Cloud-based intelligent security defense system and defense method

A technology for security defense and client system, applied in the field of computer network information security, can solve the problems of stealing and leakage, unauthorized access of privacy leaks, affecting the security of information resources and social stability, etc., to achieve the effect of enhancing efficiency

Inactive Publication Date: 2014-07-02
SHANGHAI DIANJI UNIV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud provides continuous services for various network users. Virus and hacker attacks and link nodes often have some security problems, which will seriously affect the security of information resources and social stability.
2. Privacy leaks and unauthorized access
E-commerce, online banking, e-government, email or account information, etc., are easily stolen and leaked by internal lawless personnel or unauthorized persons, which will have serious consequences for the normal operation of the network
3. Cross-platform security issues
The above-mentioned problems in network security have seriously affected the security of the network system and social stability, seriously hindered the wide application and normal operation of computer networks, and posed great security risks and hidden dangers to network resources and user information security.
[0004] In summary, we can see the deficiencies and limitations of traditional network security defense technologies: First, the dynamic defense capabilities are weak
Basically relying on traditional firewalls and static configuration defenses on devices, it is difficult to deal with more and more dynamic attacks with advanced technical means
Second, it is impossible to carry out active defense
Traditional firewalls and IDS can only respond to various attacks passively, but cannot actively block them
Third, it is difficult to identify new viruses or network attacks
Fourth, the detection and defense capabilities are weak, and the false positive rate is high
Fifth, it cannot be linked and the overall coordinated defense, and the intelligence and interactivity are poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-based intelligent security defense system and defense method
  • Cloud-based intelligent security defense system and defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The encapsulation carrier proposed by the present invention and its manufacturing method will be further described in detail below with reference to the accompanying drawings and specific embodiments. Advantages and features of the present invention will be apparent from the following description and claims. It should be noted that all the drawings are in a very simplified form and use imprecise scales, and are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention.

[0053] Network security has become one of the top ten hot topics in the world in the 21st century, and has attracted widespread attention from the society. With the rapid development of information construction and IT technology, the application of computer network technology is more extensive and in-depth, and network security problems continue to emerge, which makes the importance of network security technology more prominent. Network security has ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud-based intelligent security defense system and defense method. Intelligent processing platforms are mutually dispatched through a system core function dispatching module according to a cloud-based intelligent processing assembly, the network security defense system capable of detecting, monitoring, checking, killing, blocking, auditing and recovering abnormal information is formed, the dynamic intelligent detection, identification and blocking and defense performance of the whole network is effectively improved, and the overall intelligent defense performance is improved.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a cloud-based intelligent security defense system and defense method. Background technique [0002] Cloud Security (Cloud Security) is the development of cloud computing and the application mode of network security. It is a security architecture for the whole network defense. It effectively protects the network with three levels: intelligent client, cluster server and open platform. Safe and efficient operation of the system. The existing intrusion prevention system (Intrusion Prevention System, IPS) based on cloud security integrates and integrates cloud firewall and intrusion detection system (Intrusion Detection System, IDS) technology, which can provide deep and efficient dynamic active security defense for the entire local area network , which belongs to the network-based intrusion prevention system (Network Intrusion Protection System, NIPS). ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 贾铁军肖惜明张福杰
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products