Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection method and device

A technology of security protection and security equipment, which is applied in the field of information security and can solve problems affecting communication between the internal network and the external network

Inactive Publication Date: 2019-08-30
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, this application provides a method and device for security protection to solve the problem of affecting communication between the internal network and the external network caused by the receipt of a large number of attack messages by the security device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and device
  • Safety protection method and device
  • Safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] For the convenience of understanding, firstly, the network architecture applied in the embodiment of the present application is described. The embodiment of this application can be applied in such as figure 1 The security device in the edge network is shown, the edge network includes the edge device, and the edge device may be a security device, such as a firewall, an application control gateway, a situation awareness device, and an application traffic rate limiting device. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security protection method and device, which are applied to the technical field of information security, and are used for solving the problem that communication between an intranet and an extranet is affected due to the fact that a large number of attack messages are received by security equipment. The scheme of the invention comprises the following steps: when a network attack is detected, judging whether the first quantity value of the received attack message is greater than an attack threshold or not; and if it is determined that the first number value of the received attack messages is greater than the attack threshold, forwarding attack messages of a second number value to other edge devices except the security device in the edge network through the established block chain connection, the second number value being a difference value between the first number value and the attack threshold.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method and device for security protection. Background technique [0002] The edge network can be understood as the edge of the public telecommunication network, which includes part or all of the aggregation layer network and the access layer network. Generally speaking, the edge network is the last network for accessing users. The edge network usually includes gateway devices, routers, switches and other devices. [0003] As people pay more attention to network security, security devices, such as firewalls and other devices with security protection functions, can be deployed in edge networks during network deployment. Security devices can defend against network attacks and process attack packets. In addition, the security device has a message forwarding function, that is, to realize normal data message forwarding between the internal network and the ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/801
CPCH04L47/29H04L63/1408H04L63/1441H04L63/1458
Inventor 王国利
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products