Intranet vulnerability attack defense method and related device
An intranet and vulnerability technology, applied in the computer field, it can solve the problems of false negatives and false positives, affecting the normal use of the enterprise network, and high IPS processing pressure, so as to reduce the possibility, ensure the normal use, and reduce the processing pressure.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] Embodiments of the present application are described below in conjunction with the accompanying drawings.
[0040] In order to prevent hackers from controlling electronic devices in the intranet and threatening the security of data assets through vulnerability attacks, various vulnerability attack defense methods are provided in related technologies, such as figure 1 In the shown IDS mode, the IDS mode usually uses the switch 103 to perform data packet port mirroring at the network routing device 102 of the internal network 104, and copies the data packets communicated between the internal network 104 and the external network 101 to the device 105 and forwards to an independent Detection of asynchronous bypass on the server. The defect of the IDS method is that it can only detect and alarm asynchronously, and once the hacker’s vulnerability attack data packet is sent to the target intranet electronic device, the target intranet electronic device is likely to establish a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


