Intrusion detection system and method based on role access control
An intrusion detection system and role access control technology, applied in the field of network security, can solve problems that cannot meet the needs of daily life, and achieve the goal of solving the loss of internal system resources and failure of the detection system, ensuring integrity, and reducing the probability of errors Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] figure 1 A schematic structural diagram of the intrusion detection system according to Embodiment 1 of the present disclosure is shown.
[0023] refer to figure 1 , Embodiment 1 of the present disclosure introduces an intrusion detection system based on role access control, including: a network environment detection module 101, which is used to perform intrusion security detection on user access, and / or filter and purify user application information The role management module 102 is used to determine whether the user's operation exceeds the authority assigned to the user's role; the system resource allocation module 103 is used to allocate system resources to the user according to the user's role; and a monitoring module 104, used to determine whether the work in the system is normal according to the abnormal activities in the network environment detection module 101, the role management module 102 and / or the system resource allocation module 103.
[0024] It should b...
Embodiment 2
[0101] Embodiment 2 of the present disclosure introduces an intrusion detection method based on role access control, including: performing intrusion security detection on the user's access, and / or filtering and purifying the user's application information; determining whether the user's operation exceeds The authority assigned to the user's role; according to the user's role, allocate system resources to the user; monitor the abnormal activities in the above operations, and determine whether the work in the system is normal.
[0102] Therefore, by implementing the intrusion detection method based on role access control described in Embodiment 2, the purpose of ensuring system security is achieved, and the identity authentication of users, the monitoring and detection of internal resources of the system, and timely detection of attacked The technical effect of system recovery solves the technical problems of internal system resource loss and detection system failure that occur w...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com