Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security server host protection method

An information security and server technology, applied in the field of information security server host protection, can solve problems affecting information security, data packet filtering is not strict, and firewalls are difficult to identify Trojan horses, etc., and achieve the effect of low deployment cost and convenient installation

Pending Publication Date: 2021-10-22
南方电网国际有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the current antivirus software can check and kill most of the Trojan horse viruses, the specially made Trojan horse software often cannot be found by the antivirus software. The outside data packet filtering is not strict, which will make it difficult for the firewall to identify some well-functioning Trojan horses. Trojan horses will establish a network connection between the controlled computer and the control computer to avoid the firewall, and send network traffic to the controlled computer through this connection. After analyzing the data, the Trojan horse completes file transfer, command execution, screen viewing and other operations, which can realize almost all operations that can be completed locally on the computer, seriously affecting information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security server host protection method
  • Information security server host protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Such as Figure 1-2 As shown, a host protection method for an information security server, making a network filter driver based on the network driver interface specification, including network card receiving filtering and sending filtering to the network card;

[0026] Network card reception filtering includes the following steps:

[0027] Step 1, determine whether the format of the data packet is a TCP format, and the non-TCP format packet is directly discarded;

[0028] Step 2, judge again for the TCP format data packet in step 1, and judge whether the receiving port is a set port, and multiple set ports can be set, and the set port is set in the core switch. Set the port to discard directly;

[0029] Send filtering to the NIC consists of the following steps:

[0030] Step 3, judge whether the format of the data packet is a TCP format, and the non-TCP format packet is directly discarded;

[0031] Step 4, judge again for the TCP format data packet in step 3, judge ...

Embodiment 2

[0033] Such as Figure 1-2 As shown, a host protection method for an information security server, making a network filter driver based on the network driver interface specification, including network card receiving filtering and sending filtering to the network card;

[0034] Network card reception filtering includes the following steps:

[0035] Step 1, judge whether the format of the data packet is the UDP format, and the non-UDP format packet is directly discarded;

[0036] Step 2, judge again for the UDP format data packet in step 1, judge whether the receiving port is a set port, if there are multiple set ports, the set port passes through normally, and the non-set port is directly discarded, set the port setting in the core switch.

[0037] Send filtering to the NIC consists of the following steps:

[0038] Step 3, judge whether the format of the data packet is UDP format, and the non-UDP format packet is directly discarded;

[0039] Step 4, judge again for the UDP f...

Embodiment 3

[0041] Such as Figure 1-2 As shown, a host protection method for an information security server, making a network filter driver based on the network driver interface specification, including network card receiving filtering and sending filtering to the network card.

[0042] Network card reception filtering includes the following steps:

[0043] Step 1, judge whether the format of the data packet is the SPX format, and the non-SPX format packet is directly discarded;

[0044] Step 2, judge again for the SPX format data packet in step 1, judge whether the receiving port is a set port, there are multiple set ports, the set port is set in the core switch, the set port passes through normally, and the non-set port The specified port is directly discarded;

[0045] Send filtering to the NIC consists of the following steps:

[0046] Step 3, determine whether the format of the data packet is the SPX format, and the non-SPX format packet is directly discarded;

[0047] Step 4, ju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and particularly relates to an information security server host protection method, which comprises the following steps of: manufacturing a network filter driver based on a network driver interface specification, including network card receiving filtering and sending filtering to a network card. The network card receiving and filtering comprises the following steps: step 1, judging whether the format of a data packet is a set format or not, and directly discarding a packet in a non-set format; and 2, re-judging the data packet with the set format in the step 1, judging whether a receiving port is a set port or not, and if the set port passes normally, directly discarding a non-set port. According to the method, the server can be prevented from actively establishing the network connection outwards by installing the port filter driver on the network server, the network connection sent to the Trojan from the outside can also be prevented, even if a Trojan program runs in the server, the server cannot be remotely controlled, and then the server can be protected.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method for protecting an information security server host. Background technique [0002] A network server is a computer that provides certain network services. It is quite different from a personal computer in terms of use. The server usually does not shut down for 24 hours, and generally no one operates it under normal working conditions. Trojan horses are used by hackers to remotely control For the software tools of computing institutions, because the network server has the characteristics of 24 hours of non-shutdown and usually unmanned operation, the network server is a machine that hackers prefer to control remotely, so it is important to protect the server and prevent the network server from being exploited by hackers Internet security issues. [0003] Although the current antivirus software can check and kill most of the Trojan horse viruses, the speci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/57G06F21/56
Inventor 樊增辉
Owner 南方电网国际有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products