Network intrusion cooperative detection method based on security cloud

An intrusion detection and network intrusion technology, applied in the field of network security, can solve the problems of network intrusion detection not running normally, computer security monitoring, and abnormal lower-level detection nodes, etc., to prevent malicious interception of files, strong security performance, and strong timeliness Effect

Active Publication Date: 2021-04-09
HUNAN UNIV OF ARTS & SCI
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, for the multi-level management mode, when there is a fault in the transmission of information between each node, such as abnormal network instability, abnormality of the upper-level management node, and abnormality of the lower-level detection node, etc., the network intrusion detection within this range will not work normally. , the computer cannot be monitored safely during the maintenance process, and there are certain security loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion cooperative detection method based on security cloud
  • Network intrusion cooperative detection method based on security cloud
  • Network intrusion cooperative detection method based on security cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] Embodiment: a network intrusion collaborative detection method based on security cloud, such as figure 1 and figure 2 As shown, it is specifically implemented by the following steps.

[0039] Step 1: Obtain the distribution information of intrusion detection nodes in NIDS, and establish a multi-level distribution network system topology after classifying the intrusion detection nodes according to the distribution information. Such as figure 2 As shown, the network system topology includes management nodes and basic nodes; each management node corresponds to at least one basic node, and the basic nodes subordinate to the same management node are in the same operator network area. Among them, there is no bottom-level basic node at level N, level 1 is the management center of NIDS, and level N-1 is the management node.

[0040] Step 2: NIDS transmits the topology of the network system to the security cloud for registration and authorization. Intrusion detection nodes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion cooperative detection method based on security cloud, which relates to the technical field of network security, and is characterized by comprising the following steps: establishing a network system topological structure in multistage distribution; the NIDS transmitting the topological structure of the network system to the security cloud for registration authorization; the security cloud generating an identification character string of each intrusion detection node; information being transmitted between the intrusion detection nodes in a main association mode after main association data is identified; after identifying the standby association data, the intrusion detection nodes transmitting information by switching the main association mode into the standby association mode; and the NIDS calling a corresponding feature rule base from the security cloud for comprehensive detection according to the intrusion detection information. The overall safety performance is high, flexible switching of main and standby association modes can be achieved, and normal operation of cooperative detection is guaranteed; when the intrusion detection node is expanded, the whole system does not need to be changed, the operation flexibility is high, the transmission efficiency is high, and the timeliness of safety detection and emergency measure starting is high.

Description

technical field [0001] The invention relates to the technical field of network security, more specifically, it relates to a network intrusion collaborative detection method based on a security cloud. Background technique [0002] A network intrusion detection system (NIDS) refers to a combination of software and hardware that detects behaviors that endanger computer system security, such as collecting vulnerability information, denying access, and obtaining system control beyond the legal scope. Considered as the second security gate behind the firewall, NIDS provides real-time monitoring of internal attacks, external attacks and misoperations without affecting network performance by bypassing network traffic, thereby improving network security sex. [0003] At present, NIDS generally work through a single-point detection method or a multi-level management method. Among them, the detection node of single-point detection is generally a single software and hardware system, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L41/12H04L63/0428
Inventor 王兴柱
Owner HUNAN UNIV OF ARTS & SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products