Network intrusion detection method, device, system and storage medium

A network intrusion detection and network intrusion technology, applied in the field of network security, can solve problems such as inability to support session-level intrusion detection

Active Publication Date: 2020-08-28
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF11 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present application provide a network intrusion detection method, a network intrusion detection device, a network intrusion detection system, and a computer-readable storage medium, so as to at least solve the problem of inability to support session-level intrusion detection in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method, device, system and storage medium
  • Network intrusion detection method, device, system and storage medium
  • Network intrusion detection method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the scope of protection of this application.

[0048]Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ordinary sk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network intrusion detection method, a device, a system and a storage medium. The network intrusion detection method comprises the steps of: analyzing protocol data units ofa request packet and a response packet to obtain parameters of the protocol data units, wherein the response packet is a data packet responding to the request packet in the same session; judging whether the parameters of the protocol data unit accord with a first preset rule or not; and when judging that the parameters of the protocol data unit do not accord with the first preset rule, transmitting a first alarm message used for indicating that network intrusion exists. Through adopting the network intrusion detection method, the problem that intrusion detection of a session level cannot be supported in related technologies is solved, and the beneficial effect of intrusion detection of the session level is realized.

Description

technical field [0001] The present application relates to the field of network security, in particular to a network intrusion detection method, a network intrusion detection device, a network intrusion detection system and a computer-readable storage medium. Background technique [0002] ICS (Industrial Control System, industrial control system), referred to as industrial control system. The industrial control system is different from the traditional Internet environment. The industrial control system usually has a specific production goal. To achieve this goal, a clear production logic has been formulated and strictly followed in actual operation. Therefore, once a certain industrial control equipment is used, its Communication patterns, communication traffic, communication objects and other related information are usually stable. Once an intruder breaks into the industrial control system, it is easy for the intruder to attack the industrial control equipment by tampering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L69/22H04L69/06
Inventor 王东海范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products