Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for network flow anomaly detection

A network traffic and anomaly detection technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as complex calculation methods, emphasis on detection accuracy, lack of lightweight network traffic anomaly detection algorithms, etc. The process is simple, the flow monitoring time is reduced, and the detection results are accurate.

Inactive Publication Date: 2011-04-13
湖南神州祥网科技有限公司
View PDF2 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Either too much emphasis on detection accuracy makes the calculation method complex, which is not conducive to real-time detection; or too much pursuit of real-time performance reduces the detection accuracy of the algorithm; there is a lack of a lightweight, adaptive network traffic anomaly detection algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for network flow anomaly detection
  • Method and system for network flow anomaly detection
  • Method and system for network flow anomaly detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make those skilled in the art better understand the solution of the present application. The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0060] First, the terms required in the embodiments of the present application are defined as follows:

[0061] Bit rate s: bits per second. Indicates the number of bits transmitted or received per second.

[0062] Service flow: refers to a set of five quantities consisting of source IP address, source port, destination IP address, dest...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for network flow anomaly detection, comprising the following steps: acquiring statistical information on bit rate and flow rate of the network flow in a sliding window, and calculating a mean value of the bit rate and the flow rate; building a flow model in accordance with the mean value of the bit rate and the flow rate; determining the normal confidence interval of the network flow in accordance with the flow model; and when the network flow does not meet the normal confidence interval, judging that the network flow is abnormal network flow. The embodiment of the invention provides the method and system for network flow anomaly detection; and by means of the method and the system, the network flow can be detected more simply and more exactly from the standpoint of correlation of the bit rate and flow rate of the network.

Description

technical field [0001] The present application relates to the technical field of computer network traffic monitoring and analysis, and in particular, to a method and system for detecting abnormality of network traffic. Background technique [0002] With the increasing expansion of computer network scale and application fields, the network has become an important part of people's daily work and life. However, with the increasing popularity of the network, abnormal network traffic caused by network attacks, worms, malicious downloads, abnormal equipment and other factors has an increasing impact on network performance. Some offensive abnormal traffic It interferes with the normal network operation order and poses a serious threat to network security. Under this circumstance, how to timely and accurately detect abnormal network traffic, ensure the normal operation of the network, and provide users with a good network environment has become a much-concerned research topic. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/56H04L12/811
Inventor 郝燕张广兴文吉刚袁小坊
Owner 湖南神州祥网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products