Industrial host terminal security protection system

A terminal security and protection system technology, applied in the field of network security, can solve the problems that terminal security cannot be guaranteed, anti-virus software cannot detect and defend against APT, etc., and achieve the effect of improving terminal security management capabilities and resource overhead protection

Pending Publication Date: 2022-01-07
CHINA ELECTRONICS CORP 6TH RES INST
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the embodiment of the present invention provides an industrial host terminal security protection system to solve the problem that traditional antivirus software cannot discover and defend against APT, and terminal security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial host terminal security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Such as figure 1 As shown, this embodiment proposes an industrial host terminal security protection system, which is a set of three-dimensional terminal security protection solutions, suitable for terminal systems such as servers, terminal PCs, and virtualization hosts. The system uses C / S and The B / S combination mode provides customers with terminal threat detection, response, traceability and other services.

[0028] The system includes a client and a server. The client and the server adopt a C / S architecture. By installing a lightweight Agent program in the terminal operating system, the full amount of kernel-level fine-grained behavior data is obtained in real time and reported. The above server management adopts B / S architecture to realize threat analysis and system management, adopts distributed deployment mode and big data storage to meet high expansion, high availability and high concurrency, and provides data sources for threat analysis and traceability.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an industrial host terminal security protection system. The system integrates the core functions of behavior monitoring, virus searching and killing, remote investigation and evidence obtaining, linkage defense, risk situation display and the like. The advanced technologies of behavior recognition, multi-engine sample identification, neural network, trapping, immunization and the like are adopted, real-time detection and disposal of known and unknown threats are achieved, and the threats which cannot be effectively defended by traditional security products, such as ransomware, mining, killing-free escape, file-free attack and the like, are effectively solved. By acquiring full kernel-level particle size behavior data in real time through a lightweight terminal Agent program to continuously monitor a terminal system, and screening out an event which is beneficial for a customer to carry out threat tracing from the event and storing the event, rapid analysis and response (including determination of a zero damaged terminal, an attack range and the like) of the threat event are realized, the maximum protection is obtained with the minimum resource overhead, and the terminal security management capability of the client is comprehensively improved.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of network security, in particular to an industrial host terminal security protection system. Background technique [0002] The network has become an incubator for contemporary economic prosperity, technological progress, and social awareness by breaking the boundaries of time and space and changing social networks and economic driving methods. It has also caused the current society to be unable to stop relying on the network, and the seriousness of network security issues has gradually become prominent. The proliferation of viruses, system loopholes, hacker attacks and many other problems have directly affected network security. Network security is the foundation of national security, without network security there is no national security! [0003] Border protection equipment provides security protection at each entrance of the network, but for threats from internal sources such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56G06N20/00
CPCG06F21/554G06F21/56G06F21/552G06F21/568G06N20/00
Inventor 王绍杰霍朝宾贺敏超衣然杨继王晔周帅万佳蓉
Owner CHINA ELECTRONICS CORP 6TH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products