Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network behaviour alarming system and method for network auditing

An alarm system and network technology, applied in the field of network information security, can solve problems such as difficult real-time notification and single alarm method

Inactive Publication Date: 2007-03-28
SHENZHEN SEENTECH INFORMATION TECH DEV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the alarm methods of these two systems are relatively simple, and more alarm information is displayed on the interface of their management programs. When the administrators go out, it is difficult to notify them in real time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network behaviour alarming system and method for network auditing
  • Network behaviour alarming system and method for network auditing
  • Network behaviour alarming system and method for network auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As shown in Figure 1, the network behavior alarm system of the present invention comprises an alarm policy management module, a data analysis module and an alarm module; Phone number, where the alarm method includes sound alarm method or / and text message alarm method;

[0024] The data analysis module is used to store the sensitive information keywords set by the above-mentioned alarm policy management module, and analyze the network data obtained by the audit system to find out whether there is content matching the sensitive information keywords, and if so, send Alarm start command to alarm module;

[0025] The alarm module is configured to issue an alarm in one or more corresponding alarm modes according to the above-mentioned alarm start command, and store the alarm sound or / and the receiver's phone number set by the above-mentioned alarm policy management module.

[0026] As shown in Figure 2, the network behavior warning method of the present invention comprises t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network behavior alarming system and method in network auditing. And the system comprises alarm policy management module for setting alarm contents and alarm mode, network data analysis module and alarm module for sending out one or multiple alarms; and the method comprises setting and storing alarm contents and alarm mode, and analyzing network data: if there are contents needing alarm, sending out an alarm in the set alarm mode. And it matches sensitive information keywords with network data, analyzes network data and alarms in three modes: sound, short messages and E-mail, thus informing the manager in time and in high efficiency.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a network behavior alarm system and method in network auditing. Background technique [0002] With the continuous reduction of the price of network equipment, more and more enterprises, government agencies, confidential departments, banks and other working environments have begun to deploy networks, and communicate and transfer files through the network, because these communication information contains many Confidential information such as corporate financial reports, government work records, bank personal account information, etc. Therefore, it is necessary to audit the information data transmitted in the network. In order to reduce the response time of network audit, it is necessary to include sensitive information in network communication data. Time, so that the network audit system can notify the administrator in real time. However, although the firewalls widely u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 阮伟军申屠青春林飞
Owner SHENZHEN SEENTECH INFORMATION TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products