An intelligent configuration method of security policy based on target awareness
A security policy and intelligent configuration technology, applied in the field of information security, can solve the problems of further improvement of security policy configuration and defense goals, the impact of security policy configuration correctness on network connectivity service availability, heavy manual operation of policy configuration workload, etc. , to achieve the effect of rapid configuration, timely and efficient response
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] refer to Figure 1 to Figure 5 As shown in the figure, the present invention discloses a method for intelligent configuration of security policies based on target perception. The method for intelligent configuration of security policies includes at least four stages: target perception, policy generation, analysis and detection, and acceptance optimization. The system model is as follows: figure 1As shown, the four stages constitute a dynamic, closed-loop working model, which embodies the characteristics of intelligent response and continuous optimization.
[0031] Preferably, in the target sensing step, the node information, traffic information, topology information and threat information of the target network are acquired through active detection and / or passive monitoring, and the state of the target network is analyzed and sensed. Through comprehensive analysis and perception of the accurate state of the target network, it provides information support for the generati...
Embodiment 2
[0050] On the basis of Example 1, refer to figure 2 As shown, the present invention also discloses an implementation framework for the intelligent configuration method of the security policy. Its core is information detection, target perception and intelligent analysis and processing, which realizes fast and efficient security policy configuration and deployment, reduces the complicated operations of security management and maintenance personnel, and assists them in making security protection decisions.
[0051] The implementation architecture includes a detection layer, a perception layer, a processing layer and a presentation layer.
[0052] The detection layer: perform active and passive network and target detection through data communication interface services, including discovering network nodes through active scanning and detection, monitoring network intercommunication session relationships through traffic collection such as mirroring, and collecting policies for secur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


