A method and system for monitoring network traffic exception

A technology for abnormal traffic and network monitoring, applied in the field of network security, can solve problems such as switch performance loss, abnormal monitoring traffic, data packet loss, etc., and achieve the effect of reducing quantity and investment cost

Active Publication Date: 2008-05-28
NEUSOFT CORP
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem to be solved by the present invention is to provide a method and system for monitoring network traffic anomalies, so as to s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for monitoring network traffic exception
  • A method and system for monitoring network traffic exception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the above objects, features and advantages of the present invention more clearly understood, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0038] The embodiment of the present invention provides a method for monitoring network traffic abnormality, which is an improvement on the traditional switch mirroring technology, adopts the automatic dynamic adjustment method, automatically adjusts the traffic mirroring function of the switch according to the actual traffic situation, and mirrors the traffic of the port with abnormal traffic. Output to detection equipment, so as to achieve the purpose of accurate fine-grained analysis of abnormal traffic.

[0039] In order to clearly illustrate the monitoring method, the application environment of the method will be first introduced in the form of an embodiment below.

[0040] Referring to FIG. 2 , it is a schematic diagram of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system to monitor a network flow rate abnormality, and solves the problem that the prior exchanger image technology is adopted to monitor the flow rate abnormality to cause the problems such as exchanger performance loss, data package lose, etc. The method comprises the steps that: first of all, the flow rate abnormality port in the exchanger is positioned through a coarse granularity monitoring way, then the image port of the exchanger is automatically adjusted, and the abnormality port flow rate is copied to the image port, finally, a fine granularity monitoring way is adopted to analyze the image port flow rate to get the flow rate abnormality reason. The invention improves the traditional exchanger image technology, only when the flow rate is abnormal, the exchanger image is triggered, the exchanger image function is not used within most of the time, so the load is not increased to influence the exchanger function; in addition, the image port is adjusted through the way which is dynamic and has an aim, thereby avoiding the circumstance that a plurality of ports are imaged to one port to cause the package to be lost.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for monitoring abnormal network traffic. Background technique [0002] In the field of network security, network traffic anomaly refers to the irregular and significant changes in the traffic in the network. Local events such as transient network congestion, distributed denial of service attacks, large-scale scanning, or global events such as network routing abnormalities can cause network abnormalities. Therefore, monitoring and analysis of network traffic abnormalities is very important for network security emergency response departments. [0003] At present, an abnormal monitoring method is to use switch mirroring technology. The switching device copies the traffic of multiple network ports to the mirror port. The mirror port is a monitoring port. The mirror port is deployed with a monitoring and analysis system. analysis to determine whether there is an ab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L12/56
Inventor 曹斌李青山李洪生朝乐蒙
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products