Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Illegal external-connection detection method and device, equipment and storage medium

An outreach detection and illegal technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of false positives as attacks, occupying intranet bandwidth, affecting the intranet network environment and normal business operation of the intranet, etc., to reduce the impact, Avoid contract sending and traffic occupation, and improve the effect of intranet security

Inactive Publication Date: 2019-03-01
SANGFOR TECH INC
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This method has certain disadvantages. The scanning server actively sends scanning detection packets to all hosts in the intranet, which will occupy the bandwidth of the intranet and may be falsely reported as an attack. If the ARP detection method is used, it is easy to form an ARP storm and affect the intranet. The network environment and the normal operation of intranet business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal external-connection detection method and device, equipment and storage medium
  • Illegal external-connection detection method and device, equipment and storage medium
  • Illegal external-connection detection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] The core of the present invention is to provide an illegal outreach detection method, which is applied to a probe device deployed on an intranet link. The probe device is a traffic collection device in a bypass deployment mode. It is generally used for situational awareness products to collect and analyze, and can identify quintuple information, application / protocol information, etc. in traffic access. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal external-connection detection method. The illegal external-connection detection method is applied to probe equipment deployed on an Intranet link. The method comprises the following steps: generating a redirection request message if a first host is in accordance with an illegal external-connection detection condition when a first request message which is launchedby the first host specific to a HTTP (Hyper Text Transport Protocol) service server is monitored on the Intranet link, wherein the redirecting request message at least includes http redirection information directing to an Internet monitoring server deployed on Internet; and sending the redirection request message to the first host in order to determine that the first host is an illegal external-connection host when the Internet monitoring server receives a second request message transmitted by the first host. According to the technical scheme provided by the embodiment of the invention, the influence on the Intranet network environment and the normal running of Intranet normal services is lowered, and the Intranet security is improved. The invention also provides an illegal external-connection detection device, equipment and a storage medium, which have corresponding technical effects.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to an illegal outreach detection method, device, equipment and storage medium. Background technique [0002] With the rapid development of computer technology, the development of network is getting faster and faster, and the security of network is getting more and more attention. For security reasons, enterprises and institutions will monitor and restrict the online behavior of employees. In some scenarios, such as production networks, office networks, private networks, etc., due to security regulations or anti-leakage requirements, intranet hosts are prohibited from connecting to the Internet, and data that needs to be connected to the Internet often passes through security Switching equipment for data exchange. In some scenarios, a unified Internet access environment will be configured. After verification, the intranet hosts can rely on the unified exit to access t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/10H04L67/02
Inventor 吕晓滨
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products