CN109413114B - Network intrusion prevention system - Google Patents

Network intrusion prevention system Download PDF

Info

Publication number
CN109413114B
CN109413114B CN201811626023.8A CN201811626023A CN109413114B CN 109413114 B CN109413114 B CN 109413114B CN 201811626023 A CN201811626023 A CN 201811626023A CN 109413114 B CN109413114 B CN 109413114B
Authority
CN
China
Prior art keywords
strategy
client
analysis
response
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811626023.8A
Other languages
Chinese (zh)
Other versions
CN109413114A (en
Inventor
廉明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Changtai Technology Co.,Ltd.
Original Assignee
Anhui Changtai Information Security Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Changtai Information Security Service Co ltd filed Critical Anhui Changtai Information Security Service Co ltd
Priority to CN201811626023.8A priority Critical patent/CN109413114B/en
Publication of CN109413114A publication Critical patent/CN109413114A/en
Application granted granted Critical
Publication of CN109413114B publication Critical patent/CN109413114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a network intrusion prevention system, and belongs to the technical field of computers. The defense system comprises an analysis and response layer, wherein the analysis and response layer is used for providing an interface for the whole defense system to analyze an Http message request sent by a client and encapsulate the Http message when a server responds; when a client accesses the server, the strategy engine is informed to schedule the access information of the strategy detection client and provide response realization for the strategy engine; the analysis and response layer is realized by interface packaging provided by a server; the strategy engine layer is used for scheduling the strategy, and acquiring a specific response of the information of the client through an interface provided by the analysis and response layer in the strategy and also delivering the specific response to the analysis and response layer to complete the scheduling of the strategy; meanwhile, the policy engine also needs to schedule a data management layer to complete the loading of the policy and the logging function. The invention has simple structure, convenient use and strong practicability and is suitable for popularization and use.

