CN110266719A - Security strategy delivery method, device, equipment and medium - Google Patents
Security strategy delivery method, device, equipment and medium Download PDFInfo
- Publication number
- CN110266719A CN110266719A CN201910601709.XA CN201910601709A CN110266719A CN 110266719 A CN110266719 A CN 110266719A CN 201910601709 A CN201910601709 A CN 201910601709A CN 110266719 A CN110266719 A CN 110266719A
- Authority
- CN
- China
- Prior art keywords
- label
- terminal
- threat
- security strategy
- grading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000002716 delivery method Methods 0.000 title claims abstract description 26
- 230000015654 memory Effects 0.000 claims abstract description 36
- 238000012545 processing Methods 0.000 claims abstract description 22
- 238000000034 method Methods 0.000 claims abstract description 21
- 239000003550 marker Substances 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 238000007405 data analysis Methods 0.000 claims description 4
- 230000007423 decrease Effects 0.000 abstract description 4
- 241000282326 Felis catus Species 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000002155 anti-virotic effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000007123 defense Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 239000002023 wood Substances 0.000 description 2
- 241000287828 Gallus gallus Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 208000015181 infectious disease Diseases 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Burglar Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of security strategy delivery method, device, electronic equipment and storage mediums, it is related to network safety filed, when for solving the existing Cyberthreat defence of progress at the terminal, the problem of received security strategy of terminal excessively causes self performance to decline threatens label method includes the following steps: receiving;High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following formula: X=c/C*m/M, wherein X is terminal grading, c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value, and m is memory size, M is preset memory maximum value, issues quantity according to the determining high-risk threat label of grading height.The invention also discloses transmitting apparatus, electronic equipment and computer storage mediums under a kind of security strategy.The present invention is determined according to terminal hierarchies issues the quantity for threatening label, and terminal is made to carry out Cyberthreat defence in the case where not influencing self performance.
Description
Technical field
The present invention relates to network safety filed more particularly to a kind of security strategy delivery method, device, equipment and media.
Background technique
In recent years, many business and government units in the whole world had met with significant information leakage and assault, along with
Internet technology further deeply develops, the mature application of the new technologies such as Internet of Things, 5G and comprehensively universal, network safety event
Frequently occur, leaking data, security breaches quantity and seriousness break the new highest record in history repeatly, and national governments and department accordingly release network
Security developments planning, technical standard, laws and regulations are put into effect in succession, and network security gradually rises to national security level.
Enterprise often by increasing antivirus software, firewall software, management terminal in computer or device end, carrys out implementation information
With the stringent control of software, but these software section data need user to carry out judging result, and when use will affect the body of user
It tests;These softwares can also contact privacy of user data, and data is caused to there is the risk of leakage;The data volume size of collection is also difficult
With control, server-side needs a large amount of computing resources to handle.
Therefore, occur carrying out the defence and improvement of defending against network attacks and invasion on network source.
By network source establish network security protection system meet Cyberthreat defence the needs of, mainly by
Office network configures complete anti-intrusion set, antivirus equipment, professional mail server etc., or by disposing on network hinge
Large-scale analytical equipment and safety equipment, but the cost of these methods is very high, and professional person and profession is many times needed to set
It is standby to analyze secure data, and many data of enterprises belong to " data silo ", it is difficult to network safety prevention is carried out to it;Cause
This occurs issuing the technological means of security strategy on network-termination device, and security strategy is usually threat label, such as
The network information gathering that nonsensitive data is carried out in the terminals such as light cat, gateway issues threat label after handling by cloud analysis
To on network-termination device, terminal prevents threat according to threat label.
But as type, the quantity in the source of threat are more and more, and the processing capacity of the terminals such as light cat, gateway is limited, when
When cloud issues excessive security strategy, the network terminal when being executed can impact the performance of its own, handling capacity occur
The problems such as decline, upload or speed of download reduce.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of security strategy delivery method,
It is marked by grading to terminal according to the high-risk threat that grading height issues different number.
An object of the present invention is implemented with the following technical solutions:
A kind of security strategy delivery method, comprising the following steps:
It receives and threatens label;
High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following public affairs
Formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value,
M is memory size, and M is preset memory maximum value, is determined according to grading height and issues the high-risk size for threatening marker number.
