Internet risk management method and system based security as service

A risk management, Internet technology, applied in the field of Internet risk management methods and systems, can solve the problems of the spread of the impact of security incidents, untimely response, and high operation and maintenance costs, and achieve rapid control of the impact scope, improvement of protection capabilities, and operation and maintenance costs. low effect

Inactive Publication Date: 2017-10-20
SANGFOR TECH INC
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, security checks and guarantees for Internet services generally require the deployment of security devices such as firewalls. The operation is complex, the operation and maintenance costs are high, and continuous monitoring cannot be performed. The response to problems found is not timely, and sudden serious situations cannot be quickly controlled. , leading to the rapid spread of the scope of security incidents
At the same time, with the rapid growth of attack & protection methods, such as web attacks, DDos, APT and other new attack methods, traditional protection methods are slow to update and weak in response
[0004] To sum up, the existing security solutions for Internet services cannot meet the current security status

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet risk management method and system based security as service
  • Internet risk management method and system based security as service
  • Internet risk management method and system based security as service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] The embodiment of the present invention discloses an Internet risk management method based on security as a service, which responds in time when a security event occurs, and quickly controls the scope of influence of the security event.

[0052] see figure 1 and figure 2 , figure 1 It is a flow chart of a security-as-a-service-based Internet risk management method disclosed in an embodiment of the present invention, figure 2 It is a schematic diagram of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internet risk management method based on security as service. The method comprises the following steps: receiving a website access request transmitted from a user, and returning an IP address which corresponds to the website access request to the user so that the user can visit a website server through the IP address; and monitoring the website server, and returning a mistaken interface to the user who visits the website when a website in which security events occur in the website server. According to the internet risk management method provided by an embodiment, the website server is detected through cloud detection; when the security events occur, website access operation of the user is intercepted automatically, and response is in time; and steps of deployment of security equipment such as a firewall are omitted, and the running and maintenance cost is low. Meanwhile, only the ability of cloud detection and monitoring of the security events needs to be updated, and the protecting ability of the system to a website server can be improved. The invention further discloses an internet risk management system, and the technical effect can also be achieved.

Description

technical field [0001] The present invention relates to the field of cloud computing, and more specifically, to an Internet risk management method and system based on security as a service. Background technique [0002] With the rapid development of the Internet, more and more Internet-oriented businesses are becoming more and more important, and the security problems are becoming more and more serious. According to statistics from authoritative departments, more than 60% of security incidents are aimed at Internet services Weaknesses are infiltrated, such as web sites, OA systems, etc., and according to the statistics of Internet business problems in recent years by organizations such as CVND and CNCERT, it is found that the high-risk vulnerabilities of external business are on the rise year by year, and malicious tampering incidents are also increasing. It is increasing year by year, especially in the government, education and other industries, which has caused a great neg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/1441H04L63/306
Inventor 吴松原
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products