Description

Network intrusion prevention system
Technical Field
The invention relates to the technical field of computers, in particular to a network intrusion prevention system.
Background
Intrusion detection is the detection of intrusion behavior. It checks the network or system for the presence of security policy violations and signs of attack by collecting and analyzing network behavior, security logs, audit data, other information available on the network, and information at several key points in the computer system. Intrusion detection, as an active security technique, provides real-time protection against internal attacks, external attacks and misoperations, intercepting and responding to intrusions before the network system is compromised.
Most of the conventional network intrusion prevention systems analyze and monitor the occurring attack behavior by analyzing logs of some safety equipment, basically adopt passive prevention thought, lack network safety situation perception and linkage early warning capacity, and take corresponding emergency measures after detecting a network attack event, so that loss is caused at the moment, and the system is not beneficial to privacy protection. Therefore, a network intrusion prevention system is proposed to solve the above problems.
Disclosure of Invention
The invention aims to provide a network intrusion prevention system for solving the problems of complex structure and low intrusion prevention effect of the machine network intrusion prevention system, and the network intrusion prevention system has the advantage of comprehensive monitoring.
In order to achieve the purpose, the invention adopts the following technical scheme:
a network intrusion prevention system comprises
The system comprises an analysis and response layer, a server and a client side, wherein the analysis and response layer is used for providing an interface for the whole defense system to analyze an Http message request sent by the client side and encapsulate the Http message when the server responds; when a client accesses the server, the strategy engine is informed to schedule the access information of the strategy detection client and provide response realization for the strategy engine; the parsing and response layer is implemented by interface packaging provided by a server.
The strategy engine layer is used for scheduling the strategy, and acquiring a specific response of the information of the client through an interface provided by the analysis and response layer in the strategy and also delivering the specific response to the analysis and response layer to complete the scheduling of the strategy; meanwhile, the policy engine also needs to schedule a data management layer to complete the loading of the policy and the logging function.
And the data management layer is used for providing the functions of log recording, configuration management and strategy script analysis.
The analysis and response layer, the strategy engine layer and the data management layer all complete relatively independent functions, and when the implementation of a certain layer is changed, the other layers are not affected as long as the provided interface is not changed.
According to the further technical scheme, the analysis and response layer comprises an IPS management module which is responsible for managing and connecting each module, managing data streams, finishing initialization of the whole system after reading configuration files, managing, running, stopping and reloading the state of the whole system; when the Http message analysis module notifies that the client accesses, the policy engine is called to detect the behavior and information of the client, and the Http response module is notified of the result returned by the policy engine to respond.
The strategy engine layer comprises a configuration file module which is used for reading and storing the configuration file and providing a uniform interface, and the configuration file module can be modified according to the requirement.
The strategy engine layer comprises a log module which is used for recording logs generated during the operation of the system or intrusion prevention behaviors and recording log information in a text file by using a uniform format.
The analysis and response layer comprises an analysis module of an Http message, generates an object for each client, wherein the object realizes an interface capable of detecting the relevant information of the client, analyzes original data submitted when the client accesses the Web server, informs the IPS management module of receiving an access request of the client, and requests the policy engine to detect the access behavior of the client.
The strategy engine layer comprises an Http response module which is used for assembling data messages.
Advantageous effects
Compared with the prior art, the invention has the following remarkable advantages:
1. the network intrusion prevention system can well monitor the operating system in the computer network, prevent illegal program intrusion and improve the safety of the network, adopts a layered system structure, has good expansibility and is suitable for different server platforms.
2. The invention has simple structure, convenient operation and strong practicability and is suitable for popularization and use.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
FIG. 2 is a schematic processing diagram of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to FIGS. 1-2, a network intrusion prevention system includes
The system comprises an analysis and response layer, a server and a client side, wherein the analysis and response layer is used for providing an interface for the whole defense system to analyze an Http message request sent by the client side and encapsulate the Http message when the server responds; when a client accesses the server, the strategy engine is informed to schedule the access information of the strategy detection client and provide response realization for the strategy engine; the parsing and response layer is implemented by interface packaging provided by a server.
The strategy engine layer is used for scheduling the strategy, and acquiring a specific response of the information of the client through an interface provided by the analysis and response layer in the strategy and also delivering the specific response to the analysis and response layer to complete the scheduling of the strategy; meanwhile, the policy engine also needs to schedule a data management layer to complete the loading of the policy and the logging function.
And the data management layer is used for providing the functions of log recording, configuration management and strategy script analysis.
Each layer completes relatively independent functions, and when the implementation of a certain layer is changed, the other layers are not influenced as long as the provided interface is not changed.
The analysis and response layer comprises an IPS management module which is responsible for managing and connecting each module, managing data streams, finishing the initialization of the whole system after reading configuration files, managing the state of the whole system, running, stopping and reloading; when the Http message analysis module notifies that the client accesses, the policy engine is called to detect the behavior and information of the client, and the Http response module is notified of the result returned by the policy engine to respond.
The strategy engine layer comprises a configuration file module which is used for reading and storing the configuration file and providing a uniform interface, and the configuration file module can be modified according to the requirement.
The strategy engine layer comprises a log module which is used for recording logs generated during the operation of the system or intrusion prevention behaviors and recording log information in a text file by using a uniform format.
The analysis and response layer comprises an analysis module of an Http message, generates an object for each client, wherein the object realizes an interface capable of detecting the relevant information of the client, analyzes original data submitted when the client accesses the Web server, informs the IPS management module of receiving an access request of the client, and requests the policy engine to detect the access behavior of the client.
The strategy engine layer comprises an Http response module which is used for assembling data messages.
When the method works, firstly, a strategy engine analyzes a strategy script and assembles a strategy chain according to the attribute and the priority of the strategy; when the IPS management module informs the policy engine to detect the information of a certain client, the policy engine acquires the required information of the client by using an interface provided by the Http message analysis module, analyzes the behavior of the client, and controls the access of the client by scheduling the policies in sequence. In the strategy, each field requested by the client can be detected, the behavior of the client is analyzed or recorded, and different behaviors of the client are responded through a defined rule; when no response is made to the client's behavior in one policy; the policy engine calls the next one in the policy chain; until all calls are used. If the strategy returns a response, the Http response module is informed to complete the response of the client, and the strategy behind the strategy chain is stopped to be mobilized; if no strategy responds to the behavior of the client, the strategy engine returns a response for accepting the request; the policy engine needs to encapsulate an analysis and response module and a log recording module of the Http message for calling in the policy.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (1)

1. A network intrusion prevention system, comprising: the defense system comprises an analysis and response layer, wherein the analysis and response layer is used for providing an interface for analyzing an Http message request sent by a client and encapsulating the Http message when a server responds for the whole defense system; when a client accesses the server, the strategy engine is informed to schedule the access information of the strategy detection client and provide response realization for the strategy engine; the analysis and response layer is realized by interface packaging provided by a server;
the strategy engine layer is used for scheduling the strategy, the information of the client is obtained through an interface provided by the analysis and response layer in the strategy, and the specific response is also given to the analysis and response layer to be completed; meanwhile, the policy engine also needs to schedule a data management layer to complete the loading of the policy and the log recording function;
the data management layer is used for providing functions of log recording, configuration management and strategy script analysis; each layer completes relatively independent functions, and when the realization of a certain layer is changed, the other layers are not influenced as long as the provided interface is not changed;
the analysis and response layer comprises an IPS management module which is responsible for managing and connecting each module, managing data streams, finishing the initialization of the whole system after reading configuration files, managing the state of the whole system, running, stopping and reloading; when the Http message analysis module notifies that the client accesses, a policy engine is called to detect the behavior and information of the client, and a result returned by the policy engine is notified to the Http response module to respond;
the strategy engine layer comprises a configuration file module which is used for reading and storing the configuration file and providing a uniform interface, and the configuration file module can be modified according to the requirement;
the strategy engine layer comprises a log module which is used for recording logs generated during the operation of the system or intrusion prevention behaviors and recording log information in a text file by using a uniform format;
the analysis and response layer comprises an analysis module of an Http message, generates an object for each client, wherein the object realizes an interface capable of detecting client-related information, analyzes original data submitted when the client accesses the Web server, informs the IPS management module of receiving an access request of the client, and requests the policy engine to detect an access behavior of the client;
the strategy engine layer comprises an Http response module which is used for assembling the data message.
CN201811626023.8A 2018-12-28 2018-12-28 Network intrusion prevention system Active CN109413114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811626023.8A CN109413114B (en) 2018-12-28 2018-12-28 Network intrusion prevention system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811626023.8A CN109413114B (en) 2018-12-28 2018-12-28 Network intrusion prevention system

