Tactics executing point and linking method of it and intrusion detection system

An intrusion detection system and policy execution technology, which is applied in the field of network security to prevent attacks, improve efficiency, and improve overall protection capabilities.

Inactive Publication Date: 2006-11-15
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This linkage method requires the support of network management. In many applications, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tactics executing point and linking method of it and intrusion detection system
  • Tactics executing point and linking method of it and intrusion detection system
  • Tactics executing point and linking method of it and intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0038] Such as figure 2 Shown: The present invention provides a method for linking a policy enforcement point with an intrusion detection system, which includes the following steps:

[0039] Directly establish a linkage connection between the intrusion detection system and the policy enforcement point;

[0040] Maintain communication between the policy enforcement point and the intrusion detection system;

[0041] The intrusion detection system detects attack behavior, and the policy enforcement point responds to the attack processing result.

[0042] Further, the process of establishing a connection between the policy enforcement point and the intrusion detection system includes at least the following steps:

[0043] Step 1: IDS software initiates the establishment of a linkage connection, initiates a linkage connection, and the connection request message carries relevant information of the IDS software;

[0044] Step 2 Check the relevant information at the policy execution poin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention supplies a method of interlocking between strategy execution points and invading testing system. It includes the following steps: building up interlocking connection between invading testing system and strategy executing points; keeping communication between the strategy execution points and the invading testing system; if checking invading action, the strategy execution points would response invading process result. The invention improves the safety and defending ability of the system.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a linkage method of network security equipment, in particular to a policy execution point and its linkage method with an intrusion detection system (Intrude Detection System, IDS for short). Background technique [0002] The policy enforcement point device is used to separate the internal network and the external network, which is of great significance to the security of the network. Due to the limitations of the policy enforcement point itself, such as the coarse granularity of inspection, it is difficult to conduct in-depth analysis and inspection of many protocol details, and the policy enforcement point has the characteristics of preventing external but not internal, it is difficult to detect internal users Therefore, it is necessary for the policy enforcement point to open relevant interfaces, realize linkage with other security software, and build a secure network th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26H04L29/06
CPCH04L63/0227G06F21/55H04L63/1416
Inventor 滕新东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products