Unlock instant, AI-driven research and patent intelligence for your innovation.

Identification method, identification device and storage medium for terminal security agent breakthrough

A terminal security and device identification technology, which is applied in the field of network security, can solve problems such as terminal security agents being broken through and cannot be identified, and achieve the effect of improving security defense capabilities

Active Publication Date: 2022-08-05
SANGFOR TECH INC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide an identification method, identification device and storage medium for terminal security agent breakthrough, aiming to solve the technical problem that the terminal security agent in the network cannot be identified when it is broken through in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method, identification device and storage medium for terminal security agent breakthrough
  • Identification method, identification device and storage medium for terminal security agent breakthrough
  • Identification method, identification device and storage medium for terminal security agent breakthrough

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0046] refer to figure 1 , figure 1 This is a schematic structural diagram of a hardware operating environment identification device involved in the solution of the embodiment of the present invention.

[0047] like figure 1 As shown, the identification device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Among them, the communication bus 1002 is used to realize the connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard wired interface an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification method, identification device and storage medium for terminal security agent breakthrough. The identification device of the present invention acquires the first security rule sent by the border security device in the target network, the first security rule is generated by the border security device according to the traffic collected in the target network, and the first security rule is The rule is matched with the second security rule of the terminal security agent in the target network. When the matching fails, it is determined that the terminal security agent in the target network has been broken through. By identifying the linkage between the device and the border security device, the The first security rule sent by the border security device is matched with the second security rule of the terminal security agent, and the breached terminal security agent is identified according to the matching result, which solves the technical problem that the current terminal security agent cannot be identified when the terminal security agent is breached, and improves the The network security defense capability.

Description

technical field [0001] The invention relates to the technical field of network security, and in particular, to an identification method, identification device and storage medium for terminal security agent breakthrough. Background technique [0002] In the distributed application system architecture of the client / application server, the security proxy technology of the application service is usually used, in which the identity of the client user accessing the application server is authenticated, the authority is controlled, and the application protocol is also identified and filtered. etc., to realize the security protection of application services. [0003] However, the security agent is at risk of being bypassed by malware. Once the security agent is bypassed, the malware can launch malicious behaviors, such as allowing the external network to illegally access important servers and transmit important information to the external network. The linkage of border security equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/20
Inventor 陈晓帆古亮
Owner SANGFOR TECH INC