Guard system to defend network invansion of unkown attack trick effectively

A technology for unknown attacks and network intrusions, applied in memory systems, program control design, instruments, etc., can solve problems such as inability to deal with intruders, and achieve the effect of defense against network system attacks, simple configuration, and strong comprehensive defense performance

Inactive Publication Date: 2003-06-04
四川安盟科技有限责任公司
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some general rules for filtering and judging data requests have been formed, it is obvious that this is a very passive approach, because attackers are constantly researching new a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Guard system to defend network invansion of unkown attack trick effectively
  • Guard system to defend network invansion of unkown attack trick effectively
  • Guard system to defend network invansion of unkown attack trick effectively

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] This network intrusion security defense system, according to the intruder's attack steps, sets up multiple checkpoints, and starts to defend the system from the first step of intrusion, including intrusion port scanning detection, camouflage system service, traditional packet filtering firewall, WEB intrusion prevention module, Vulnerability library module, intrusion feature library module, through the organic combination of these functional modules, and simple configuration and installation on the WEB server, it can play a comprehensive system protection role. After installation and operation, it will start to monitor the security status of the system. If any abnormality is found, the attack will be blocked in time, and an email will be sent to notify the system administrator. In the present invention, the creative data check-in and check-out judgment comes from the filter program subsystem of WEB request legitimacy, which is composed of data check-in and data check-out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention has several guard measures to defend network invasion of known and unknown modes. The guard system consists of invasion port scanning, camouflage system service, WEB invasion defending firewall, traditional package filtering firewall and other subsystem. The guard system features its program-filtering subsystem, in which the validity of request from WEB is judged through thedata sorting based on the data hole base and invasion characteristic base. The program-filtering subsystem can be used to filter out invasion of both known and unknown hole attack. These functional modules may be configured and installed to WEB server to protect the system comprehensively.

Description

Technical field: [0001] The present invention relates to a network security protection method, specifically relates to an effective combination of intrusion detection and firewall technology, so as to detect intrusion scanning, camouflage system services, and prevent hacker intrusion. Especially in the detection method of hacker intrusion, the program judgment method of "judging whether the client's request is an intrusion behavior through the process and results" has been created, which can not only effectively prevent intruders from using known attack methods to attack the system , and can prevent intruders from using unknown attack methods to attack the system as a security protection method. Background technique: [0002] In recent years, the development of computer networks has been very rapid, and the number of domestic Internet users has increased rapidly. Up to now, the number of domestic Internet users has reached 20 million, and the types of network services are be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/40
Inventor 王云
Owner 四川安盟科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products