Intrusion defence system having active defence capability and method thereof

An intrusion prevention system and active defense technology, applied in the field of information security, can solve the problems of untimely update, timely accuracy, and speed limit of intrusion outbreak

Inactive Publication Date: 2010-08-18
BEIJING VENUS INFORMATION TECH +1
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can partially solve the problem of untimely update of passive defense features, it will be li

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion defence system having active defence capability and method thereof
  • Intrusion defence system having active defence capability and method thereof
  • Intrusion defence system having active defence capability and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[0033] For a new attack method or technology that cannot be identified by the intrusion detection device, it is called an unknown attack. To effectively prevent unknown attacks, the current defense method must be changed from passive to active. The existing "passive" feature matching methods, or "active" push upgrade services, mainly rely on security vendors to provide security services, which are bound to be affected by security vendors' own security capabilities, geographical location, upgrade frequency and other factors. limit. Moreover, the update rate of the current attack methods generally exceeds the update frequency of the signature database, so the current t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion defense system having an active defense capability and a method thereof to actively defend security threats in a network. The method comprises the following steps: after receiving a data stream, setting a processing operation for an event in the data stream; setting an initial defense level for an event set consisting of multiple events based on the current network condition and the defense level requirements; matching the event in the event set based on the initial defense level, and obtaining a dynamic identification result with respect to network security situation based on a network flow and a matching result; determining the current defense level of the event set based on the initial defense level and the dynamic identification result; determiningthe current defense level of the event set based on the dynamic identification result; and automatically adjusting the processing operation of each event in the event set based on the current defenselevel, and responding to each event. The defense level can be automatically adjusted so as to actively prevent the further generation of attacks by using the various implementation manners of the invention.

Description

technical field [0001] The invention relates to the field of information security, in particular to an intrusion prevention system and method with active defense capability. Background technique [0002] Since the introduction of firewalls in the network, network security solutions have been finalized as firewall-based solutions. This type of firewall solution is characterized by dividing the network into network segments with different security levels, and placing firewalls at the boundaries of network segments for network segment isolation and access control. This traditional intrusion detection system product can only detect malicious and illegal network traffic and process it. In fact, it matches according to the preset signature library. [0003] Various worms, viruses, and application-layer attack technologies are combined with email and mobile codes to form a compound attack method, making threats more dangerous and difficult to resist. Most of these threats can pen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56
Inventor 于振波
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products