Unlock instant, AI-driven research and patent intelligence for your innovation.

White list-based network security protection method

A network security and whitelist technology, applied in the field of network security, to achieve the effect of improving detection accuracy, improving implementation flexibility, and ensuring reliability

Pending Publication Date: 2021-11-30
SHENZHEN POWER SUPPLY BUREAU
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this type of blacklist-based malicious code prevention and control technology is essentially a passive detection and killing method. It needs to update the virus database in real time and continuously obtain the characteristics of malicious code. High fields (such as power monitoring systems and industrial control systems, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White list-based network security protection method
  • White list-based network security protection method
  • White list-based network security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following descriptions of various embodiments refer to the accompanying drawings to illustrate specific embodiments in which the present invention can be implemented.

[0030] The whitelist-based network security protection method in the embodiment of the present invention can be used in a system with multiple clients and servers to provide network security protection for data transmission between the client and the server. The plurality of clients can perform two-way data packet transmission with the server. The server includes a data packet processing module and a client management module, wherein the data packet processing module is used to analyze and process the data packets sent by multiple clients, and return the processing result data packet to it; the client management module is used for real-time update And the IP address and port number of the management client and server.

[0031] Such as figure 1 As shown, the whitelist-based network security protecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a white list-based network security protection method. The network security protection method comprises the following steps: firstly, acquiring a data packet sent from a client to a server, and carrying out IP address and port number analysis on the data packet to obtain an IP address and port number combination vector of the data packet; and then, detecting whether the obtained combination vector of the IP address and the port number accords with white list rule information or not, so as to determine whether the client is allowed to communicate with the server or not. According to the invention, network security protection is carried out based on the white list to ensure the operation security of the server, and the reliability, stability and service continuity of the system can be effectively ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a whitelist-based network security protection method. Background technique [0002] With the rapid development of information technology today, computer networks have been widely used. However, with the rapid growth of information transmission in the network, the data in the network is also vulnerable to various attacks and damages. For example, network information is eavesdropped, database Being tampered with or deleted, user identities stolen or forged, computers attacked by viruses, etc., all of which have seriously threatened the security of data and the interests of users themselves. [0003] Common network security protections are mostly implemented based on antivirus software or antivirus gateways, etc. This type of technology can be summarized as blacklist-based network security protection technology, which uses the characteristics or behavior of suspicious code ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1491H04L63/0236
Inventor 车向北李曼康文倩欧阳宇宏林子钊叶睿显
Owner SHENZHEN POWER SUPPLY BUREAU