Method for controlling boundary access control strategy for abnormal behavior discovery, and equipment

An access control strategy and access control technology, applied in the fields of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as equipment reliability and availability impact, and achieve the effect of improving the efficiency of operation and maintenance and auditing

Pending Publication Date: 2021-12-28
BEIJING KEDONG ELECTRIC POWER CONTROL SYST +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the later stage of application, with the gradual implementation of security requirements, the border device access control policy has been accurate to the port level, but there are many new attack methods, such as implanting a Trojan horse and initiating a reverse connection from the server, although the behavior can also be intercepted by the protection device , but there is no separate log for this type of behavior, these red flags are often submerged in a large number of useless logs, which have a huge impact on the reliability and availability of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with embodiment. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0044] A control method for boundary access control strategy oriented to abnormal behavior discovery,

[0045] Obtain access control request data;

[0046] Using the model of partitioning and sorting the access control policy in advance, process the access control request data, determine the partition corresponding to the access control request data, and record the data obtained by the access control according to the corresponding partition control strategy;

[0047] The process of determining the model for pre-partitioning and sorting access control policies includes:

[0048] Obtain border access control policy;

[0049] Divide and sort the boundary access control policies according to the access security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for controlling a boundary access control strategy for abnormal behavior discovery, and equipment. The method comprises the following steps: obtaining access control request data; processing the access control request data by using a pre-determined access control strategy partitioning and sorting model, determining a partition access control strategy corresponding to the access control request data, and recording the access control request data according to the corresponding partition access control strategy, wherein the determination process of the pre-access control strategy partitioning and sorting model comprises the following steps: acquiring a boundary access control strategy; and dividing and sorting the boundary access control strategies according to the access security levels, and determining a partition access strategy corresponding to each partition. The problems of many, coarse and disordered strategies and the like are solved, different types of logs can be recorded for independent strategy matching, the operation and maintenance and auditing efficiency is greatly improved, and meanwhile a good foundation is laid for early discovery and early prevention of abnormal behaviors.

Description

technical field [0001] The invention relates to a control method and equipment for a boundary access control strategy oriented to abnormal behavior discovery, and belongs to the technical field of boundary access control. Background technique [0002] With the deepening of enterprise informatization, network security has become an important prerequisite for ensuring the safe and reliable operation of information systems. Border access control software and hardware devices can control incoming and outgoing traffic according to policies, so as to achieve the purpose of ensuring network security. At this stage, access control policies can be defined in combination with various security requirements to meet the protection needs of different areas. [0003] Boundary access control technology is relatively mature and widely used. Devices from different vendors, different interfaces, and thousands of policies accumulated over time, together with the large number of logs generated,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 汪明金世宇李勃梁野马力任浩
Owner BEIJING KEDONG ELECTRIC POWER CONTROL SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products