Network intrusion protection system

A network intrusion and protection system technology, applied in transmission systems, electrical components, etc., can solve problems such as impact, and achieve high security, high reliability, and high integration effects

Inactive Publication Date: 2020-05-22
GUIZHOU POWER GRID CO LTD
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The continuous development of offense and defense, the continuous evolution of security threats, and the widespread use of new applications and technologies will also have a huge impact on the original security concept and model. The original security detection and protection methods can no longer completely solve the problems facing security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] A network intrusion prevention system provided by the present invention will be described in more detail below with reference to the drawings and embodiments.

[0037] figure 1 is a schematic structural diagram of an embodiment of the network intrusion prevention system of the present invention, such as figure 1 As shown, the network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion protection system, which comprises a network engine module for obtaining external data exchange through a multi-core hardware platform, carrying out behavior analysis, association analysis, protocol anomaly detection, flow anomaly detection, intelligent protocol identification and deep protocol analysis on the obtained data, and constructing a file feature library, a website reputation library and an attack feature library; a management module, used for carrying out user management, configuration management, strategy management, time management, logmanagement and system monitoring on the data and the user state analyzed by the network engine module, generating related management files and configuring related management information; and a security response module, used for starting a corresponding processing instruction after the network engine module detects network intrusion. Intrusion protection, data leakage protection, advanced threat protection, botnet discovery, virus protection and flow control of a computer network can be completed, potential safety hazards of all levels can be automatically coped with, and the deep attack defense capability can be provided for users.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a network intrusion prevention system. Background technique [0002] With the development of network and information technology, especially the widespread popularization and application of the Internet, the importance of information security is also increasing. In recent years, the security issues faced by network information systems have become more and more complex, and security threats are growing rapidly, especially new application-based threats, such as application-layer attacks hidden on basic protocols such as HTTP, web2.0 security issues , Trojan horse backdoor, spyware, botnet, DDoS attack, abuse of network resources, including P2P download, IM instant messaging, online games, video, etc., greatly troubled users, caused serious damage to the information network of the unit, and seriously affected information further development of. In the next few yea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/145
Inventor 陈晖方曦邵亮喻群贾力龙章勇敖志敏祝嘉伟肖乾向召明魏莉莉姜丹周子雅
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products