CN109862042A - A kind of isomeric network security reinforcement means and device - Google Patents

A kind of isomeric network security reinforcement means and device Download PDF

Info

Publication number
CN109862042A
CN109862042A CN201910239605.9A CN201910239605A CN109862042A CN 109862042 A CN109862042 A CN 109862042A CN 201910239605 A CN201910239605 A CN 201910239605A CN 109862042 A CN109862042 A CN 109862042A
Authority
CN
China
Prior art keywords
network security
product
reinforcement means
isomeric
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910239605.9A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiping Technology (hangzhou) Co Ltd
Original Assignee
Taiping Technology (hangzhou) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiping Technology (hangzhou) Co Ltd filed Critical Taiping Technology (hangzhou) Co Ltd
Priority to CN201910239605.9A priority Critical patent/CN109862042A/en
Publication of CN109862042A publication Critical patent/CN109862042A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of isomeric network security reinforcement means and devices, effectively reduce single safety product and protect faced security risk and security risk.The invention contains step 1: one group of selection has the heterogeneous network safety product of BYPASS function;Step 2: network security product is subjected to series connection deployment, while BYPASS function of the activation single product with group input/output port in deployment in a transparent mode;Step 3: according to needs are applied, redundant deployment security function similar or identical or strategy configuration, at least 2 products realize one or more security functions or strategy similar or identical by configuring on network security products at different levels.

