Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for compiling network security audit strategy

A network security and editing system technology, applied in the field of computer network security, can solve the problems of poor policy reusability, difficult integration of other systems, and single operation mode of policy definition, and achieves easy deployment, simplified formulation process, and convenient policy. The effect of transmission

Inactive Publication Date: 2010-02-17
BEIJING VENUS INFORMATION TECH +1
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The policy definition operation mode implemented in this way is single. If the policy information is large, it usually takes a long time, and there are many similar operations;
[0005] 2. Due to the lack of a manageable model, it is difficult to integrate with other systems;
[0006] 3. Policy reusability is not good, even if the content to be audited has great similarity, a policy defined on a deployment cannot be reused on another deployment similar to it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for compiling network security audit strategy
  • Method and system for compiling network security audit strategy
  • Method and system for compiling network security audit strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Embodiment 1: We describe the entire implementation process of a policy editing method for network security auditing according to the present invention in combination with specific embodiments. Such as image 3 A flow chart of a network security audit policy editing method shown, which includes the following steps:

[0027] Step 1 defines data information such as protection host, protection service, role and access rules according to the logical relationship of "role accessing host's service to perform specific operations", and saves it in the database as an audit object; the "role accessing host's service The logical relationship of performing specific operations" is reflected in which service objects are included in the host object, which specifically indicates what services the host provides, or which services of the host need to be audited. The role that needs to access the service is defined under the service object, and the access operation of the role is defined...

Embodiment 2

[0043] Embodiment 2: Below in conjunction with concrete data, embodiment 1 is described further.

[0044] First of all, suppose we have a business host, which mainly provides telnet service, and now we need to audit the operation behavior of users accessing the business host. Audit rules can be defined in this way. First, define the host object. We name the host object Server101; ID is the unique identifier of the host object, and the value is 001; the IP address of the host object is 192.168.30.101; The value is 1; of course, the service object can also be defined as a subnet.

[0045] Then define the service, here the service is defined as Telnet; there is also an ID, the value is 001; the service also has a port number, the port number of the telnet protocol is 23.

[0046]Next, define the role Role, which mainly determines the action of the audit engine after the operation rules are matched. Here we define the alarm mode as: 1 means alarm; log level: 1, means intermediate...

Embodiment 3

[0062] Example 3: figure 1 It is a flowchart of a policy editing method for a network security audit according to the present invention, as shown in the figure, according to an embodiment of the present invention, firstly define the audit object information such as the protection host; then use XML as a medium to write the audit object into XML file to realize the export operation; and then write the XML file into the memory database to realize the import operation. In this embodiment, the XML exists in the form of a complete policy, which is convenient for storage and network transmission.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a role-based access network security audit strategy compiling control method and a system thereof. The invention adopts a technical scheme of: using an XML file as a medium, keeping the role-based access network audit system strategy information, and realizing the operations of exporting, importing, copying, pasting and the like the audit strategy. The method has the advantages of simplifying strategy generating process, conveniently transferring the strategy and facilitating the distributed type management.

Description

technical field [0001] The invention relates to a role-based access control (Role Based Access Control: RBAC) network security audit policy editing method and system, belonging to the field of computer network security. Background technique [0002] The network security audit system based on role access control analyzes the protocol of the data packets transmitted in the network, and then audits the user's operation behavior according to the pre-defined strategy. Usually, network security products support a variety of application layer protocols, and business users can access related services through computer networks and perform fine-grained auditing; and fine-grained auditing services are a must for enterprises to achieve business security. A core functional unit of the network security audit system based on role access control is the formulation of audit policies. In the formulation of audit policies, in addition to fully reflecting the attributes of the audit objects the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 李一博赵振东
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products