CN1917514A - Method for building globle network safety system in tracing to the source in each sub domain - Google Patents
Method for building globle network safety system in tracing to the source in each sub domain Download PDFInfo
- Publication number
- CN1917514A CN1917514A CN 200610011219 CN200610011219A CN1917514A CN 1917514 A CN1917514 A CN 1917514A CN 200610011219 CN200610011219 CN 200610011219 CN 200610011219 A CN200610011219 A CN 200610011219A CN 1917514 A CN1917514 A CN 1917514A
- Authority
- CN
- China
- Prior art keywords
- security
- source
- tracing
- control point
- territory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 13
- 238000007689 inspection Methods 0.000 claims abstract description 6
- 230000004044 response Effects 0.000 claims abstract description 4
- 238000010276 construction Methods 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 10
- 238000011217 control strategy Methods 0.000 claims description 8
- 238000001914 filtration Methods 0.000 claims description 6
- 235000021472 generally recognized as safe Nutrition 0.000 claims description 6
- 238000002955 isolation Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000008569 process Effects 0.000 claims description 4
- 230000002155 anti-virotic effect Effects 0.000 claims description 3
- 238000000638 solvent extraction Methods 0.000 abstract 1
- 230000002950 deficient Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000002265 prevention Effects 0.000 description 3
- 239000002131 composite material Substances 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100112197A CN100563249C (en) | 2006-01-18 | 2006-01-18 | The trace to the source construction method of formula global network security system of a kind of minute territory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100112197A CN100563249C (en) | 2006-01-18 | 2006-01-18 | The trace to the source construction method of formula global network security system of a kind of minute territory |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1917514A true CN1917514A (en) | 2007-02-21 |
CN100563249C CN100563249C (en) | 2009-11-25 |
Family
ID=37738409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100112197A Expired - Fee Related CN100563249C (en) | 2006-01-18 | 2006-01-18 | The trace to the source construction method of formula global network security system of a kind of minute territory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100563249C (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102281295A (en) * | 2011-08-06 | 2011-12-14 | 黑龙江大学 | Method for easing distributed denial of service attacks |
CN102497382A (en) * | 2011-12-26 | 2012-06-13 | 苏州风采信息技术有限公司 | Method of security confidentiality strategy |
CN101729569B (en) * | 2009-12-22 | 2013-04-17 | 成都市华为赛门铁克科技有限公司 | Distributed Denial of Service (DDOS) attack protection method, device and system |
CN103139165A (en) * | 2011-11-30 | 2013-06-05 | 中国民航大学 | Entity impersonation attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain |
US9088607B2 (en) | 2009-12-28 | 2015-07-21 | Huawei Digital Technologies (Cheng Du) Co., Limited | Method, device, and system for network attack protection |
CN105592016A (en) * | 2014-10-29 | 2016-05-18 | 国家电网公司 | Virtual machine protection device of power information system in cloud environment |
CN106209808A (en) * | 2016-07-01 | 2016-12-07 | 中国联合网络通信有限公司重庆市分公司 | A kind of encapsulation management and control safety protecting method of information system group |
CN108156079A (en) * | 2017-12-29 | 2018-06-12 | 深信服网络科技(深圳)有限公司 | A kind of data packet forwarding system and method based on cloud service platform |
CN113839929A (en) * | 2021-09-06 | 2021-12-24 | 深圳Tcl新技术有限公司 | Information security improving method and device, electronic equipment and storage medium |
CN115622809A (en) * | 2022-12-14 | 2023-01-17 | 浙江中电远为科技有限公司 | Internal and external network safety isolation system for application scene of secret cabinet |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7024686B2 (en) * | 2000-05-15 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | Secure network and method of establishing communication amongst network devices that have restricted network connectivity |
CN1310526A (en) * | 2001-04-06 | 2001-08-29 | 北京网警创新信息安全技术有限公司 | Illegal network activity intercepting, monitoring, tracing, evidence collecting and emergency reacting system and method |
CN1180359C (en) * | 2001-08-01 | 2004-12-15 | 苏毅 | Control method of network connection and separation |
CN1553624A (en) * | 2003-12-19 | 2004-12-08 | 上海交通大学 | Method based on active network returning technology against refuse service attack |
-
2006
- 2006-01-18 CN CNB2006100112197A patent/CN100563249C/en not_active Expired - Fee Related
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729569B (en) * | 2009-12-22 | 2013-04-17 | 成都市华为赛门铁克科技有限公司 | Distributed Denial of Service (DDOS) attack protection method, device and system |
US9088607B2 (en) | 2009-12-28 | 2015-07-21 | Huawei Digital Technologies (Cheng Du) Co., Limited | Method, device, and system for network attack protection |
CN102281295B (en) * | 2011-08-06 | 2015-01-21 | 黑龙江大学 | Method for easing distributed denial of service attacks |
CN102281295A (en) * | 2011-08-06 | 2011-12-14 | 黑龙江大学 | Method for easing distributed denial of service attacks |
CN103139165A (en) * | 2011-11-30 | 2013-06-05 | 中国民航大学 | Entity impersonation attack penetration testing method aiming at aircraft communication addressing and reporting system (ACARS) data chain |
CN102497382A (en) * | 2011-12-26 | 2012-06-13 | 苏州风采信息技术有限公司 | Method of security confidentiality strategy |
