Data security detection method and device, storage medium and electronic equipment

A technology of security detection and data, which is applied in the field of network security, can solve problems such as hidden dangers of user system security, does not support GTP protocol traffic security detection, etc., and achieves the effect of small changes, efficient and accurate security detection, and little impact

Pending Publication Date: 2021-04-02
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the embodiments of the present disclosure propose a data security detection method, device, storage medium, and electronic equipment to solve the following problems in the prior art: Although the existing firewall / gateway equipment has a security policy, the current There is a security policy but it does not support the security detection of GTP protocol traffic, and there are still major security risks in the user system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security detection method and device, storage medium and electronic equipment
  • Data security detection method and device, storage medium and electronic equipment
  • Data security detection method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings of the embodiments of the present disclosure. Apparently, the described embodiments are some of the embodiments of the present disclosure, not all of them. Based on the described embodiments of the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative effort fall within the protection scope of the present disclosure.

[0024] Unless otherwise defined, the technical terms or scientific terms used in the present disclosure shall have the usual meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the present disclosure do not indicate any order, quantity or importance, but are o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data security detection method and device, a storage medium and electronic equipment, and the method comprises the steps: carrying out the first protocol analysis of a received data package, so as to detect whether the received data package is GTP-U protocol data or not; under the condition that the GTP-U protocol data are GTP-U protocol data, splitting the GTP protocol header information from the analyzed GTP-U protocol data to obtain inner-layer data not including the GTP protocol header information, wherein the inner-layer data at least include a user layer IP, port information and application layer data; performing second protocol analysis on the inner-layer data, and performing security detection on the analyzed inner-layer data according toa predetermined security policy; and processing the data packet according to a security detection result. According to the embodiment of the invention, the existing firewall/gateway equipment is slightly changed, the flow of the GTP protocol can be audited by applying multiple original security policies on the firewall/gateway equipment, and the installation and deployment are simple and convenient.

Description

technical field [0001] The present disclosure relates to the field of network security, and in particular to a data security detection method, device, storage medium and electronic equipment. Background technique [0002] With the continuous development of the mobile Internet, the mobile Internet terminal (referred to as the mobile terminal) has surpassed the traditional PC terminal in terms of the number of equipment owned and the number of users, and has become the largest entrance terminal. Due to the popularity, openness and interconnection of mobile Internet, mobile terminals are facing traditional Internet security problems, such as security holes, malicious codes, phishing fraud and spam. At the same time, since mobile terminals involve more personal information, their privacy is stronger, and they also face many new problems. Therefore, it is necessary to pay more attention to the field of mobile security and improve the security level of mobile terminals. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441H04L63/16H04L69/22
Inventor 徐自全
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products