Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Preposed audit method

A data packet and network registration technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as system bottlenecks, low efficiency, and inflexible audit methods, and achieve the effect of reducing hardware requirements, reducing complexity, and improving audit efficiency

Inactive Publication Date: 2018-07-27
SHENZHEN SEENTECH INFORMATION TECH DEV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, if the protocol changes, the method to deal with it is relatively complicated, and the audit method is not flexible enough; the second disadvantage is that in order to support the restoration of content, a complex restoration algorithm is required as support, and this restoration cannot support multi-threaded concurrent packet analysis , causing a system bottleneck
[0005] The obvious disadvantage of the audit flow-through audit method is that all data traffic must reach the audit device before the analysis of related protocols can be performed. This method is not efficient
Especially when auditing emails, webpage access, etc., data packet restoration is required to obtain information such as text, title, recipient, etc., a cumbersome restoration algorithm will be born, and it will not be able to achieve concurrency under large data, becoming the entire system the bottleneck

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preposed audit method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention is further described below in conjunction with accompanying drawing and embodiment:

[0031] like figure 1 As shown, a pre-audit method completes the audit analysis behavior through the audit system, wherein the audit system is pre-installed on the client browser, and the audit analysis behavior on the original audit device is pre-installed on the client browser to complete , to share the original responsibility of auditing equipment.

[0032] The network data packets are intercepted through the netfilter system framework, by matching the relevant strategies for the intercepted data packets, by modifying the last data packet in the data packet flow, and inserting the corresponding js before it, and the js obtains the necessary information in the client browser. information to enable the audit process.

[0033] The audit system includes a network registration module, a policy management module and an injection module.

[0034] 1. The network regi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a preposed audit method in the field of network information security audit. An audit analysis behavior is finished through an audit system, specifically, network data packets are intercepted through a netfilter, related policy matching is carried out on the intercepted data packets, through modification of the final data packet in a data packet stream, corresponding js is inserted before the final data packet, the js obtains necessary information from a client browser, and an audit process is realized. According to the method, the audit efficiency is improved, an auditmode is changed, and through utilization of the system, a user can obtain the necessary information relatively comprehensively and rapidly, and the existing behavior audit mode is expanded.

Description

technical field [0001] The invention relates to the field of network information security auditing, in particular to a pre-auditing method aimed at enriching virtual person identity information related to the business of public security departments and collecting data. Background technique [0002] With the increasing popularity of the Internet and the development and maturity of related technologies, people have entered an era of extremely rich information. The Internet has brought many conveniences, but it has also brought many problems. increasing day by day. Facing the virtuality and uncertainty of the network, network behavior auditing has become a necessary means and guarantee for information security. [0003] The existing Internet security behavior auditing technology audits network behaviors in a flow-through manner through two deployment modes. One is to deploy the device on the egress link as a gateway / transparent bridge to analyze and audit the bidirectional tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/1408H04L63/20H04L67/02
Inventor 黄雯严乐平周金洪徐魏
Owner SHENZHEN SEENTECH INFORMATION TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products