Network intrusion character configuration method and system

A network intrusion and configuration method technology, applied in the field of network security, can solve problems such as service termination, difficulty in obtaining upgrade packages, and difficulty in user acceptance

Inactive Publication Date: 2012-07-04
BEIJING LEADSEC TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two hidden dangers in this system: 1) In a large-scale network or complex software system environment, the installation of an upgrade package will lead to service termination, which is generally difficult for users to accept; 2) Similar to dynamic WEB websites, OA systems, and user business system software, They are codes developed by users themselves or commissioned to customize. Unlike commonly used software such as office, even if very dangerous security holes (such as SQL injection) are scanned, it is difficult to obtain upgrade packages within a time acceptable to customers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion character configuration method and system
  • Network intrusion character configuration method and system
  • Network intrusion character configuration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The embodiments of the present invention provide a network intrusion feature configuration method and system, which are used to provide IPS product users with a network intrusion feature configuration set that best matches the actual environment, so as to specifically block illegal attacks on system vulnerabilities.

[0042] In order to facilitate the understanding of those skilled in the art, the best embodiment of the present invention will be described in detail below with reference to the accompanying drawings.

[0043] See figure 1 This figure is a flowchart of the first embodiment of the network intrusion feature configuration method according to the present invention.

[0044] The network intrusion feature configuration method according to the first embodiment of the present invention includes the following steps:

[0045] S100. Set the configuration mode of "vulnerability-related features" and the configuration mode of "non-vulnerability-related features" respectively.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion character configuration method, which comprises the following steps of: 1) respectively setting a configuration mode for flaw related characteristics and a configuration mode for non flaw related characteristics; 2) establishing a flaw-characteristic correspondence association list, wherein the correspondence association list comprises two fields, namely a flaw name field and an attack characteristic identifier field; 3) scanning a user system to acquire a network security flaw list; 4) searching related characteristics of the network security flaw list of 3) according to the flaw-characteristic correspondence association list established by 2), wherein the flaw related characteristics found in the network security flaw list are called by a joint name, namely the flaw related characteristics, and the characteristics which are not found are called non flaw related characteristics; and 5) setting the configuration modes for the flaw related characteristics found by 4) and the non flaw related characteristics according to the configuration modes set by 1) so as to form an IPS characteristic set configuration example.

Description

Technical field [0001] The invention relates to the field of network security, in particular to a method and system for configuring network intrusion characteristics. Background technique [0002] Cyber ​​attackers can exploit the loopholes in computer software or hardware systems to achieve the purpose of breaking or gaining illegal benefits. For example, using someone else’s computer as a springboard to steal files from other computers, causing someone else’s computer to crash, formatting the disk, monitoring other people’s computers or peeping at others’ privacy, remotely controlling other people’s computers, hacking characteristic website servers to replace the website’s homepage, Downloading the user database causes business losses, attacking the website server to make it inaccessible to users, etc. Network attack technology has been gradually mastered and developed by more and more people, and more and more "dumb" network attack software has been developed and published, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 高鹏
Owner BEIJING LEADSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products