CN105592016A (en) * | 2014-10-29 | 2016-05-18 | 国家电网公司 | Virtual machine protection device of power information system in cloud environment |
CN105592016B (en) * | 2014-10-29 | 2019-04-30 | 国家电网公司 | The protective device of virtual machine under a kind of cloud environment of power information system |
CN106209808B (en) * | 2016-07-01 | 2019-05-03 | 中国联合网络通信有限公司重庆市分公司 | A kind of encapsulation control safety protecting method of information system group |
CN106209808A (en) * | 2016-07-01 | 2016-12-07 | 中国联合网络通信有限公司重庆市分公司 | A kind of encapsulation management and control safety protecting method of information system group |
CN108156079A (en) * | 2017-12-29 | 2018-06-12 | 深信服网络科技(深圳)有限公司 | A kind of data packet forwarding system and method based on cloud service platform |
CN108156079B (en) * | 2017-12-29 | 2021-08-13 | 深信服科技股份有限公司 | Data packet forwarding system and method based on cloud service platform |
CN113839929A (en) * | 2021-09-06 | 2021-12-24 | 深圳Tcl新技术有限公司 | Information security improving method and device, electronic equipment and storage medium |
CN113839929B (en) * | 2021-09-06 | 2024-01-19 | 深圳Tcl新技术有限公司 | Information security improvement method and device, electronic equipment and storage medium |
CN115622809A (en) * | 2022-12-14 | 2023-01-17 | 浙江中电远为科技有限公司 | Internal and external network safety isolation system for application scene of secret cabinet |
CN115622809B (en) * | 2022-12-14 | 2023-03-03 | 浙江中电远为科技有限公司 | Internal and external network safety isolation system for application scene of secret cabinet |
Also Published As
Publication number | Publication date |
---|---|
CN100563249C (en) | 2009-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1917514A (en) | Method for building globle network safety system in tracing to the source in each sub domain | |
US7757285B2 (en) | Intrusion detection and prevention system | |
Ellis et al. | A behavioral approach to worm detection | |
US8020211B2 (en) | Network security system having a device profiler communicatively coupled to a traffic monitor | |
Qiu et al. | Detecting bogus BGP route information: Going beyond prefix hijacking | |
US20050108415A1 (en) | System and method for traffic analysis | |
US20040193943A1 (en) | Multiparameter network fault detection system using probabilistic and aggregation analysis | |
US20040078592A1 (en) | System and method for deploying honeypot systems in a network | |
Gonzalez et al. | A trust-based approach against IP-spoofing attacks | |
Chang et al. | Deciduous: Decentralized source identification for network-based intrusions | |
CN109327426A (en) | A kind of firewall attack defense method | |
WO2003065186A1 (en) | Network monitoring system | |
KR20110070189A (en) | Malicious traffic isolation system using botnet infomation and malicious traffic isolation method using botnet infomation | |
CA2545753A1 (en) | Method and apparatus for identifying and disabling worms in communication networks | |
KR20010095337A (en) | Firewall system combined with embeded hardware and general-purpose computer | |
Cuppens et al. | Handling stateful firewall anomalies | |
US7596808B1 (en) | Zero hop algorithm for network threat identification and mitigation | |
KR100523483B1 (en) | The system and method of malicious traffic detection and response in network | |
CN111641639B (en) | IPv6 network safety protection system | |
Yu et al. | An adaptive approach to network resilience: Evolving challenge detection and mitigation | |
Ismail et al. | Malicious cluster head detection mechanism in wireless sensor networks | |
Meena et al. | HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation | |
Al-Shareeda et al. | Sadetection: Security mechanisms to detect slaac attack in ipv6 link-local network | |
KR20020075319A (en) | Intelligent Security Engine and Intelligent and Integrated Security System Employing the Same | |
Bouzida et al. | Detecting and reacting against distributed denial of service attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: G-CLOUD TECHNOLOGY CO., LTD. Free format text: FORMER OWNER: INSTITUTE OF COMPUTING TECHNOLOGY, CHINESE ACADEMY OF SCIENCES Effective date: 20130123 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 100080 HAIDIAN, BEIJING TO: 523808 DONGGUAN, GUANGDONG PROVINCE |
|
TR01 | Transfer of patent right |
Effective date of registration: 20130123 Address after: 523808 Guangdong province Dongguan City Songshan Lake Science and Technology Industrial Park Building No. 14 Keyuan pine Patentee after: G-CLOUD TECHNOLOGY Co.,Ltd. Address before: 100080 Haidian District, Zhongguancun Academy of Sciences, South Road, No. 6, No. Patentee before: Institute of Computing Technology, Chinese Academy of Sciences |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20151130 Address after: 028021, the Inner Mongolia Autonomous Region, Tongliao Tongliao economic and Technological Development Zone, the former building of the former armed police Patentee after: Inner Mongolia state cloud Technology Co.,Ltd. Address before: 523808 Guangdong province Dongguan City Songshan Lake Science and Technology Industrial Park Building No. 14 Keyuan pine Patentee before: G-CLOUD TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |
Effective date of registration: 20200106 Address after: 523808 19th Floor, Cloud Computing Center, Chinese Academy of Sciences, No. 1 Kehui Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Province Patentee after: G-CLOUD TECHNOLOGY Co.,Ltd. Address before: 028021, the Inner Mongolia Autonomous Region, Tongliao Tongliao economic and Technological Development Zone, the former building of the former armed police Patentee before: Inner Mongolia state cloud Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20091125 |