Network intrusion detection method and system

A network intrusion detection and algorithm technology, applied in the field of network communication, can solve the problems of threatening intranet security, increasing enterprise costs and burdens, and high cost of intrusion detection systems, reducing system costs and improving system security.

Inactive Publication Date: 2015-02-25
SUZHOU CODYY NETWORK SCI & TECH
View PDF13 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The Trojan horse remote control program uses the HTTP tunnel penetration technology to disguise the private communication protocol in the HTTP protocol. At the same time, due to business needs, most firewalls allow HTTP data packets to pass through, which will cause the data packets of the Trojan horse remote control program to go smoothly. Threat to the security of the intranet through the firewall
[0003] When the firewall fails, in most cases the intranet is directly exposed; some stronger protection systems will also have an intrusion detection system behind the firewall, but the intrusion detection system is expensive, which will virtually increase the cost and burden of the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method and system
  • Network intrusion detection method and system
  • Network intrusion detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0014] figure 1 Shown is a flowchart of a network intrusion detection method provided according to a preferred embodiment of the present invention. Such as figure 1 As shown, the online classroom guide control method provided by the preferred embodiment of the present invention includes steps 102-106.

[0015] In step 102, access data within a predetermined time period is acquired. Data packets can be captured in real time at the network layer to obtain access data, such as access data within three days, and the access data are Uniform Resource Locators (URLs) from different IP addresses. A URL from an IP address is an access record.

[0016] In step 104, access parameter feature information is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network intrusion detection method and system. The network intrusion detection method comprises the following steps that access data within a preset time period are obtained; access data feature information is extracted from the access data; whether suspicious access exists or not is judged according to the access parameter feature information. According to the network intrusion detection method and system, a remote program adopting the HTTP tunnel penetrating technology can be efficiently detected out, and the system safety can be improved; in addition, the network intrusion detection system does not need to be additionally arranged behind a firewall, and therefore system cost is reduced.

Description

technical field [0001] The invention belongs to the field of network communication, in particular to a network intrusion detection method and system. Background technique [0002] The Trojan horse remote control program uses the HTTP tunnel penetration technology to disguise the private communication protocol in the HTTP protocol. At the same time, due to business needs, most firewalls allow HTTP data packets to pass through, which will cause the data packets of the Trojan horse remote control program to go smoothly. Through the firewall, it threatens the security of the intranet. [0003] When the firewall fails, in most cases the intranet is directly exposed; some stronger protection systems also have an intrusion detection system behind the firewall, but the intrusion detection system is expensive, which will virtually increase the cost and burden of the enterprise. The emergence of HTTP tunneling technology has brought great threats to the internal network security of e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/12H04L63/1416H04L63/145
Inventor 沈玉将赵杰
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products