Further, the high-risk threat marker number meets following formula: t=T*X, wherein t is the high-risk threat
Label issues quantity, and T is all quantity for threatening label.
Further, the reception threatens label, comprising the following steps:
The label of threat described in poll;
It is marked according to the polling result update high-risk threat and is issued to terminal strategy library.
Further, it includes having threat label, newly-increased threat label and failure to threaten label, institute that the threat, which marks,
The failure stated is threatened to be marked labeled as sluggish threat.
Further, issuing the failure threatens label to terminal, and the terminal unloading failure threatens label.
Further, it is scored according to the liveness in the source of threat, liveness is higher, scores higher, filters out described
Label is threatened, described to threaten the threat source for being labeled as being higher than default scoring, the default scoring is the threat of default lowest score
Source, it is described that label is threatened to issue the high-risk threat label from high to low according to scoring.
Further, it is scored according to the liveness in the source of threat, comprising:
According to the source of threat at one of cloud analysis center, the frequency of occurrences of information center and white list library, time, distance
Or it is a variety of score, the cloud analysis center be big data analysis platform, the information center be network security test
Room, the white list library are the safe library url and IP crawled.
The second object of the present invention is to provide transmitting apparatus under a kind of security strategy, by grading to terminal, root
The high-risk threat label of different number is issued according to grading height.
The second object of the present invention is implemented with the following technical solutions:
Transmitting apparatus under a kind of security strategy comprising:
Receiving module threatens label for receiving;
Distribution module, for issuing high-risk threat label to terminal strategy library according to terminal grading;The terminal grading side
Method meets following formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is at preset CPU
Reason ability maximum value, m are memory size, and M is preset memory maximum value, determine that issuing high-risk threat marks according to grading height
The size of quantity.
The third object of the present invention is to provide the electronic equipment for executing one of goal of the invention comprising processor, storage
Medium and computer program, the computer program are stored in storage medium, and the computer program is executed by processor
Shi Shixian above-mentioned security strategy delivery method.
The fourth object of the present invention is to provide the computer readable storage medium of one of storage goal of the invention, store thereon
There is computer program, the computer program realizes above-mentioned security strategy delivery method when being executed by processor.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is determined by being graded according to the processing capacity of the terminals such as light cat, gateway to it according to grading height
It is issued to the threat marker number of terminal, will not be marked because receiving excessive threaten while making to carry out network safety prevention by terminal
Note causes its own performance to decline.
Detailed description of the invention
Fig. 1 is the security strategy delivery method flow chart of embodiment one;
Fig. 2 is that the cloud of embodiment one threatens label scoring flow chart;
Fig. 3 is that the terminal of embodiment three receives threat label flow chart;
Fig. 4 is the structural block diagram of transmitting apparatus under example IV security strategy;
Fig. 5 is the structural block diagram of the electronic equipment of embodiment five.
Specific embodiment
Below with reference to attached drawing, the present invention is described in more detail, it should be noted that right referring to the drawings
The description that the present invention carries out is only illustrative, and not restrictive.It can be combined with each other between each difference embodiment,
To constitute the other embodiments not shown in the following description.
Embodiment one
Embodiment one provides a kind of security strategy delivery method, by big according to the CPU processing capacity and memory of terminal
It is small to grade to terminal, and according to grading issue different number threat mark, in this way, can make terminal into
When row intimidation defense, terminal capabilities will not be caused to decline because received threat is labeled more.
It please refers to shown in Fig. 1, a kind of security strategy delivery method, comprising the following steps:
It receives and threatens label, label is threatened to can be the compacted source IP of deadlock wood of threat, the fraud chain for having fallacious message to obtain
Connect URL, white list IP, the library white list URL;There are file, the picture MD5 cryptographic Hash etc. of threat;
High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following public affairs
Formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value,
M is memory size, and M is preset memory maximum value, is determined according to grading height and issues the high-risk size for threatening marker number.
Can using the CPU processing capacity and memory of the light cat of existing highest standard or gateway as preset maximum value,
Preset maximum value can be set according to actual needs.
