Access multiplexer with remote intrusion detection capability
An access multiplexer, intrusion detection technology, applied in the direction of instruments, transmission systems, telephone communications, etc., can solve the problems of consuming host CPU power and memory resources, difficult to manage and upgrade, unable to detect multiple operating system abnormalities, etc. To achieve the effect of saving CPU power and memory resources, easy to manage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In the prior art network shown in Figure 1, hosts H1, H2, H3, and H4 and a first centralized host-based intrusion detection system CHIDS1 form part of a first network segment NS1; similarly, hosts H5, H6, H7 Together with H8 and the second centralized host-based intrusion detection system CHIDS2 form part of the second network segment NS2. Both the network segment NS1 and the network segment NS2 are connected to the public network ("network" in Figure 1) through the network-based intrusion detection system NIDS.
[0020] For example, both the first network segment NS1 and the second network segment NS2 are the company's LAN (Local Area Network), wherein hosts H1, H2, H3, H4, H5, H6, H7 and H8 represent personal computers, such as desktop computers or laptops. desktop computer. The first centralized host-based intrusion detection system CHIDS1 and the second centralized host-based intrusion detection system CHIDS2 are application software, such as Unipalm's Symantec (Sy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 