A unified accusation method and system for network security equipment

A security device and network security technology, applied in the field of network security, can solve the problems of lack of collaborative defense of LAN, single network defense, network threat intelligence and defense strategies cannot be better utilized, etc.

Active Publication Date: 2021-06-01
HARBIN ENG UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current network defense is single, and can only be defended through statically configured security devices in the LAN. It cannot make good use of network threat intelligence and defense strategies, and lacks coordinated defense between various LANs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A unified accusation method and system for network security equipment
  • A unified accusation method and system for network security equipment
  • A unified accusation method and system for network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] The invention discloses a unified accusation method and system for network security equipment, and relates to the technical field of network security. The method includes, according to the network defense strategy formed by the network threat intelligence, if the network defense strategy includes LAN information, ordering the command and control center to send a request to the LAN manager, updating the attribute list of the LAN security device, and generating a network defense command, and It is sent to the LAN security device; if the network defense strategy does not contain LAN information, the command center will send a request to all LAN managers, update the property list of all managed LAN security devices, and generate a network defense command, and send it to all For the same type of security equipment, the final LAN security equipment executes the networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and in particular relates to a unified accusation method and system for network security equipment, comprising the following steps: generating a network defense strategy according to received network threat intelligence; judging whether the generated network defense strategy contains local area network information , command the command center to send a request to all LAN managers to update the attribute lists of all managed LAN security devices; generate corresponding network defense commands through the security devices specified in the network defense policy and their command format files, and send them to The aforementioned LAN security device; the LAN security device executes the network defense command and returns a response to the command command center. The present invention dynamically and uniformly instructs various security devices, and the security devices include an intrusion detection system, a virtual private network, and a security gateway, and can perform rapid defense.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a unified accusation method and system for network security equipment. Background technique [0002] STIX, or Structured Threat Information Expression, is a language and serialization format for exchanging cyber threat intelligence (CTI). Being able to share CTI with each other in a consistent and machine-readable manner allows the security community to better understand the computer-based attacks they are most likely to see, and to predict and respond to these attacks more quickly and effectively. [0003] TAXII, Trusted Automatic Intelligent Information Exchange, is an application layer protocol for delivering cyber threat information in a simple and scalable manner. TAXII enables organizations to share CTI by defining APIs that align with common sharing models. [0004] The current network defense is single, and can only be defended through statically co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0813H04L63/1416H04L63/20H04L63/302
Inventor 李晋马林江蒋正乾张莉玲程建华
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products