In addition, terminal is not limited to gateway or light cat, the terminal for having Cyberthreat defense function can be according to this
Method issues security strategy, such as mobile phone, tablet computer etc..
The high-risk threat marker number meets following formula: t=T*X, wherein t is under the high-risk threat label
Quantity is sent out, T is all quantity for threatening label.This formula is a determining high-risk method for threatening marker number, but simultaneously
Formula without being limited thereto can also use other formula relevant to grading X or function, the high-risk prestige usually issued according to demand
Side of body label highest can achieve 100,000 or more, minimum, directly issues 1000 high-risk threat and marks.
It shown in referring to figure 2., is scored according to the liveness in the source of threat, liveness is higher, scores higher, filters out institute
The threat label stated, described to threaten labeled as the threat source for being higher than default scoring, the default scoring is default lowest score
Threat source, it is described that label is threatened to issue the high-risk threat label from high to low according to scoring.
It is scored according to the liveness in the source of threat, comprising:
According to the source of threat at one of cloud analysis center, the frequency of occurrences of information center and white list library, time, distance
Or it is a variety of score, the cloud analysis center be big data analysis platform, usually network safety platform is according to big data
Comprehensive obtained threat data library, the information center are network security laboratories, and network security laboratories are usually network
Threat data library inside security platform, the white list library are the safe library URL and IP crawled, threaten the scoring in source beyond the clouds
It completes.
Such as have the IP of threat for one, according to this IP going out in cloud analysis center, information center and white list library
Existing frequency, time, distance score, and for this IP not with white list storehouse matching, the frequency of occurrences is higher and is the prestige first appeared
Then its scoring is higher in side of body source.
Wherein, threaten label that can save and update by global policies library, according to terminal grading by threat label scoring
High-risk threat label is issued from high to low to terminal strategy library.
It should be noted that above method is a citing for filtering out and label and high-risk threat being threatened to mark, as long as
It is that can the other methods that threat source is scored can be achieved with the screening that label is threatened in security strategy delivery method.
Embodiment two
Embodiment is threatened by poll and is marked second is that the improvement carried out on the basis of embodiment one, ensures terminal security
The availability of strategy.
A kind of security strategy delivery method, comprising the following steps:
It receives and threatens label;
High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following public affairs
Formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value,
M is memory size, and M is preset memory maximum value, is determined according to grading height and issues the high-risk size for threatening marker number.
The high-risk threat marker number meets following formula: t=T*X, wherein t is under the high-risk threat label
Quantity is sent out, T is all quantity for threatening label.
Poll is specifically for the received poll for threatening label to carry out comprising following steps:
Poll threatens label;
High-risk threat label is updated according to polling result and is issued to terminal strategy library.
Specifically, the threat of preset quantity (such as 10000) is marked and is issued before being scored according to preset time automatic regular polling
To terminal strategy library, if being graded according to terminal, when the high-risk threat issued marks insufficient preset quantity, then according under polling result
The high-risk threat of hair respective numbers marks to update terminal strategy library, preset time usually minimum 24 hours, can be according to demand
It is set.
Embodiment three
Embodiment on the basis of embodiment one or/and embodiment two third is that carry out, by unloading on terminal strategy library
It carries failure and threatens label, guarantee the validity of terminal security policy library.
Shown in referring to figure 3., threatening label includes having threat label, newly-increased label and failure being threatened to threaten label, institute
The failure stated is threatened labeled as threat label sluggish, that scoring is low, and the newly-increased threat label is high-risk threat label
In a part or be polled to threaten label in a part.The newly-increased threat label and failure that terminal loads receive threaten mark
Remember and run, threaten label to be unloaded according to the failure received, newly-increased threat label is added to terminal strategy library;According to terminal
High-risk threat label in policy library carries out Prevention-Security, blocks and does not match with the high-risk data flow for threatening indicia matched, clearance
Successful data flow.
Wherein, the failure threatens label both can obtain and can also obtain in poll by receiving to threaten to mark.
