Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Violation outreach monitoring method, device, system and storage medium

A monitoring device and outreach technology, applied in the field of information security, can solve problems such as occupying business service resources, and achieve the effect of flexible and simple configuration

Active Publication Date: 2020-05-15
北京华赛在线科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One of the existing monitoring methods for illegal outreach is to install a client monitoring program on each monitored terminal. The disadvantage of this method is that it needs to install a monitoring program on each intranet terminal, and technical measures need to be taken To prevent it from being uninstalled; the other is to embed the monitoring code on the intranet business website. When the intranet terminal accesses the intranet business website, the monitoring code will be downloaded to the terminal and run to monitor the terminal’s illegal outreach. The disadvantage of the method is that some changes need to be made to the existing network to deploy and embed the monitoring code on the intranet business website, so some business service resources will be occupied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Violation outreach monitoring method, device, system and storage medium
  • Violation outreach monitoring method, device, system and storage medium
  • Violation outreach monitoring method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] In order to make the technical solution of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] figure 1 It is a flow chart of a violation outreach monitoring method provided by an embodiment of the present invention, figure 2 A detailed flow chart of a viola...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device, system and storage medium for monitoring illegal outreach, wherein the method for monitoring illegal outreach includes: acquiring HTTP traffic information between a terminal in the first network and a first server in the first network, HTTP The traffic information includes the interaction information of the first WEB service; the redirection message and the RST reset message are respectively constructed through the original socket, and the redirection message includes the terminal pointing to the connection configuration of the second server in the second network. Redirection information and asynchronous request information to make the terminal asynchronously request the first WEB service to the first server; send an RST reset message to the first server, so that the first server resets the TCP address of the first WEB service originally requested by the terminal connecting; and sending a redirection message to the terminal, so that when the second server receives the request message sent by the terminal, it determines that the terminal has illegal outreach. The outreach monitoring of violations of the present invention is flexible in deployment, and the user has no perception.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method, device, system and storage medium for outreach monitoring of violations. Background technique [0002] With the development of computer network technology, computer and network leakage cases are increasing year by year, and the current situation of information security is very severe. In order to improve the security of the intranet or private network, enterprises and institutions generally prohibit the connection between the internal network and the Internet, or prohibit the connection between the private network and other networks, and adopt physical isolation or logical isolation to control, thereby reducing security threats from the Internet . However, there are often employees who lack security awareness and connect their terminals to the Internet through other channels without disconnecting from the internal network, resulting in illegal outreach. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/02H04L69/163H04L67/51
Inventor 邓如林胡光俊
Owner 北京华赛在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products