Confidential active type strategy linkage method

A proactive and strategic technology, applied in the field of information security, can solve the problems of unreliable security event alarm information, high false alarm rate and false alarm rate, and achieve the effect of ensuring consistency, improving accuracy, and reducing risks

Inactive Publication Date: 2004-12-22
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the false alarm rate and false alarm rate of the current intrusion monitoring system are relatively high,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidential active type strategy linkage method
  • Confidential active type strategy linkage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following examples are provided in conjunction with the content of the method of the present invention:

[0018] The linkage policy engine is arranged on a PC, which can be located anywhere in the network, but must be able to allow the policy manager to access and issue linkage policies through an existing physical network such as a public data network. At the same time, the linkage policy engine must be able to access the LDAP policy library through the existing physical network; the policy manager is deployed at any location on the network, but must be able to access the policy engine through the existing physical network. Construct a Bayesian network of security events according to the user's policy linkage requirements, and develop a security event adapter based on the Bayesian network, and then deploy the security event adapter at the bottom of the linkage policy engine. Develop corresponding conditional adapters and corresponding adapters for different securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a credible active linked tactic method, which belongs to the information security field. It carries on the tactic rule distribution according to the distribution flow through the tactic managing device, the event adapter is used to detect the security event warning information, carries on the credible analysis flow of the warning information to acquire the credence parameter, sends information notice to the static engine, at the same time, waits for the response of the tactic engine, the event adapter transmits the warning event to the tactic rule localizer, the tactic rule localizer searches the event index table, the rule localizer finds out and activates the distributed tactic rules, the tactic engine calls the tactic rule executer to execute the tactic condition matching and tactic response according to the tactic condition, , realizes the link of tactic rules.

Description

technical field [0001] The invention relates to a strategy-based linkage method, in particular to a trusted active linkage strategy method. It belongs to the field of information security. Background technique [0002] At present, most large-scale networks are equipped with various security devices such as firewalls, intrusion detection, virus protection, etc. The development of these security products is developed in the process of people's gradual understanding of network security. Meet the needs of network security at that time. Moreover, when considering security at the beginning, it is generally from a single perspective, such as developing anti-virus products to deal with viruses, rather than considering the entire network system and network security risks, so it is one-sided. According to the "Barrel Theory", this simple heap and linear combination of network security products developed from a single perspective in different periods has some security loopholes in se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/00
Inventor 李建华杨树堂张少俊苏波李可
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products