Network data flow analysis method and network data flow analysis device based on cloud security

A data flow analysis and data flow technology, applied in the field of computer networks, can solve problems such as low efficiency and untargeted detection

Active Publication Date: 2013-11-20
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, in the existing APT detection scheme, since a data packet is often only a small part of a mes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data flow analysis method and network data flow analysis device based on cloud security
  • Network data flow analysis method and network data flow analysis device based on cloud security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0043] figure 1 A flow chart of a method for analyzing network data flow based on cloud security according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0044] Step S110, capturing data packets in the network data stream.

[0045] In the embodiment of the present invention, based on the process of accessing the network by the application program, the information of the netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network data flow analysis method and a network data flow analysis device based on the cloud security. The method comprises the following steps of capturing a data packet in the network data flow; packaging the captured data packet, and restoring to a message; determining a network protocol corresponding to the restored message; and analyzing the restored message according to the network protocol corresponding to the restored message. According to the technical scheme, the packaging is carried out first, the scattered data packets are regrouped into a significant message, then the protocol analysis is carried out, the analysis can be carried out specifically, and the analysis efficiency and the accuracy can be improved compared with the existing scheme of gradually scanning the data packets one by one.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a cloud security-based network data flow analysis method and device. Background technique [0002] Advanced Persistent Threat (APT, Advanced Persistent Threat) refers to an attack form in which a specific organization uses advanced attack methods to carry out long-term persistent cyber attacks on specific targets. [0003] At present, APT has become the main security threat faced by all types of networks. It changes cyber threats from random attacks of stragglers to purposeful, organized and premeditated group attacks. Therefore, in order to protect network security, it is necessary to analyze network traffic to detect whether network behavior contains APT attacks. [0004] The current PAT detection scheme in the industry is implemented on a PC. [0005] For ease of understanding, first briefly introduce network behavior. Network behavior can be understood as variou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
Inventor 唐海
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products