Description

A kind of isomeric network security reinforcement means and device
Technical field
The present invention relates to technical field of network security, more particularly, to a kind of isomeric network security reinforcement means and Device.
Background technique
In face of increasingly complicated Network Security Environment, the usual network user can select various network security products to trusted domain System and equipment carry out security protection.Common safeguard procedures include but is not limited to firewall (FW), intrusion detection (IDS), Intrusion prevention (IPS), viral wooden horse filtering (AV), network address filtering (URL) etc..
With the rise of network security industry, all kinds of producers have developed various nets also based on respective platform or general flat hair Network safety product, every money product include one or more above-mentioned safeguard functions.Each producer adopts according to respective risk sample simultaneously Collection channel and research direction are continuously replenished and improve feature database (including but not limited to protocal analysis library, address base, the virus of product Condition code), detection defence engine etc. and product loophole patch etc..
By traditional deployment mode, it will usually dispose above-mentioned network security product according to application demand on protection boundary.But In practical applications, due to being limited to the protection feature of single product and the deployment architecture of limitation, however it remains Bu Shaowen Topic, it is mainly shown as:
1, network security product itself also has technological deficiency, the regular hour is needed from disfigurement discovery to patch is provided, even if needle To same class defect, the mending option time provided by each producer is also different, and the time is longer, and security risk is higher;
2, different manufacturers are different to the research direction and method of network security product, and the product of none producer can be to known Or unknown all safety problems carry out all effectively detections and defence, the publication quality of feature database and time are different, using list The anti-probability of the leakage of one product is higher;
3, there is also potential back door or loopholes for network security product itself, also or since unreasonable allocation causes protection to be leaked Once utilization, consequence is hardly imaginable for hole, these back doors or loophole;
4, single product, which is easy to be visited by various networks, smells means aware device brand, model and version, and attacker is facilitated to utilize Existing means carry out attack.
Summary of the invention
The contents of the present invention are to overcome the above problem and provide a kind of more scientific, firm network security reinforcing side Method, this method based on isomerism principle, realized by the selection of effective product and deployment architecture design.Pass through this Kind method further promotes the protective capacities of total system, while can also effectively promote the reliability of integral protection system.
The present invention provides a kind of network security reinforcement means having follow steps:
Step 1: one group of heterogeneous network safety product with BYPASS function of selection;
Step 2: network security product being subjected to series connection deployment in a transparent mode, while single product being activated to pass with group input and output The BYPASS function of defeated port;
Step 3: according to apply needs, redundant deployment security function similar or identical or strategy on network security products at different levels Configuration.
The quantity of one group of network security product described in step 1 is no less than 2, and product can be pure hardware, soft or hard one Body equipment or pure software, at the same in a selected set product at least 2 products may be implemented it is one or more identical and/or Similar functions.
Isomery described in step 1 refers to the production for realizing 1 or multinomial identical and/or similar network safety prevention function Product are necessary for the product of different manufacturers or the same producer different series that there were significant differences.The significant difference closely stated refers to different productions Hardware structure or operating system used by product or application system or feature database have apparent difference or different ways of realization.
Further, single product can define or one or more groups of inputs of configuration, output port have BYPASS function.
Transparent mode described in step 2 refers to that applying for one group of input and output both ends of product is saturating in normal discharge application It is bright noninductive.
Further, the BYPASS function of the same group input and output transmission port of single product allocation activation in deployment.? Product failure and/or power loss and/or crash and/or restart when causing product failure, BYPASS function comes into force, with organizing transmission port Bypass channel is realized, using not interrupting.
Redundant deployment described in step 3 refers at least 2 different specific products by configuring realization 1 or multinomial Security function or strategy similar or identical.
Compared with existing dispositions method, the invention has the following advantages that overcoming the protection energy of single factory or product Power unicity increases the difficulty of network attack;Equipment failure is encountered when efficiently solving the deployment of single network safety equipment to draw Sending out safeguard function, all failure or application are interrupted;It, can for specific security threat using different manufacturers ability and major differences System is set to obtain protective capacities in optimal time;The profession and capacity variance of comprehensive selected disparate networks safety product, realize choosing With the maximum set of protective capacities in product mix;Serial homogeneity functional configuration is carried out using isomate, reduces single device Unreasonable allocation caused by protect loophole risk;Using multilayer heterogeneous deployment architecture, attacker only finds out outermost layer Safeguard information, the information of postposition safeguard is difficult to visit to smell on the outside to know, the time of success attack is effectively prolonged It is long.
Detailed description of the invention
Fig. 1 is a kind of functional block diagram of network security reinforcement means of the present invention;
Fig. 2 is a kind of structural block diagram of network security bracing means of the present invention.
Specific embodiment
The isomeric network security reinforcement means of the present invention is made with reference to the accompanying drawings and detailed description further Explanation.
Embodiment 1, shown in Figure 1, a kind of isomeric network security reinforcement means, steps are as follows:
1. being directed to a certain safeguard function m, we select the network security product (n >=2) of n isomery;
2. network security product is disposed and connected in a transparent mode, BYPASS function of the single product with group transmission port The allocation activation in deployment;
3. the prevention policies that redundant deployment is similar or identical on network security products at different levels configure according to needs are applied;
4. successively passing through the detection of n grades of products after network, which accesses, arrives at guard system, discovery, which exists to meet, defines protection plan When the attack omited, the product by being detected attack is blocked, and is otherwise let pass;
5. BYPASS function comes into force when wherein certain grade of product failure, access is directly let pass by bypass circuit.
Embodiment 2, shown in Figure 2, a kind of isomeric network security bracing means, steps are as follows:
1. one group of isomeric network security product of selection (n, n >=2), at least 2 productions in a selected set product One or more identical and/or similar functions may be implemented in product;
2. network security product is disposed and connected in a transparent mode, BYPASS function of the single product with group input/output terminal Can deployment when allocation activation;
3. redundant deployment security function similar or identical or strategy are matched on network security products at different levels according to needs are applied It sets;
4. successively passing through the detection of n grades of products after network, which accesses, arrives at guard system, discovery, which exists to meet, defines protection plan When the attack omited, the product by being detected attack is blocked, and is otherwise let pass;
5. BYPASS function comes into force when wherein certain grade of product failure, access is directly let pass by bypass circuit.
It should be noted that embodiment described above be merely for convenience of it will be understood by those skilled in the art that, and It is not used in and limits the scope of the invention, under the premise of not departing from inventive concept of the invention, those skilled in the art couple Any obvious replacement and improvement that the present invention is made etc. are within the scope of the present invention.

Claims (6)

1. a kind of isomeric network security reinforcement means and device, characterized by comprising the steps of:
Step 1: one group of isomeric network security product of selection;
Step 2: network security product is disposed and connected in a transparent mode;
Step 3: according to apply needs, redundant deployment security function similar or identical or strategy on network security products at different levels It configures, realizes one or more security functions or strategy similar or identical by configuring at least 2 products.
2. isomeric network security reinforcement means according to claim 1 and device, which is characterized in that single product Can define or configuration 1 group or multiple groups input, output port have BYPASS function.
3. isomeric network security reinforcement means according to claim 1 and device, which is characterized in that due to using Homogeneity deployment, and the product disposed has BYPASS function, simply by the presence of at least one product can normal use, total system Still has a part or all of safeguard function, during simultaneity factor will not cause to apply because of the safety product that certain level-one fails It is disconnected.
4. isomeric network security reinforcement means according to claim 1 and device, which is characterized in that due to using When the design of isomery framework, optimal in the defense function available product mix threatened for a certain particular safety come into force Between.
5. isomeric network security reinforcement means according to claim 1 and device, which is characterized in that due to using The design of isomery framework, the maximum set in the protective capacities of total system available product mix.
6. isomeric network security reinforcement means according to claim 1 and device, which is characterized in that due to using Multilayer heterogeneous, after reasonable disposition strategy, attacker only finds out outermost safeguard information, to postposition safeguard Information be difficult to visit to smell on the outside to know, the time of success attack is effectively extended.
CN201910239605.9A 2019-03-27 2019-03-27 A kind of isomeric network security reinforcement means and device Pending CN109862042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910239605.9A CN109862042A (en) 2019-03-27 2019-03-27 A kind of isomeric network security reinforcement means and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910239605.9A CN109862042A (en) 2019-03-27 2019-03-27 A kind of isomeric network security reinforcement means and device

