Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tactics executing point and linking method of it and intrusion detection system

An intrusion detection system and policy execution technology, which is applied in the field of network security to prevent attacks, improve efficiency, and improve overall protection capabilities.

Inactive Publication Date: 2006-11-15
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This linkage method requires the support of network management. In many applications, there is no unified network management to manage policy enforcement points and IDS software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tactics executing point and linking method of it and intrusion detection system
  • Tactics executing point and linking method of it and intrusion detection system
  • Tactics executing point and linking method of it and intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Such as figure 2 Shown: the present invention provides a method for linking a policy enforcement point with an intrusion detection system, comprising the following steps:

[0039] Establish a linkage connection directly between the intrusion detection system and the policy enforcement point;

[0040] Maintain communication between the policy enforcement point and the intrusion detection system;

[0041] The intrusion detection system detects the attack behavior, and the policy enforcement point responds to the attack processing result.

[0042] Further, the process of establishing a connection between the policy enforcement point and the intrusion detection system includes at least the following steps:

[0043] Step 1: The IDS software initiates the establishment of a linkage connection, initiates the linkage connection, and the connection request message carries the relevant information of the IDS software;

[0044] Step 2 The policy enforcement point checks the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention supplies a method of interlocking between strategy execution points and invading testing system. It includes the following steps: building up interlocking connection between invading testing system and strategy executing points; keeping communication between the strategy execution points and the invading testing system; if checking invading action, the strategy execution points would response invading process result. The invention improves the safety and defending ability of the system.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a linkage method of network security equipment, in particular to a policy execution point and its linkage method with an intrusion detection system (Intrude Detection System, IDS for short). Background technique [0002] The policy enforcement point device is used to separate the internal network and the external network, which is of great significance to the security of the network. Due to the limitations of the policy enforcement point itself, such as the coarse granularity of inspection, it is difficult to conduct in-depth analysis and inspection of many protocol details, and the policy enforcement point has the characteristics of preventing external but not internal, it is difficult to detect internal users Therefore, it is necessary for the policy enforcement point to open relevant interfaces, realize linkage with other security software, and build a secure network th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/26H04L29/06
CPCH04L63/0227G06F21/55H04L63/1416
Inventor 滕新东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products