Method and system for detecting hazardous network source

A detection method and network technology, applied in transmission systems, electrical components, etc., can solve problems such as web Trojan horse intrusion, inability to perform fast and accurate detection, and endanger Internet security, and achieve the effect of eliminating false positives and false negatives.

Inactive Publication Date: 2014-04-02
JIANGNAN UNIV
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current network security field, there are complex and changeable webpage Trojan horses, malicious code intrusion, etc., which seriously endanger the security of the Internet.
In this regard, tr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting hazardous network source
  • Method and system for detecting hazardous network source
  • Method and system for detecting hazardous network source

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following describes the implementation of the present invention through specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementations. , the details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention.

[0022] Please refer to the accompanying drawings, it should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic idea of ​​the present invention, and only the components related to the present invention are shown in the diagrams rather than according to the actual implementation The number, shape and size of components are drawn, and the type, quantity and ratio of each component can be changed at will d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for detecting a hazardous network source, and particularly relates to the method and the system for detecting the hazardous network source based on data fusion. The method and the system are applied to safety detection for daily visited websites. The system is characterized by comprising a system information acquisition module including a data packet capture and link analysis module, a system behavior analysis module including a webpage Trojan analysis, malicious code detection and suspected website detection module, a system behavior result processing module including in-depth behavior rules and evaluation data mining, fusion and the like, a data disaster tolerance module including local backup control and remote backup control, and an expert system module. The method and the system for detecting the hazardous network source disclosed by the invention can quickly and accurately find risky states and harmful ways and give out an alarm to a user to carry out further processing, and particularly the hazardous source can be found through analyzing layer upon layer.

Description

technical field [0001] The invention relates to a method and system for detecting the source of network harm, in particular to a method and system for detecting the source of network harm based on a data fusion method. It is an important part of network security construction and the premise and basis for completing network security alarms and smooth operation. technical background [0002] In the current network security field, there are complex and changeable web Trojan horses, malicious code intrusion, etc., which seriously endanger the security of the Internet. In this regard, traditional network hazard detection methods cannot achieve fast and accurate detection and identify the source of hazards, and cannot quickly build a perfect detection model for various hazard data collected. Contents of the invention [0003] In view of the shortcomings of the above-mentioned prior art, the present invention discloses a method and system for detecting the source of network haza...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 李志华李林
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products