method and system for network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] The invention discloses a unified accusation method and system for network security equipment, and relates to the technical field of network security. The method includes, according to the network defense strategy formed by the network threat intelligence, if the network defense strategy includes LAN information, ordering the command and control center to send a request to the LAN manager, updating the attribute list of the LAN security device, and generating a network defense command, and It is sent to the LAN security device; if the network defense strategy does not contain LAN information, the command center will send a request to all LAN managers, update the property list of all managed LAN security devices, and generate a network defense command, and send it to all For the same type of security equipment, the final LAN security equipment executes the networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and particularly relates to a unified control method and system for network security equipment, and the method comprises the followingsteps: generating a network defense strategy according to a received network threat information; judging whether the generated network defense strategy contains local area network information or not,commanding a command and control center to send a request to all the local area network managers, and updating an attribute list of all the managed local area network security devices; generating a corresponding network defense command through security equipment and a command format file thereof specified in the network defense strategy, and sending the network defense command to the local area network security equipment; and using the local area network security device to execute the network defense command and return a response to the command and control center. Various kinds of safety equipment are dynamically and uniformly controlled, the safety equipment comprises an intrusion detection system, a virtual private network and a safety gateway, and rapid defense can be carried out.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a unified accusation method and system for network security equipment. Background technique [0002] STIX, or Structured Threat Information Expression, is a language and serialization format for exchanging cyber threat intelligence (CTI). Being able to share CTI with each other in a consistent and machine-readable manner allows the security community to better understand the computer-based attacks they are most likely to see, and to predict and respond to these attacks more quickly and effectively. [0003] TAXII, Trusted Automatic Intelligent Information Exchange, is an application layer protocol for delivering cyber threat information in a simple and scalable manner. TAXII enables organizations to share CTI by defining APIs that align with common sharing models. [0004] The current network defense is single, and can only be defended through statically co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0813H04L63/1416H04L63/20H04L63/302
Inventor 李晋马林江蒋正乾张莉玲程建华
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products