Computer network emergency response safety strategy generating system

A computer network, security policy technology, applied in the field of security policy generation system, can solve the problem of lack of automatic effective response and so on

Inactive Publication Date: 2005-08-17
上海三零卫士信息安全有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current response method can only be limited to local intrusion objects, and lacks an automatic, network-wide, effective response to the real source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network emergency response safety strategy generating system
  • Computer network emergency response safety strategy generating system
  • Computer network emergency response safety strategy generating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0012] The present invention is a security policy generation system for computer network emergency response, which mainly includes a switch 1, a router 2, an Ethernet hub 3, and an external network segment 4, which is different from the prior art in that: the security of the computer network emergency response The policy generation system connects the external network segment with the internal service network segment 5 through switches, routers, and Ethernet hubs, and the internal service network segment is connected with the internal management network segment 6 through switches, wherein the internal service network segment is equipped with an eagle-eye network intrusion The detector 7 and several servers 8, the control center server 9 and the log terminal 10 are set in the internal management network segment, and the early warning processing module is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses one computer emergency responding safety strategy generation system, which is characterized by the following: the module starting and receiving the attack affair information and transferring the pre-set definition information in the database; then comparing the attack affair information with the attack affair in the database to determine responding means assembly A for analysis and filtering; finally the module choosing the responding means with highest integration parameter to make the final responding means.

Description

Technical field: [0001] The invention relates to the technical field of computer network security, in particular to a security strategy generating system for network emergency response to computer network illegal intrusion. Background technique: [0002] Computer security, defined by the International Standardization Committee: for the security protection of data processing systems and adopted technologies and management, to protect computer hardware, software, and data from being damaged, changed, or leaked due to accidental or malicious reasons. With the development of science and technology and the passage of time, the development of "computer security" is divided into three stages: the first stage, computer security (past): generally refers to physical security, system security, and system reliability; the second stage, network security (now): generally refers to multi-computer systems, open system interconnection, communication and data transmission; the third stage, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 张建军李成斌明杨梁群李沁涛熊悦魏忠
Owner 上海三零卫士信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products