Unlock instant, AI-driven research and patent intelligence for your innovation.

Network violation operation identification system, method and device

A technology for identifying systems and networks, applied in the field of network violation operation identification systems, and can solve problems such as failure to identify devices

Pending Publication Date: 2022-07-22
CHINA SOUTHERN POWER GRID COMPANY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, network mirroring traffic analysis technology can often only obtain limited information on illegal outreach or cross-region interconnection devices, and cannot identify specific devices that violate regulations in outreach or cross-region interconnection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network violation operation identification system, method and device
  • Network violation operation identification system, method and device
  • Network violation operation identification system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0054] It should be noted that the term "first\second" involved in the embodiments of the present invention is only to distinguish similar objects, and does not represent a specific ordering of objects. It is understandable that "first\second" may be used when permitted The specific order or sequence may be interchanged below. It should be understood that the "first\second" distinctions may be interchanged under appropriate circumstances to enable the embodiments of the invention described herein to be practiced in sequences other than those illustrated or described he...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network violation operation identification system, method and device. The system comprises a detection end and an analysis end. The detection end is used for acquiring a detection message and sending the detection message to the to-be-identified equipment, a source IP address of the detection message is an end IP address of the analysis end, and the analysis end IP address is used for indicating the to-be-identified equipment to send a feedback message corresponding to the detection message to the analysis end; the analysis end is used for judging the to-be-identified equipment as violation equipment when receiving the feedback message and obtaining the violation equipment IP address of the violation equipment according to the feedback message, the violation equipment is to-be-identified equipment with preset network boundary security violation operation, and the preset network security violation operation comprises a violation external connection behavior and a cross-regional interconnection behavior. By adopting the system, specific equipment of illegal external connection or cross-regional interconnection can be accurately identified.

Description

technical field [0001] The present application relates to the technical field of network border security, and in particular, to a system, method and device for identifying a network violation operation. Background technique [0002] With the development of network border security technology, network violation outreach or cross-regional interconnection detection technology has emerged. Currently, the common illegal outreach or cross-regional interconnection detection technology is to detect illegal outreach or cross-regional interconnection through network mirror traffic analysis and monitoring. Behavior. [0003] The traditional solution of network mirroring traffic analysis technology is to discover illegal outreach or cross-region interconnection behaviors through the relevant feature information of illegal outreach or cross-region interconnection in network mirroring traffic. However, the network mirroring traffic analysis technology can only obtain limited information o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L43/12H04L67/1095H04L69/22H04L9/40
CPCH04L43/12H04L67/1095H04L69/22H04L63/0209H04L63/0227
Inventor 陶文伟吴金宇胡荣苏扬庞晓健曾初阳
Owner CHINA SOUTHERN POWER GRID COMPANY