Publications (2)

Publication Number Publication Date
CN109413114A CN109413114A (en) 2019-03-01
CN109413114B true CN109413114B (en) 2021-08-10

Family

ID=65462457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811626023.8A Active CN109413114B (en) 2018-12-28 2018-12-28 Network intrusion prevention system

Country Status (1)

Country Link
CN (1) CN109413114B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286850A (en) * 2007-04-10 2008-10-15 深圳职业技术学院 Defensive installation for security of router, defense system and method
CN102292708A (en) * 2008-11-25 2011-12-21 思杰系统有限公司 Systems and Methods for HTTP Callouts for Policies
CN102523296A (en) * 2011-12-21 2012-06-27 华为技术有限公司 Method, device and system for optimizing wireless webpage browsing resources
CN103916398A (en) * 2014-04-15 2014-07-09 浪潮电子信息产业股份有限公司 System for form field detection based on Web
CN107181769A (en) * 2017-07-28 2017-09-19 山东超越数控电子有限公司 A kind of network intrusion prevention system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9461876B2 (en) * 2012-08-29 2016-10-04 Loci System and method for fuzzy concept mapping, voting ontology crowd sourcing, and technology prediction
CN102882703B (en) * 2012-08-31 2015-08-19 赛尔网络有限公司 A kind of system and method for the URL automatic classification classification based on HTTP analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286850A (en) * 2007-04-10 2008-10-15 深圳职业技术学院 Defensive installation for security of router, defense system and method
CN102292708A (en) * 2008-11-25 2011-12-21 思杰系统有限公司 Systems and Methods for HTTP Callouts for Policies
CN102523296A (en) * 2011-12-21 2012-06-27 华为技术有限公司 Method, device and system for optimizing wireless webpage browsing resources
CN103916398A (en) * 2014-04-15 2014-07-09 浪潮电子信息产业股份有限公司 System for form field detection based on Web
CN107181769A (en) * 2017-07-28 2017-09-19 山东超越数控电子有限公司 A kind of network intrusion prevention system and method

Also Published As

Publication number Publication date
CN109413114A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
US20190098027A1 (en) Joint defence method and apparatus for network security, and server and storage medium
US10341355B1 (en) Confidential malicious behavior analysis for virtual computing resources
CN102999716B (en) virtual machine monitoring system and method
US20210026969A1 (en) Detection and prevention of malicious script attacks using behavioral analysis of run-time script execution events
CN108270716A (en) A kind of audit of information security method based on cloud computing
CN110912876A (en) Mimicry defense system, method and medium for information system
US20200175177A1 (en) Auto-injection of security protocols
US20140259171A1 (en) Tunable intrusion prevention with forensic analysis
Uemura et al. Availability analysis of an intrusion tolerant distributed server system with preventive maintenance
CN113132318A (en) Active defense method and system for information safety of power distribution automation system master station
CN112769851A (en) Mimicry defense system based on Internet of vehicles
CN112231726A (en) Access control method, device, computer equipment and readable storage medium
CN113032793A (en) Intelligent reinforcement system and method for data security
CN110049028A (en) Monitor method, apparatus, computer equipment and the storage medium of domain control administrator
CN114338105B (en) Zero trust based system for creating fort
CN109241769B (en) Electronic equipment privacy safety early warning method and system
CN109413114B (en) Network intrusion prevention system
CN111740973A (en) Intelligent defense system and method for block chain service and application
KR102139062B1 (en) Security Service system based on cloud
CN111600890A (en) Network security perception system based on big data
CN114760083B (en) Method, device and storage medium for issuing attack detection file
CN112187787B (en) Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
Cerullo et al. Enabling convergence of physical and logical security through intelligent event correlation
CN108134781B (en) Important information data secrecy monitoring system
CN116633594B (en) Flamingo gateway security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 230000 floors 4-5, building A1, Zhongguancun collaborative innovation Zhihui Park, the intersection of Nanfeihe road and Lanzhou Road, Baohe Economic Development Zone, Hefei, Anhui Province

Patentee after: Anhui Changtai Technology Co.,Ltd.

Address before: 210-d16, building A3, Hefei Innovation Industrial Park, No. 800, Wangjiang West Road, high tech Zone, Hefei City, Anhui Province 230000

Patentee before: ANHUI CHANGTAI INFORMATION SECURITY SERVICE Co.,Ltd.

CP03 Change of name, title or address