Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for providing computer network security

A computer network and security technology, applied in transmission systems, electrical components, etc., to improve network security, facilitate detection of intrusions, and eliminate threats

Inactive Publication Date: 2017-12-26
合肥丹朋科技有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, resource sharing and information security have always been a pair of contradictions, and network security is facing more and more serious challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing computer network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] A system for providing computer network security includes multiple intrusion detection modules, multiple management analyzers, and controllers. The intrusion detection module is used to collect data transmitted on a target network segment, and manage the The intrusion rules preset by the analysis center perform real-time tracking and detection of intrusions from internal and external networks. The management analyzer is used to manage the data detector and at the same time is responsible for the analysis of alarm information. The controller is used for safety management. The center is guided by corresponding commands to configure network equipment, eliminate threats, block intruders, send warnings to intranet users, and fix vulnerabilities.

[0025] Specifically, the intrusion detection module includes a data detector, and the data detector includes a data acquisition module, a protocol decoding module, a preprocessing module, a detection analysis module, a rule analysis mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for providing computer network security. The system comprises multiple intrusion detection modules, multiple management analyzers and a controller. The intrusion detection modules are used for collecting data transmitted on the target network segment, according to an intrusion rule preset by an administrator through a region management analysis center, executing the real-time tracking detection to an intrusion behavior from the inside and outside network. The management analyzers are used for managing a data detector, and executing the analysis of warning information. The controller is used for, through the guidance of a corresponding instruction of a security management center, configuring a network device, eliminating a threat, intercepting an intruder, sending a warning to an inside network user, and repairing bugs. The system is capable of improving the network security of the computer, convenient for detecting the intrusion and reminding the administrator.

Description

Technical field [0001] The present invention belongs to the technical field of systems for providing computer network security, and more specifically, relates to a system and method for providing computer network security. Background technique [0002] With the increasing opening of the Internet and the rapid development of network technology, the accompanying network attacks have become more and more serious. The issue of network security has become a very hot topic and is gradually receiving attention. Traditional static security defense systems, such as firewalls, identity authentication and data encryption technologies, are relatively mature. With the rapid development of the Internet, the resource sharing of computer networks has been further strengthened. However, resource sharing and information security have always been a pair of contradictions, and network security is facing more and more serious challenges. According to statistics, on a global scale, the economic loss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1441H04L63/20H04L63/30
Inventor 宋丹丹
Owner 合肥丹朋科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products