Failure threatens label by obtaining after the scoring screening of cloud, for example, original threat source A is the common of the stiff compacted infection of wood
The external IP of broiler chicken (host controlled) is defined as threatening label by cloud, this host has been over time, become
It is no longer active, it may be cleared up by refitting system or by antivirus software, then cloud judges that it threatens mark for failure
Note threatens A that will unload from terminal strategy library.
Example IV
Example IV discloses a kind of corresponding device of security strategy delivery method of corresponding above-described embodiment, is above-mentioned reality
The virtual device structure of example is applied, it is shown referring to figure 4., comprising:
Receiving module 110 threatens label for receiving;
Distribution module 120, for issuing high-risk threat label to terminal strategy library according to terminal grading;The terminal grading
Method meets following formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU
Processing capacity maximum value, m are memory size, and M is preset memory maximum value, determine that issuing high-risk threat marks according to grading height
The size of numeration amount.
Preferably, the high-risk threat marker number meets following formula: t=T*X, wherein t is the high-risk threat mark
Note issues quantity, and T is all quantity for threatening label.
Preferably, the reception threatens label, comprising the following steps:
The label of threat described in poll;
It is marked according to the polling result update high-risk threat and is issued to terminal strategy library.
It includes having threat label, newly-increased threat label and failure to threaten label, the failure that the threat, which marks,
It threatens and is marked labeled as sluggish threat.
Issuing the failure threatens label to terminal, and the terminal unloading failure threatens label.
Preferably, cloud is scored according to the frequency of occurrences and time gap in the source of threat, filters out the threat mark
Note, the high-risk threat is labeled as the threat label for threatening high scoring in label.
The cloud includes cloud analysis center, information center and white list library, and the cloud analysis center is big data
Analysis platform, the information center are network security laboratories, and the white list library is the safe library url and IP crawled.
Embodiment five
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that the embodiment of the present invention five provides, as shown in figure 5, the electronics is set
Standby includes processor 210, memory 220, input unit 230 and output device 240;The number of processor 210 in computer equipment
It measures and can be one or more, in Fig. 5 by taking a processor 210 as an example;Processor 210, memory 220 in electronic equipment,
Input unit 230 can be connected with output device 240 by bus or other modes, in Fig. 5 for being connected by bus.
Memory 220 is used as a kind of computer readable storage medium, can be used for storing software program, journey can be performed in computer
Sequence and module, as in the embodiment of the present invention the corresponding program instruction/module of platform of internet of things Parameter Switch method (for example,
Receiving module 110, distribution module 120 under security strategy in transmitting apparatus).Processor 210 is stored in memory 220 by operation
In software program, instruction and module realize thereby executing the various function application and data processing of electronic equipment
State the security strategy delivery method of embodiment one to embodiment three.
Memory 220 can mainly include storing program area and storage data area, wherein storing program area can store operation system
Application program needed for system, at least one function;Storage data area, which can be stored, uses created data etc. according to terminal.This
Outside, memory 220 may include high-speed random access memory, can also include nonvolatile memory, for example, at least one
Disk memory, flush memory device or other non-volatile solid state memory parts.In some instances, memory 220 can be into one
Step includes the memory remotely located relative to processor 210, these remote memories can be set by network connection to electronics
It is standby.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Input unit 230 can be used for inputting identity information, the preset CPU processing capacity of definition, memory etc..Output device
240 may include that display screen etc. shows equipment.
Embodiment six
The embodiment of the present invention six also provides a kind of storage medium comprising computer executable instructions, and the computer can be held
Row instruction is used to execute security strategy delivery method when being executed by computer processor, this method comprises:
It receives and threatens label;
High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following public affairs
Formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value,
M is memory size, and M is preset memory maximum value, is determined according to grading height and issues the high-risk size for threatening marker number.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention
The method operation that executable instruction is not limited to the described above can also be performed provided by any embodiment of the invention based on safety
Relevant operation in policy distribution method.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention
It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more
Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art
Part can be embodied in the form of software products, which can store in computer readable storage medium
In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer
Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions use so that an electronic equipment
(can be mobile phone, personal computer, server or the network equipment etc.) executes method described in each embodiment of the present invention.
