Invasion detecting method
A technology of intrusion detection and intrusion detection system, which is applied in the direction of error detection/correction, instrumentation, digital transmission system, etc., can solve problems such as damage, inability to detect suspicious behavior, and inability to evaluate the damage of protected network or host, and achieve intrusion detection results Accurate, rationality-enhancing effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The invention provides an intrusion detection method combined with network vulnerability scanning, and applies the vulnerability scanning result library to the intrusion detection and analysis process. After an intrusion event is detected, according to the intrusion detection rule base, query the relevant standard vulnerability database to analyze which vulnerability is attacked by the intrusion event, and then retrieve the vulnerability attacked by the event in the vulnerability scanning result database of the network to query whether the network is There is such a loophole to confirm whether the intrusion will be successful.
[0019] In order to facilitate the retrieval of vulnerabilities corresponding to intrusion detection rules in the vulnerability scanning result database, for the standard vulnerability database and the vulnerability scanning result database, internationally recognized vulnerability numbers such as CVE ID or bugtraq ID are used as the vulnerability...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 