Bypass detection and blocking method and system for data security risk behavior
The invention discloses a bypass detection and blocking method and system for data security risk behaviors. The invention aims to solve the problems of high false alarm rate, high missing report rate and single blocking effect in the blocking of data security risk behaviors in the prior art. The met...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | DONG ENZE TAN ZHIQIANG YUAN LICHENG CHEN YING LIU XIAOBO CHENG XIANJIE LI JIN XIE XIAOGANG |
description | The invention discloses a bypass detection and blocking method and system for data security risk behaviors. The invention aims to solve the problems of high false alarm rate, high missing report rate and single blocking effect in the blocking of data security risk behaviors in the prior art. The method comprises the following steps: S1, collecting a mirror image traffic message based on a DPDK technology; s2, sequentially carrying out network layer protocol analysis and transport layer protocol analysis on the collected mirror image flow message, and sending the message size and information obtained by analysis to a rule control module; s3, matching the obtained information with a static IP rule and a flow characteristic dynamic rule in sequence; when the matching is successful, triggering a corresponding blocking event; s4, adopting a three-level blocking mode for a transmission layer which is a TCP protocol; and a two-stage blocking mode is adopted for other protocols. A dynamic blocking rule is adopted to |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117294538A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117294538A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117294538A3</originalsourceid><addsrcrecordid>eNqNyrEKwjAQgOEsDqK-w_kADrWKOmpRnHRxL9fkakPbXMidQt5eEB_A6YePf2rupxxRBBwpWfUcAIODZmDb-_CEkbRj9zXJojRCywkcKoKQfSWvGZKXHhrq8O05zc2kxUFo8evMLC_nR3VdUeSaJKKlQFpXt6LYrQ-bbbk_lv88H10UNw4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Bypass detection and blocking method and system for data security risk behavior</title><source>esp@cenet</source><creator>DONG ENZE ; TAN ZHIQIANG ; YUAN LICHENG ; CHEN YING ; LIU XIAOBO ; CHENG XIANJIE ; LI JIN ; XIE XIAOGANG</creator><creatorcontrib>DONG ENZE ; TAN ZHIQIANG ; YUAN LICHENG ; CHEN YING ; LIU XIAOBO ; CHENG XIANJIE ; LI JIN ; XIE XIAOGANG</creatorcontrib><description>The invention discloses a bypass detection and blocking method and system for data security risk behaviors. The invention aims to solve the problems of high false alarm rate, high missing report rate and single blocking effect in the blocking of data security risk behaviors in the prior art. The method comprises the following steps: S1, collecting a mirror image traffic message based on a DPDK technology; s2, sequentially carrying out network layer protocol analysis and transport layer protocol analysis on the collected mirror image flow message, and sending the message size and information obtained by analysis to a rule control module; s3, matching the obtained information with a static IP rule and a flow characteristic dynamic rule in sequence; when the matching is successful, triggering a corresponding blocking event; s4, adopting a three-level blocking mode for a transmission layer which is a TCP protocol; and a two-stage blocking mode is adopted for other protocols. A dynamic blocking rule is adopted to</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231226&DB=EPODOC&CC=CN&NR=117294538A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231226&DB=EPODOC&CC=CN&NR=117294538A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>DONG ENZE</creatorcontrib><creatorcontrib>TAN ZHIQIANG</creatorcontrib><creatorcontrib>YUAN LICHENG</creatorcontrib><creatorcontrib>CHEN YING</creatorcontrib><creatorcontrib>LIU XIAOBO</creatorcontrib><creatorcontrib>CHENG XIANJIE</creatorcontrib><creatorcontrib>LI JIN</creatorcontrib><creatorcontrib>XIE XIAOGANG</creatorcontrib><title>Bypass detection and blocking method and system for data security risk behavior</title><description>The invention discloses a bypass detection and blocking method and system for data security risk behaviors. The invention aims to solve the problems of high false alarm rate, high missing report rate and single blocking effect in the blocking of data security risk behaviors in the prior art. The method comprises the following steps: S1, collecting a mirror image traffic message based on a DPDK technology; s2, sequentially carrying out network layer protocol analysis and transport layer protocol analysis on the collected mirror image flow message, and sending the message size and information obtained by analysis to a rule control module; s3, matching the obtained information with a static IP rule and a flow characteristic dynamic rule in sequence; when the matching is successful, triggering a corresponding blocking event; s4, adopting a three-level blocking mode for a transmission layer which is a TCP protocol; and a two-stage blocking mode is adopted for other protocols. A dynamic blocking rule is adopted to</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyrEKwjAQgOEsDqK-w_kADrWKOmpRnHRxL9fkakPbXMidQt5eEB_A6YePf2rupxxRBBwpWfUcAIODZmDb-_CEkbRj9zXJojRCywkcKoKQfSWvGZKXHhrq8O05zc2kxUFo8evMLC_nR3VdUeSaJKKlQFpXt6LYrQ-bbbk_lv88H10UNw4</recordid><startdate>20231226</startdate><enddate>20231226</enddate><creator>DONG ENZE</creator><creator>TAN ZHIQIANG</creator><creator>YUAN LICHENG</creator><creator>CHEN YING</creator><creator>LIU XIAOBO</creator><creator>CHENG XIANJIE</creator><creator>LI JIN</creator><creator>XIE XIAOGANG</creator><scope>EVB</scope></search><sort><creationdate>20231226</creationdate><title>Bypass detection and blocking method and system for data security risk behavior</title><author>DONG ENZE ; TAN ZHIQIANG ; YUAN LICHENG ; CHEN YING ; LIU XIAOBO ; CHENG XIANJIE ; LI JIN ; XIE XIAOGANG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117294538A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>DONG ENZE</creatorcontrib><creatorcontrib>TAN ZHIQIANG</creatorcontrib><creatorcontrib>YUAN LICHENG</creatorcontrib><creatorcontrib>CHEN YING</creatorcontrib><creatorcontrib>LIU XIAOBO</creatorcontrib><creatorcontrib>CHENG XIANJIE</creatorcontrib><creatorcontrib>LI JIN</creatorcontrib><creatorcontrib>XIE XIAOGANG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>DONG ENZE</au><au>TAN ZHIQIANG</au><au>YUAN LICHENG</au><au>CHEN YING</au><au>LIU XIAOBO</au><au>CHENG XIANJIE</au><au>LI JIN</au><au>XIE XIAOGANG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Bypass detection and blocking method and system for data security risk behavior</title><date>2023-12-26</date><risdate>2023</risdate><abstract>The invention discloses a bypass detection and blocking method and system for data security risk behaviors. The invention aims to solve the problems of high false alarm rate, high missing report rate and single blocking effect in the blocking of data security risk behaviors in the prior art. The method comprises the following steps: S1, collecting a mirror image traffic message based on a DPDK technology; s2, sequentially carrying out network layer protocol analysis and transport layer protocol analysis on the collected mirror image flow message, and sending the message size and information obtained by analysis to a rule control module; s3, matching the obtained information with a static IP rule and a flow characteristic dynamic rule in sequence; when the matching is successful, triggering a corresponding blocking event; s4, adopting a three-level blocking mode for a transmission layer which is a TCP protocol; and a two-stage blocking mode is adopted for other protocols. A dynamic blocking rule is adopted to</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN117294538A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Bypass detection and blocking method and system for data security risk behavior |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A04%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=DONG%20ENZE&rft.date=2023-12-26&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117294538A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |