Management and control method, device, equipment and system for intranet malicious reverse connection behavior

A reverse connection and malicious technology, applied in the field of network security, can solve the problems of low efficiency of internal network protection and security protection

Active Publication Date: 2020-10-30
SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present invention is to provide a method, device, device and system for controlling malicious reverse connection behaviors in the intranet, so as to overcome the current intranet protection The problem of low security protection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management and control method, device, equipment and system for intranet malicious reverse connection behavior
  • Management and control method, device, equipment and system for intranet malicious reverse connection behavior
  • Management and control method, device, equipment and system for intranet malicious reverse connection behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0047] figure 1 It is a flow chart provided by an embodiment of the method for managing and controlling malicious reverse connection behavior in the intranet of the present invention. The intranet system generally includes personal hosts, servers, switches, gateways and other devices. The method for controlling malicious reverse connection behaviors of the intranet in this embodiment is applied to the management and control of malicious reverse connection behavi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a management and control method, device, equipment and system for an intranet malicious reverse connection behavior. Based on policy-based routing, the method comprises the steps of: obtaining an external network access request forwarded from a core switch, if the external network access request is an http access request, analyzing a host field at the head of the http datapacket in the http access request to take as a target domain name,if the external network access request is an https access request, analyzing a Server Name field of a Server Name Indication extension at the head of the SSL negotiation data packet, taking the Server Name field as a target domain name, and if the target domain name is detected to be in a preset white list, allowing the terminal equipment to access an IP corresponding to the target domain name. According to the invention, security management and control are carried out through the target domain name, error interception caused by IP resolution errors is avoided, the target domain name is obtained without adding a certificate to decrypt the https data packet, all application systems can be covered, and management and controlof malicious reverse connection behaviors of an intranet are realized.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method, device, device and system for managing and controlling malicious reverse connection behavior in an intranet. Background technique [0002] With the development of Internet technology, more and more industries have begun to use the Internet as a platform to carry out business. At the same time, the form of network security is becoming more and more severe. Various forms of network attacks occur more and more frequently in people's lives, and what emerges at the historic moment is the emergence of various network security technologies. With the development of network security, the focus of enterprise security construction has gradually expanded from the early border security to intranet security, and the management and control of malicious reverse connections on the intranet has become a security technology that enterprises focus on. At present, the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/101
Inventor 施煜程
Owner SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products