Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Illegal external connection detection method, device and system and electronic equipment

A technology of outreach detection and detection equipment, which is applied in the field of network information security, can solve the problems that the comprehensiveness and real-time performance of terminal violation outreach detection cannot be guaranteed, so as to ensure comprehensiveness and real-time performance, reduce the number of interactions, and reduce the detection pressure Effect

Pending Publication Date: 2022-06-07
BEIJING VRV SOFTWARE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method, device, system and electronic equipment for detecting illegal outreach, which are used to solve the defect that the detection method for illegal outreach in the prior art cannot guarantee the comprehensiveness and real-time performance of terminal illegal outreach detection, and realize more comprehensive, More real-time detection of terminal violations and outreach

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal external connection detection method, device and system and electronic equipment
  • Illegal external connection detection method, device and system and electronic equipment
  • Illegal external connection detection method, device and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0046] Combine below Figure 1-Figure 7 The method, device, system, and electronic device for detecting illegal outreach provided by the present invention are described.

[0047] figure 1 The method for detecting illegal outreach provided by an embodiment of the present invention is shown, applied to a detection device, including:

[0048] Step 101: Obtain the target URL request in the network to be detected.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an illegal external connection detection method, apparatus and system, and an electronic device. The method comprises the steps of obtaining a target URL request in a to-be-detected network; taking an initiating terminal of the target URL request as a tested terminal, and sending first packet return response data to the tested terminal; receiving a resource traversal request initiated by the tested terminal, and sending second packet return response data to the tested terminal; and the tested terminal is used for executing an illegal external connection detection task according to the first return packet response data. The first return packet response data is sent to the tested terminal, the second return packet response data is sent to the tested terminal according to the resource traversal request initiated by the tested terminal, and after the tested terminal caches the first return packet response data and executes the second return packet response data, illegal external connection detection can be carried out by directly utilizing the cached data when a target URL is accessed. The detection pressure of the detection equipment is reduced, and the comprehensiveness and real-time performance of illegal external connection detection are ensured.

Description

technical field [0001] The invention relates to the technical field of network information security, and in particular, to a method, device, system and electronic equipment for detecting violations of external links. Background technique [0002] For a network environment with strict requirements for information and data security and confidentiality, in order to avoid the existence of unsafe communication paths caused by the simultaneous connection of terminals to internal and external networks, and to ensure the security of network information in the area, it is generally required to isolate specific internal networks from external networks. Communication is not allowed. [0003] In order to detect whether such illegal outreach behavior exists, in the prior art, real-time traffic mirroring is often performed by bypassing, and the HTTP requests in the terminal traffic within the monitoring range are hijacked in real time by the middleman, so that the tested terminal can acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/02H04L67/568H04L43/08
CPCH04L63/1425H04L67/02H04L43/08
Inventor 林皓袁杨洋杨华杨泳牟永鹏于世刚
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products