Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion detection method and detection equipment

A detection device and intrusion detection technology, applied in the field of information security, can solve problems such as destroying enterprise accounts, network paralysis, and destroying databases

Pending Publication Date: 2022-07-05
NEW H3C SECURITY TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, while the network brings great convenience to people's study, life and work, it also brings various security problems
Cyber ​​hackers can easily take away your confidential files, steal your bank deposits, destroy your business accounts, publish your private letters, tamper with, interfere with and destroy your database, and even directly destroy your disk or computer, making you The network is paralyzed or crashed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and detection equipment
  • Intrusion detection method and detection equipment
  • Intrusion detection method and detection equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of this specification as recited in the appended claims.

[0042] The terms used in this specification are for the purpose of describing particular embodiments only and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intrusion detection method and detection equipment, and the method comprises the steps: building a detection model which comprises a capture layer, a network protocol layer, a detection layer and a response layer; the capture layer is used for capturing a data packet; the network protocol layer is used for performing protocol analysis on the captured data packet to obtain an analysis result; the detection layer is used for determining whether the captured data packet is an attack event or not according to the analysis result; the response layer is used for performing attack response when the detection layer judges that the captured data packet is an attack event; and performing intrusion detection on the network data by using the detection model. Through the method, whether the data packet contains the attack event or not can be judged through protocol analysis of the data packet.

Description

technical field [0001] The present disclosure relates to the field of information security, and in particular, to an intrusion detection method and detection device. Background technique [0002] Intrusion detection: (intrusion detection) by collecting information from several key points in a computer network or computer system and analyzing it to find out whether there are behaviors that violate security policies and signs of being attacked in the network or system. [0003] With the rapid development of computer networks, network communication has penetrated into all fields of social economy, culture and science; it plays a pivotal role in the progress and development of human society, and it is affecting and changing the way people work, study and live. . In addition, the development and application level of the Internet has also become an indicator to measure a country's political, economic, military and technological strength; the development of network technology is a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L69/22
CPCH04L63/1416H04L69/22
Inventor 向奎
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products