Publications (1)

Publication Number Publication Date
CN109862042A true CN109862042A (en) 2019-06-07

Family

ID=66902061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910239605.9A Pending CN109862042A (en) 2019-03-27 2019-03-27 A kind of isomeric network security reinforcement means and device

Country Status (1)

Country Link
CN (1) CN109862042A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978873A (en) * 2022-04-22 2022-08-30 南京地铁集团有限公司 Monitoring method, system, device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050038790A1 (en) * 2001-09-20 2005-02-17 Stephen Wolthusen Device and method for establishing a security policy in a distributed system
CN105099825A (en) * 2015-08-17 2015-11-25 北京神州绿盟信息安全科技股份有限公司 Security protection method and device for external Bypass
CN105812326A (en) * 2014-12-29 2016-07-27 北京网御星云信息技术有限公司 Heterogeneous firewall strategy centralized control method and heterogeneous firewall strategy centralized control system
CN108337224A (en) * 2017-12-14 2018-07-27 兆辉易安(北京)网络安全技术有限公司 The industry control security gateway system and its invasion cognitive method of three mould isomery redundancies
CN109309687A (en) * 2018-11-27 2019-02-05 杭州迪普科技股份有限公司 Network security defence method, device and the network equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050038790A1 (en) * 2001-09-20 2005-02-17 Stephen Wolthusen Device and method for establishing a security policy in a distributed system
CN105812326A (en) * 2014-12-29 2016-07-27 北京网御星云信息技术有限公司 Heterogeneous firewall strategy centralized control method and heterogeneous firewall strategy centralized control system
CN105099825A (en) * 2015-08-17 2015-11-25 北京神州绿盟信息安全科技股份有限公司 Security protection method and device for external Bypass
CN108337224A (en) * 2017-12-14 2018-07-27 兆辉易安(北京)网络安全技术有限公司 The industry control security gateway system and its invasion cognitive method of three mould isomery redundancies
CN109309687A (en) * 2018-11-27 2019-02-05 杭州迪普科技股份有限公司 Network security defence method, device and the network equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978873A (en) * 2022-04-22 2022-08-30 南京地铁集团有限公司 Monitoring method, system, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN1885788B (en) Network safety protection method and system
EP3270564B1 (en) Distributed security provisioning
US7673147B2 (en) Real-time mitigation of data access insider intrusions
RU2679179C1 (en) Systems and methods for creating and modifying access lists
Alwakeel et al. A survey of network function virtualization security
US6584508B1 (en) Advanced data guard having independently wrapped components
CN101018200B (en) Bi-planar network architecture
US20050071643A1 (en) Method of and system for enterprise information asset protection through insider attack specification, monitoring and mitigation
US20070056020A1 (en) Automated deployment of protection agents to devices connected to a distributed computer network
CN105408911A (en) Hardware and software execution profiling
CN106446658A (en) Data center security protection method and system
CN109962912A (en) A kind of defence method and system based on the drainage of honey jar flow
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
CN109862042A (en) A kind of isomeric network security reinforcement means and device
Nasir et al. [Retracted] Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations
US8898332B2 (en) Methods, systems, devices and computer program products for protecting a network by providing severable network zones
Tanaka et al. IoT system security issues and solution approaches
CN117319064A (en) Network space safety management and control system based on trusted computing
CN110378120A (en) Application programming interfaces attack detection method, device and readable storage medium storing program for executing
CN110417769A (en) A kind of industry internet platform Multi Identity Attestation method
US20080068183A1 (en) Methods and apparatus for accessing, or providing access to, user-configurable or different response policies for different duress codes
CN106850701A (en) A kind of mobile terminal shares partition method and system
Kiru et al. Ransomware Evolution: Solving Ransomware Attack Challenges
Al-Alaj et al. A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions
Lau et al. Securing supervisory control and data acquisition control systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190607

WD01 Invention patent application deemed withdrawn after publication