Distributed hacker tracking system in controllable computer network

A computer network and tracking system technology, applied in the field of hacker tracking system, can solve the problems of difficult to provide tracking of the real source of hackers, application difficulties, large errors, etc., and achieve the effect of good scalability

Inactive Publication Date: 2003-06-04
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it still needs to save the sequence number information of all TCP connections, and it can only be compared centrally, which is difficult in large-scale network applications; at the same time, if the network transmission time fluctuates greatly, the error generated by this method will also follow. increases; for connections with shorter durations, the resulting error is also larger
[0071] However, most of the existing intrusion detection systems focus on the discovery and prevention of attacks. Although most network-based attacks can be detected, it is difficult to trace the real source of hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed hacker tracking system in controllable computer network
  • Distributed hacker tracking system in controllable computer network
  • Distributed hacker tracking system in controllable computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0131] Hereinafter, we will further illustrate the present invention through embodiments in conjunction with the accompanying drawings.

[0132] A complete hacker tracking system consists of two parts: hacker identification and hacker tracking. We use intrusion detection technology to complete hacker identification, and complete hacker tracking based on intrusion detection alarm information and data fingerprints. The hacker tracking system model we built is like Figure 5 Shown.

[0133] in Figure 5 Among them, the hacker is attacker 11, the target host being attacked is attacked 13, gateway 1 (Gateway1) 56, gateway 2 (Gateway 2) 57...Gateway n-1 (Gateway (n-1) 58. Network monitor 1(NM1)52, network monitor 2(NM2)53,...Network monitor n(NMn)54, distributed on the network path from the attacker to the attacked. The network monitor completes the monitoring of network packets And analysis, if an attack is found, it sends an alarm message to the manager manager. The manager completes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is one distributed hacker tracking system in controllable computer network based on network invasion detection and data fingerprint technology. Inside one enclosed and controllable network system, network monitors are set in all shared network sections to send the invasion alarm information to the managing device. In case that some monitor finds invasion, the managing device will check corresponding record to back track the message path and to determine the network section the hacker is in or to determine the initial source. The system has excellent expandability and real-time property and is suitable for large hetero network.

Description

Technical field [0001] The present invention relates to distributed processing of computer information network security, in particular to a hacker tracking system of a controllable computer network. Background technique [0002] Computers and the Internet have become one of the most important information infrastructure in a country. Protecting the security of these facilities from hostile countries, computer hackers, and other computer criminals is a necessary condition for protecting the sovereignty, integrity and information security of the country, and ensuring the normal operation of government, finance, commerce, technology and other industries and departments. . [0003] If you can obtain the real address of the hacker, record the relevant evidence, and bring it to law, you can effectively deter cyber crimes and computer crimes, and maintain the security of networks and computer systems. Although hacker tracing has important security significanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44H04L9/00H04L12/18H04L12/24
Inventor 谷大武李小勇陆海宁
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products