Method and system for detecting white list of data stream based on regular expression

An expression, data flow technology, applied in digital transmission systems, other database retrieval, transmission systems, etc., can solve the problems of network server intrusion, penetration attack, loss of server sensitive data, etc.

Active Publication Date: 2020-01-07
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Penetration attacks aimed at political and economic interests are still on the rise. Various security incidents such as hacking, virus ravages, network paralysis, and homepage tampering occur frequently and become more serious, leading to the intrusion of network servers and the loss of sensitive server data. , network system crashes and server downtime, etc., normal business cannot be carried out
[0003]The biggest disadvantage of blacklist detection based on virus detection, IDS\IPS protection, WAF (web application firewall), etc. Overdetection
The existing whitelist detection technology is mainly based on the access control of the link layer, network layer, transport layer, and some application layers. Attackers can bypass the protection by disguising the source address, or in the existing business service system. Initiate penetration attacks against application service flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting white list of data stream based on regular expression
  • Method and system for detecting white list of data stream based on regular expression
  • Method and system for detecting white list of data stream based on regular expression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0044] see figure 1 , a flow chart of a method for detecting a network data flow whitelist according to an embodiment of the present invention. Such as figure 1 As shown, the steps of this method are as follows:

[0045] Step S1: Obtain network data flow;

[0046] Step S2: Service protocol detection, performing service protocol detection on the network data flow, and judging whether the service data flow conforms to the service agreement,

[0047] If the judgment result of the business data flow is negative, it is discarded;

[0048] If the result of judging the business data flow is judged to be yes, then execute the next step;

[0049] Step S3: Restoring the session message to obtain a complete message;

[0050] Step S4: Perform message analysis on the complete message to obtain parameter values, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a white list of a data stream based on a regular expression. The method comprises the following steps: S1, acquiring a network data stream; S2, detectinga service protocol: carrying out service protocol detection on the network data flow, and judging whether the network data flow conforms to a service protocol or not; if the judgment result of the service protocol is no, discarding the service protocol; if the service protocol judgment result is yes, identifying the network data flow as a service data flow, and executing the next step; S3, restoring the session message to obtain a complete message; S4, making message analysis on the complete message to obtain message data, wherein the message data comprises a parameter value, an instruction and an instruction parameter; and S5, executing white list learning processing or white list detection processing on the message data according to the current mode. The invention further discloses thesystem for detecting white list of the data stream based on a regular expression. The recognizable effective service data stream is released, and data of various new and old attack behaviors is marked as abnormal service stream data to be intercepted so as to carry out accurate detection and protection on the system.

Description

technical field [0001] The invention relates to the field of system detection, in particular to a method and a system for detecting data stream whitelists based on regular expressions. Background technique [0002] With the rapid development of network information technology, network attacks emerge in an endless stream, and network security problems are becoming more and more serious. However, traditional blacklist-based detection technology is becoming more and more difficult to block various new attacks. Penetration attacks aimed at political and economic interests are still on the rise, such as hacking, virus ravages, network paralysis, homepage tampering and other security incidents occur frequently and become increasingly severe, leading to network server intrusion and loss of sensitive data on the server , network system crashes and server downtime, etc., normal business cannot be carried out. [0003] The biggest disadvantage of blacklist detection based on virus det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/08G06F16/903
CPCH04L43/18H04L67/02H04L63/1466H04L69/22G06F16/90344
Inventor 戚建淮杨旭东郑伟范宋晶刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products