Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

On the Evolution of illegal Outreach testing Technology

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

For isolated intranets, illegal outreach has always been the top priority of network boundary integrity protection because of its great harm.

Early illegal outreach mainly refers to the behavior of privately connecting to the Internet based on telephone dialing, early telephone dialing is still very convenient, such as 163 dialing, 263 dialing, etc., as long as there is a telephone line, you can dial the Internet at any time, but the disadvantage is that the network speed is slow and the charge is high. The detection technology for early telephone dialing is "dual-machine" detection, that is, one is deployed in the internal network as the scanning end, and the other is deployed on the Internet as the receiving end, the technical principle can be searched on the Internet, and the technology is relatively simple to realize. it's an out-of-date technology.

The rigid regulatory requirements for illegal outreach, coupled with the outdated "dual-computer" detection mode, managers have to accept the deployment of client software on the terminal, thus promoting the development of terminal desktop management software (PC manager software for short). Illegal outreach management is now one of the most basic functions of PC manager software, and the detection technology for illegal outreach has also transitioned from the "dual-computer" mode to the deployment of PC manager software. Through PC manager software to manage the advantages of illegal outreach: illegal outreach behavior can be detected in real time, and illegal outreach behavior can be blocked and controlled in real time; the disadvantage is: for the terminal PC that does not install PC manager software, its illegal outreach behavior can not be supervised, so the deployment rate of PC manager software is an important factor affecting its supervision effect.

With the popularity of smartphone and 4G/5G technology, the main form of illegal outreach is through smart phone (4G/5G), which is more convenient, faster and cheaper than early phone dialing. The common ways are:

(1) the terminal PC connects to the personal hotspots opened by smart phones through wireless WIFI for outreach.

(2) the terminal PC connects to the mobile phone through USB and carries out outreach by USB shared network.

As far as regulators are concerned, the main technical means to deal with it is to install PC manager software on the terminal PC. If the terminal PC without PC manager software is not installed for illegal outreach, the regulators have no countermeasures. Therefore, regulators are in urgent need of other technical means to supplement, and network scanning technology is the best choice. in fact, both users and security manufacturers have been studying its alternative scanning technology after the failure of the "dual-computer" mode. at present, Huaxin has made a major technological breakthrough and launched a new technical scheme for scanning and detecting illegal outreach. Compared with PC manager software, the advantage of network scanning technology is that it does not need to deploy the client, nor does it need to deploy the receiver on the Internet like the "dual-computer" mode, so it can be used not only for random inspection, but also for daily management; the disadvantage is that the blocking control ability is slightly weaker.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report