It is worth noting that, in the above-mentioned embodiment based on security strategy delivery method device, included each unit
It is only divided according to the functional logic, but is not limited to the above division with module, as long as can be realized corresponding function
Energy;In addition, the specific name of each functional unit is also only for convenience of distinguishing each other, the guarantor being not intended to restrict the invention
Protect range.
It will be apparent to those skilled in the art that can make various other according to the above description of the technical scheme and ideas
Corresponding change and deformation, and all these changes and deformation all should belong to the protection scope of the claims in the present invention
Within.
Claims (10)
1. a kind of security strategy delivery method, which comprises the following steps:
It receives and threatens label;
High-risk threat label is issued to terminal strategy library according to terminal grading;The terminal ranking method meets following formula: X=
C/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is preset CPU processing capacity maximum value, and m is interior
Size is deposited, M is preset memory maximum value, issues quantity according to the determining high-risk threat label of grading height.
2. security strategy delivery method as described in claim 1, which is characterized in that the high-risk threat marker number meet with
Lower formula: t=T*X, wherein t is the high-risk quantity that issues for threatening label, and T is the quantity for threatening label.
3. security strategy delivery method as described in claim 1, which is characterized in that the reception threatens label, including following
Step:
The label of threat described in poll;
It is marked according to the polling result update high-risk threat and is issued to terminal strategy library.
4. security strategy delivery method as described in any one of claims 1-3, which is characterized in that the threat, which marks, includes
Have threat label, newly-increased threat label and failure and threaten label, the failure threat is marked labeled as sluggish threat.
5. security strategy delivery method as claimed in claim 4, which is characterized in that issue the failure and threaten label to end
End, the terminal unloading failure threaten label.
6. security strategy delivery method as described in any one of claims 1-3, which is characterized in that according to the liveness in the source of threat
It scores, liveness is higher, scores higher, filters out the threat label, and described threaten is labeled as being higher than default scoring
Threat source, the default scoring is the threat source of default lowest score, and the threats label issues from high to low according to scoring
The high-risk threat label.
7. security strategy delivery method as claimed in claim 6, which is characterized in that commented according to the liveness in the source of threat
Point, comprising:
According to threaten source cloud analysis center, the frequency of occurrences of information center and white list library, the time, distance one of or it is more
Kind scores, and the cloud analysis center is big data analysis platform, and the information center is network security laboratories, institute
Stating white list library is the safe library ur1 and IP crawled.
8. transmitting apparatus under a kind of security strategy, characterized in that it comprises:
Receiving module threatens label for receiving;
Distribution module, for issuing high-risk threat label to terminal strategy library according to terminal grading;The terminal ranking method symbol
Close following formula: X=c/C*m/M, wherein X is terminal grading, and c is terminal CPU processing capacity, and C is that preset CPU handles energy
Power maximum value, m are memory size, and M is preset memory maximum value, issue high-risk threat marker number according to grading height determination
Size.
9. a kind of electronic equipment comprising processor, storage medium and computer program, the computer program are stored in
In storage media, which is characterized in that realize that claim 1 to 7 is described in any item when the computer program is executed by processor
Security strategy delivery method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
Claim 1 to 7 described in any item security strategy delivery methods are realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910601709.XA CN110266719B (en) | 2019-07-04 | 2019-07-04 | Security policy issuing method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910601709.XA CN110266719B (en) | 2019-07-04 | 2019-07-04 | Security policy issuing method, device, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110266719A true CN110266719A (en) | 2019-09-20 |
CN110266719B CN110266719B (en) | 2021-08-13 |
Family
