Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security and protection equipment active defense method, device and system

A technology for active defense and security equipment, applied in the field of network security, it can solve the problems of large storage burden of front-end security equipment, dependence on the accuracy and real-time performance of black and white lists, and high maintenance costs of black and white lists, so as to avoid dependence and reduce computing resources and storage. The effect of resources

Inactive Publication Date: 2020-11-13
HANGZHOU HIKVISION DIGITAL TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the active defense implementation scheme of the security front-end equipment is mainly to preset some black and white lists (such as the MD5 values ​​of various known viruses and Trojans) in the security front-end equipment to prevent the equipment from being hacked. Relying on the accuracy and real-time performance of the black and white lists, the maintenance cost of the black and white lists is relatively high, and when the size of the black and white lists is large, there will be a large storage burden on the security front-end equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection equipment active defense method, device and system
  • Security and protection equipment active defense method, device and system
  • Security and protection equipment active defense method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0029] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise.

[0030] In order to enable those skilled ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security and protection equipment active defense method, device and system. The method comprises the steps that security and protection front-end equipment acquires first equipment operation state information in preset unit time; the security and protection front-end equipment determines a first statistical characteristic value of the first equipment operation state information by using a determined change point detection algorithm based on the first equipment operation state information; the security and protection front-end equipment determines whether the current equipment operation state is abnormal or not based on the first statistical characteristic value and the determined second statistical characteristic value; and when the security and protection front-end equipment is currently in an abnormal operation state, an alarm is given to the equipment management platform. According to the method, computing resources and storage resources required for realizing active defense of the security and protection front-end equipment can be reduced.

Description

technical field [0001] The present application relates to the field of network security, in particular to an active defense method, device and system for security equipment. Background technique [0002] With the large-scale deployment of security front-end equipment, how to effectively implement active defense on security front-end equipment has become an urgent problem to be solved. [0003] At present, the active defense implementation scheme of the security front-end equipment is mainly to preset some black and white lists (such as the MD5 values ​​of various known viruses and Trojans) in the security front-end equipment to prevent the equipment from being hacked. Relying on the accuracy and real-time performance of the black and white lists, the maintenance cost of the black and white lists is relatively high, and when the size of the black and white lists is large, there will be a large storage burden on the security front-end equipment. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1441
Inventor 王滨张峰王星陈加栋陈达陈逸凯徐文渊冀晓宇李俊王冲华
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products