Computer network emergency response safety strategy generating system

A computer network, security policy technology, applied in the field of security policy generation system, can solve the problem of lack of automatic effective response and so on

Inactive Publication Date: 2009-07-29
上海三零卫士信息安全有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current response method can only be limited to local intrusion objects, and lacks an automatic, network-wide, effective response to the real source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network emergency response safety strategy generating system
  • Computer network emergency response safety strategy generating system
  • Computer network emergency response safety strategy generating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0012] The present invention is a security policy generation system for computer network emergency response, which mainly includes a switch 1, a router 2, an Ethernet hub 3, and an external network segment 4, which is different from the prior art in that: the security of the computer network emergency response The policy generation system connects the external network segment with the internal service network segment 5 through switches, routers, and Ethernet hubs, and the internal service network segment is connected with the internal management network segment 6 through switches, wherein the internal service network segment is equipped with an eagle-eye network intrusion The detector 7 and several servers 8, the control center server 9 and the log terminal 10 are set in the internal management network segment, and the early warning processing module is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security policy generation system for computer network emergency response, which is characterized in that: the security policy generation module starts and receives the attack event information, and the security policy generation module calls the preset definition information of the attack event in the database, and then Comparing the attack event information with the preset definition information of the attack event in the database, the security policy generation module will determine the corresponding response mode set A, and then the security policy generation module will perform policy analysis and screening on the determined corresponding response mode set A. After analysis and screening, a subset of response methods is obtained. Finally, the security policy generation module selects the response method with the highest comprehensive coefficient as the final response method according to the policy control principle. This system is a network that responds quickly, troubleshoots quickly, and recovers effectively. Emergency troubleshooting system.

Description

Technical field: [0001] The invention relates to the technical field of computer network security, in particular to a security strategy generation system for network emergency response to computer network illegal intrusion. Background technique: [0002] Computer security, defined by the International Standardization Committee: for the security protection of data processing systems and adopted technologies and management, to protect computer hardware, software, and data from being damaged, changed, or leaked due to accidental or malicious reasons. With the development of science and technology and the passage of time, the development of "computer security" is divided into three stages: the first stage, computer security (past): generally refers to physical security, system security, and system reliability; the second stage, network security (now): generally refers to multi-computer systems, open system interconnection, communication and data transmission; the third stage, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
Inventor 张建军李成斌明杨梁群李沁涛熊悦魏忠
Owner 上海三零卫士信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products