Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host network configuration auditing method, system and device

A network configuration and host network technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as original information errors, uneven end-user computer levels, and network disconnection, and achieve effective auditing effects

Pending Publication Date: 2021-09-03
西安交大捷普网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network configuration information usually includes computer name, IP address, subnet mask, gateway, DNS (Domain Name System), WINS (Windows Internet Naming Server), etc. The centralized and unified management of IP addresses and related network configurations is to ensure the normal operation of computer networks. For the basic work of operation, for large-scale networks, the computer level of end users is uneven, and the network configuration information of terminal computers is often modified at will. These behaviors of modifying terminal configuration without permission will cause IP conflicts, network disconnection, and fraudulent use of IP. Serious consequences such as illegal operation
When the network configuration information of a terminal computer changes (such as modifying the IP address, reinstalling the operating system), the server will define it as a new terminal computer, resulting in errors in the original information and failure to execute policies or tasks. Will form a lot of invalid terminal computer network configuration information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the embodiments and the accompanying drawings.

[0023] From a technical point of view, the existing host monitoring and auditing system implements computer security protection mainly by installing proxy client software on the computer system, and the proxy client executes security policies to achieve the purpose of protection.

[0024] Specifically, the entire platform system consists of three parts: proxy client, server and management. The main functions of each part are as follows:

[0025] Agent client, the agent software installed on the controlled computer. Receive and execute the security policy delivered from the server, and return the corresponding execution result. For example, to monitor the user's behavior on the host computer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host network configuration auditing method, system and device. On one hand, whether current network configuration changes or not is rapidly judged by monitoring change of a network configuration file; and on the other hand, in order to prevent file monitoring failure caused by invariable configuration files when configuration information is modified by using an ifconfig command, whether the configuration information is changed or not is judged periodically by actively acquiring the configuration information, and corresponding logs are generated for changed configuration items, so that effective audit on host network configuration is realized.

Description

technical field [0001] The invention belongs to the technical field of computer and network security, and in particular relates to a method, system and device for auditing network configuration changes of a host. Background technique [0002] Due to the widespread use of network services and applications, computers are used more and more in different network environments at different locations. In network management, the network configuration of terminal computers is an important part of daily management, and it is also a cumbersome thing. Network configuration information usually includes computer name, IP address, subnet mask, gateway, DNS (Domain Name System), WINS (Windows Internet Naming Server), etc. The centralized and unified management of IP addresses and related network configurations is to ensure the normal operation of computer networks. For the basic work of operation, for large-scale networks, the computer level of end users is uneven, and the network configur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/08
CPCH04L41/0813H04L41/069H04L67/30
Inventor 何建锋刘江南李长江
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products