Unlock instant, AI-driven research and patent intelligence for your innovation.

Network transmission protocol intrusion detection method and system

A network transmission protocol and intrusion detection technology, applied in the computer field, can solve the problems of increased performance consumption, low matching detection efficiency, waste of system resources, etc., and achieve the effect of reducing data flow, reducing calculation amount, and improving detection efficiency.

Active Publication Date: 2022-04-12
北京中科网威信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Match the two kinds of data in the fast screening layer and the possible matching rules one by one in the fourth layer, and finally determine whether it is a hit, which increases the consumption of performance and wastes system resources , while the inefficiency of matching detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network transmission protocol intrusion detection method and system
  • Network transmission protocol intrusion detection method and system
  • Network transmission protocol intrusion detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052]In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0053] The scanning and matching efficiency of network security products for data streams has always been the focus of network security products. With the substantial increase in network traffic, network security products must continuously improve the specifications of hardware products in order to ensure the detection of security threats as much as possible while ensuring the high-speed opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network transmission protocol intrusion detection method and system. The method comprises the following steps: judging whether to-be-detected communication data is transmitted based on a first network transmission protocol; if yes, performing network transmission protocol intrusion detection on the to-be-detected communication data based on a preset intrusion detection process under the condition that an attachment carried in the to-be-detected communication data is correctly decoded; and if not, performing network transmission protocol intrusion detection on the to-be-detected communication data based on the preset intrusion detection process. The system executes the method. According to the invention, screening is carried out before network transmission protocol intrusion detection is carried out on the communication data, and the data flow entering an intrusion detection process is reduced, so that the operand is reduced, and the detection efficiency of network transmission protocol intrusion detection on the communication data is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a network transmission protocol intrusion detection method and system. Background technique [0002] The mainstream intrusion detection engine detection and matching process based on network transmission protocol communication data in the prior art is as follows: figure 1 shown. When communication data passes through the intrusion detection engine, the following steps will be followed in order to scan and detect: [0003] The first layer: the protocol screening module, which screens the rules extracted from the communication data load based on the protocol, wherein the protocol can specifically include Transmission Control Protocol (Transmission Control Protocol, TCP), User Datagram Protocol (User Datagram Protocol, UDP ), Internet Protocol (Internet Protocol, IP) and Internet Control Message Protocol (Internet Control Message Protocol, ICMP) four protocols. [0004] The sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
Inventor 江海
Owner 北京中科网威信息技术有限公司