Intrusion detection method and device

A technology of intrusion detection and configuration files, which is applied in the field of network security and can solve the problems of lack of defense capabilities against network attacks

Active Publication Date: 2020-12-29
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this application provides an intrusion detection method and device to solv...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and device
  • Intrusion detection method and device
  • Intrusion detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to solve the problem that the existing service grid lacks defense capabilities against network intrusions, the embodiments of the present application provide an intrusion detection method and device.

[0049] The preferred embodiments of the application will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the application, and are not used to limit the application, and in the absence of conflict, the application The embodiments and the features in the embodiments can be combined with each other.

[0050] In order to facilitate understanding of the application, in the technical terms involved in the application:

[0051] Container (Container), a technology that packages software into standardized units for development, delivery, and deployment.

[0052] Container orchestration tool, a tool for organizing and scheduling containers. The c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method and device, and belongs to the technical field of network security. The method is applied to a service grid, the service grid comprises a plurality of services, each service comprises a business container and an agent container, and the method comprises the following steps: controlling the agent container in each service to intercept a businessmessage to enter the business container in the service, and controlling the proxy container to analyze the intercepted service message, controlling the proxy container to compare an analysis result with a configured message interception rule, and controlling the proxy container to intercept the service message when determining that the service message is matched with the message interception ruleso as to prevent the service message from invading the service container in the service. In this way, the intrusion detection function is integrated into the proxy container of each service in the service grid, so that the service grid has a defense capability for network intrusion.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an intrusion detection method and device. Background technique [0002] With the continuous development of container technology, application design has gradually changed from a traditional monolithic architecture to a microservice architecture, and application deployment has also changed from a single-machine deployment to a cluster or distributed deployment, resulting in many microservice deployments Program. [0003] At present, deploying a service grid on the mainstream container orchestration platform Kubernetes has become a more popular microservice deployment solution. Although the service grid solves the communication problem between microservices, in a complex and changeable network environment, due to various attacks emerging one after another, the security of microservices cannot be ignored. The existing service mesh technology does not have the cor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/12H04L63/1416H04L69/22H04L67/56
Inventor 浦明刘文懋江国龙阮博男
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products