Unlock instant, AI-driven research and patent intelligence for your innovation.

Method to realize monitoring connection states of closed network by using a computer on intranet

A network connection state, computer technology, applied in a variety of digital computer combinations, data exchange networks, hardware monitoring, etc., can solve the problems of complex deployment and maintenance, inability to set up, poor technical compatibility, etc., and achieve easy deployment and maintenance. Maintainable, easily scalable effects

Inactive Publication Date: 2007-08-15
GUOCHUANG HIGHTEC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is relatively easy to implement, there are several main problems in this method: 1. It is complicated to deploy and maintain on multiple computers, and it is easy to cause employees to resist monitoring software; 2. It is difficult to adapt to diversified network access methods; 3. It can only detect three connection states: dial-up / non-dial-up / disconnection, and it is difficult to analyze other external connection states; 4. Need to purchase more licenses, which requires a large investment
This method has several main problems as follows because the detection packet sent is an IP spoofing packet (Fake IP Packet), and the technical compatibility is poor: 1. It is required that the internal network firewall and the gateway cannot be set to block the IP spoofing packet, thereby seriously affecting the internal network. 2. Some Internet service providers have adopted IP spoofing packet blocking technology in firewalls and gateways, which will cause the above-mentioned spoofing packets to fail to pass through, resulting in false positives; 3. When a typical Microsoft Windows operating system dials up, if Setting sharing will also cause the above-mentioned spoofing packets to fail to pass through, resulting in false positives; 4, because the extranet server that is set on the Internet cannot receive network data packets from other closed private networks, it cannot detect that it is connected to a private network (such as a spy network) ), resulting in missed reports; 5. It can only monitor whether it is illegally outreached, but it is difficult to analyze other states, and it is impossible to detect the situation that the monitoring target machine unplugs the network cable and then connects out, resulting in missed reports
However, monitoring method 3 requires computers to be able to access the Internet, and cannot be used in application environments that require strict physical isolation of internal and external networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method to realize monitoring connection states of closed network by using a computer on intranet
  • Method to realize monitoring connection states of closed network by using a computer on intranet
  • Method to realize monitoring connection states of closed network by using a computer on intranet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Please refer to FIG. 4 , the system structure of the method for monitoring the connection state of a closed network using an intranet computer in the present invention is shown in FIG. 4 . Determine a computer as the monitoring computer, connect it to the intranet switch, and connect a router to the intranet switch; configure the settings on the intranet switch so that the monitoring computer can directly communicate with all monitoring target machines normally; Set up on the router so that the monitoring computer can communicate normally with all monitoring target machines through the router; the monitoring computer implements real-time monitoring of each monitoring target machine. The difference with the structure of the existing monitoring method is that there is no need to install any additional software in each monitoring target computer, but only need to set up a monitoring computer connected to the intranet switch to realize the monitoring of each monitoring targe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for monitoring closed network connection state with an internet work computer, utilizing at internet-work computer as a monitor connected into an internetwork exchanger with a router connected. The monitor computer sends detection packet to other internetwork computers to make judgement the computer's network connection state according to the returned result, suitable for the environments with strictly isolated inner and outer network and strict multilayer protected internetwork, realizing overall and quick monitor to the network state of internetwork finidng out behaviors of connecting to internet and special network by variou s methods.

Description

technical field [0001] The invention relates to a computer application technology, in particular to a method for monitoring the connection state of a closed network by utilizing an intranet computer. Background technique [0002] Perimeter security is one of the elements of network security. In computer system applications, border security technologies represented by firewalls are often used to construct security boundaries at the connection between the intranet and the Internet to form a relatively closed security domain. With the deepening of social informatization, there are more and more wired and wireless Internet access methods, and the access methods are becoming more and more flexible. Internal employees can easily connect to the Internet and overcome the security barriers of the firewall, thereby breaking the The closed nature of the security domain poses a great threat to the security of the intranet. Therefore, it is extremely important to monitor and analyze th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F15/16H04L12/26
Inventor 金波周晴杰应华吴咏炜
Owner GUOCHUANG HIGHTEC