ID=67924521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910601709.XA Expired - Fee Related CN110266719B (en) | 2019-07-04 | 2019-07-04 | Security policy issuing method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266719B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112399419A (en) * | 2020-12-01 | 2021-02-23 | 天翼电子商务有限公司 | Threat equipment identification method based on dynamic rule |
CN112788039A (en) * | 2021-01-15 | 2021-05-11 | 合肥浩瀚深度信息技术有限公司 | DDoS attack identification method, device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101160876B (en) * | 2005-10-15 | 2011-02-16 | 华为技术有限公司 | Network security control method and system |
US20170013002A1 (en) * | 2015-07-07 | 2017-01-12 | Accenture Global Services Limited | Threat assessment level determination and remediation for a cloud-based multi-layer security architecture |
CN106341386A (en) * | 2015-07-07 | 2017-01-18 | 埃森哲环球服务有限公司 | Threat assessment level determination and remediation for cloud-based multi-layer security architecture |
CN108494802A (en) * | 2018-05-22 | 2018-09-04 | 广西电网有限责任公司 | Key message infrastructure security based on artificial intelligence threatens Active Defending System Against |
CN109257326A (en) * | 2017-07-14 | 2019-01-22 | 东软集团股份有限公司 | The method, apparatus and storage medium and electronic equipment for defending data flow to attack |
-
2019
- 2019-07-04 CN CN201910601709.XA patent/CN110266719B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101160876B (en) * | 2005-10-15 | 2011-02-16 | 华为技术有限公司 | Network security control method and system |
US20170013002A1 (en) * | 2015-07-07 | 2017-01-12 | Accenture Global Services Limited | Threat assessment level determination and remediation for a cloud-based multi-layer security architecture |
CN106341386A (en) * | 2015-07-07 | 2017-01-18 | 埃森哲环球服务有限公司 | Threat assessment level determination and remediation for cloud-based multi-layer security architecture |
CN109257326A (en) * | 2017-07-14 | 2019-01-22 | 东软集团股份有限公司 | The method, apparatus and storage medium and electronic equipment for defending data flow to attack |
CN108494802A (en) * | 2018-05-22 | 2018-09-04 | 广西电网有限责任公司 | Key message infrastructure security based on artificial intelligence threatens Active Defending System Against |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112399419A (en) * | 2020-12-01 | 2021-02-23 | 天翼电子商务有限公司 | Threat equipment identification method based on dynamic rule |
CN112788039A (en) * | 2021-01-15 | 2021-05-11 | 合肥浩瀚深度信息技术有限公司 | DDoS attack identification method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110266719B (en) | 2021-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10938850B2 (en) | Method and apparatus for reducing security risk in a networked computer system architecture | |
EP3207487B1 (en) | Systems and methods for classifying security events as targeted attacks | |
RU2477929C2 (en) | System and method for prevention safety incidents based on user danger rating | |
EP2741227B1 (en) | Method, system, client and server for scanning file | |
CN104246785A (en) | System and method for crowdsourcing of mobile application reputations | |
CN110149318B (en) | Mail metadata processing method and device, storage medium and electronic device | |
US10909198B1 (en) | Systems and methods for categorizing electronic messages for compliance reviews | |
CN110266719A (en) | Security strategy delivery method, device, equipment and medium | |
CN115632874A (en) | Method, device, equipment and storage medium for detecting threat of entity object | |
CN113987508A (en) | Vulnerability processing method, device, equipment and medium | |
CN114301757B (en) | Network asset processing method, device, equipment and storage medium | |
US8949979B1 (en) | Protecting local users from remote applications | |
CN110138723A (en) | The determination method and system of malice community in a kind of mail network | |
CN118233217B (en) | Multi-level characteristic firewall system and medium for internal and external network | |
JP6857627B2 (en) | White list management system | |
US20240333738A1 (en) | Detecting multi-segment malicious email attacks | |
CN111010302B (en) | Security monitoring method and device for mobile terminal, electronic equipment and storage medium | |
CN112395537A (en) | Website tamper-proofing method and device, storage medium and electronic device | |
CN114143075A (en) | Security vulnerability early warning method and device and electronic equipment | |
CN114338175A (en) | Data collection management system and data collection management method | |
CN117640127A (en) | Method, device, medium and equipment for predicting audio/video attack scale | |
CN113901469A (en) | Container mirror image storage method, system, computer equipment and computer storage medium | |
CN117792768A (en) | Vulnerability identification and decision tree construction method, device, equipment and medium | |
CN117081776A (en) | Alarm data reporting system, alarm data reporting method and device | |
CN117354060A (en) | Method, system and medium for detecting loopholes of cloud computing IaaS layer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210813 |
|
CF01 | Termination of patent right due to non-payment of annual fee |