Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application level intrusion tolerance system and method

An application system and level-capacity technology, applied in the field of information security, can solve problems such as huge data structure, inability to cover attack modes and attack methods, illegal use, etc.

Active Publication Date: 2013-05-22
CHINA ELECTRIC POWER RES INST +2
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Attacks against the application layer are often complex, usually with a huge data structure, a large number of data packets, various modes, and staged processing.
For such attack events, the use of feature-based identification and defense methods requires maintaining an extremely large feature library and performing contextual correlation analysis, but often cannot cover all attack modes and emerging attack methods, which eventually leads to network attacks. The system is affected, making it unavailable, data tampered with or illegally used, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application level intrusion tolerance system and method
  • Application level intrusion tolerance system and method
  • Application level intrusion tolerance system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] like figure 1 As shown, an application-level intrusion-tolerant system includes: a boundary judgment unit, an application unit, and an application system module connected in sequence.

[0039] The boundary judging unit is used for analyzing and allocating external access and responding to intrusion events.

[0040] The application unit includes: a virtual application module, and a virtual application manager that performs data interaction with each virtual application module.

[0041] The boundary judging unit includes: a data collector, an event generator, an event database, an access distribution module, an event analyzer module and an event processing unit; the data collector, the event generator, the event database and the The event processing unit communicates in turn; the event generator sends data to the access allocation module.

[0042] The data collector collects data of the external access process, the collected data includes network data packets, access ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides application level intrusion tolerance system and method. The application level intrusion tolerance system comprises a boundary judging unit, an application unit and an application system module which are sequentially connected. The application level intrusion tolerance method includes steps of (1) access distribution and analysis; (2) application system virtualization; and (3) convergence and backspacing of application behaviors. By virtualizing the application into multiple virtual applications, and by means of the intrusion tolerance method, the problem about how to guarantee availability of application system software when network intrusion occurs is solved.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an application-level intrusion tolerance system and method. Background technique [0002] Application system software is an information integration environment, which is a collective term for software that aggregates scattered and heterogeneous applications and information resources, and realizes certain types of special functions through one or more access portals. [0003] With the advancement of network technology, the attack and anti-attack technology for application system software is constantly developing. The continuous advancement of protocol analysis and pattern recognition technology enables effective discovery and defense of attacks directly targeting the bottom layer of the system. Attacks against application systems emerge in endlessly, such as SQL injection, cross-site attack, session hijacking, and cookie-poisoning. At present, the detection and def...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 郭骞俞庚申冯谷余勇范杰蒋诚智李尼格高鹏
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products