Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security monitoring system for monitoring network data based on switch

A network security and network monitoring technology, which is applied in the field of network security monitoring systems based on switches to monitor network data, can solve problems affecting the normal use of large end users, improve vulnerability processing efficiency, improve network security monitoring efficiency, and improve risk scanning. Effectiveness of Efficiency and Vulnerability Identification Efficiency

Pending Publication Date: 2022-07-08
SHENZHEN MTN ELECTRONICS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional network data security monitoring technology, the network equipment part is often used as the carrier for network attack detection and vulnerability detection, so as to discover, identify and deal with network attacks. This kind of network security monitoring method will give the host of the network equipment The operation brings greater pressure, which in turn affects the normal use of large end users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring system for monitoring network data based on switch
  • Network security monitoring system for monitoring network data based on switch
  • Network security monitoring system for monitoring network data based on switch

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0028] like figure 1 The shown network security monitoring system based on switch monitoring network data includes a vulnerability scanning module, a rule database, a processor, and a switch. The vulnerability scanning module, the rule database, and the switch are respectively connected with the processor, and the switch is connected with the vulnerability scanning module. The vulnerability scanning module is used to scan network da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security monitoring system based on switch monitoring network data. The network security monitoring system comprises a vulnerability scanning module, a rule database, a processor and a switch, the vulnerability scanning module is used for scanning the network data according to a preset vulnerability scanning rule to find vulnerabilities; the rule database is used for storing vulnerability scanning data, known vulnerability features and known vulnerability processing rules; the processor is used for providing core operation data and a data interaction support protocol for the vulnerability scanning module, the rule database and the switch; the switch is provided with a port mirroring function and a network data monitoring function. And the data mirroring module is used for performing data mirroring on a request packet sent to the switch port by the network equipment in the network access process and a response packet corresponding to the request packet, and is used for identifying the network equipment connected with the data port of the switch and dynamically monitoring the network flow. According to the invention, the network security monitoring efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security monitoring, in particular to a network security monitoring system based on switch monitoring network data. Background technique [0002] With the rapid development of network technology and attack technology, the security of network data becomes more and more important. The complete network structure is usually composed of operators, servers, switches, routers, and network equipment. The transmission of network data to network equipment It needs to rely on the switch to realize, therefore, the switch plays a major role in the network transmission system. In the traditional network data security monitoring technology, the network equipment part is often used as a carrier to detect network attacks and vulnerabilities, so as to discover, identify and handle network attacks. This network security monitoring method will give the host of the network equipment. Operation brings greater pressure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1416H04L63/0263H04L63/101
Inventor 赖奋洋李伟
Owner SHENZHEN MTN ELECTRONICS