Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security protection method and system

A network security and network technology, applied in the field of network security, can solve problems such as poor network security protection effect, inability to configure protection resources, and inability to achieve protection effects, and achieve good protection effects and safe use.

Inactive Publication Date: 2022-04-01
杨磊
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the existing network security technology can be used to protect some attack methods, the existing network security cannot allocate protection resources according to the characteristics of the attack methods as needed, and cannot achieve a good protection effect.
Therefore, there is still the problem of poor network security protection effect through the existing network security technology for security protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and system
  • Network security protection method and system
  • Network security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] Please refer to figure 1 , figure 1 A flow chart of a network security method according to an embodiment of the present application is shown. A network security method is applied to a network protection platform, which includes the following steps:

[0038] S110: Deploy the shadow system to the network protection platform to establish a virtual network;

[0039] Among them, the shadow system is to isolate the Windows operating system while creating a virtual imaging system as the real operating system. After entering the shadow system, all operations are virtual, all viruses and rogue software are unable to infect the real operating system.

[0040] Specifically, a virtual network that deploys shadow systems to a network protection platform can effectively protect the use of real operating systems.

[0041] S120: Safety partitions for virtual networks in accordance with the preset partition method to get multiple partitions;

[0042] Specifically, on the basis of the virtua...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security protection method and system, and relates to the technical field of network security. The method comprises the following steps: deploying a shadow system to a network protection platform, and establishing a virtual network; and performing secure partitioning on the virtual network according to a preset partitioning method to obtain a plurality of partitions. And detecting the network state of each partition in real time, and if any partition has data exception, obtaining the exceptional data of the partition and the corresponding network flow. And generating a virtual honeypot based on the abnormal data and the corresponding partition, and introducing the corresponding network traffic into the virtual honeypot to obtain an attack behavior. And inputting the attack behaviors into the attack behavior analysis models matched with the corresponding partitions to obtain attack characteristics. And determining a corresponding security defense strategy according to the attack characteristics. Therefore, the security defense strategy is determined according to the attack characteristics of different partition attack behaviors, so that the security defense strategy is more adaptive to the attack behaviors, the protection resources are configured as required according to different attack characteristics, and a better protection effect is achieved.

Description

Technical field [0001] The present invention relates to the field of network security, and in particular, relating to a network security method and system. Background technique [0002] With the expansion and popularity of network technology, the network has become a need for people to learn, education, work, and life, and gradually become a necessity of people's lives, and people's dependence is increasing. The development of network technology has become increasingly highlighted. People's demand for information security is also getting higher and higher, so the development of network security technology has been widely concerned. [0003] Although some of the existing network security technologies can be protected for some attack methods, existing network security cannot be configured to configure protective resources according to the characteristics of the attack means, and there is no better protection. Therefore, safety protection is carried out through existing network secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
Inventor 杨磊李福强
Owner 杨磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products