Network intrusion detection method and system
A network intrusion detection and algorithm technology, applied in the field of network communication, can solve the problems of threatening intranet security, increasing enterprise costs and burdens, and high cost of intrusion detection systems, reducing system costs and improving system security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0014] figure 1 Shown is a flowchart of a network intrusion detection method provided according to a preferred embodiment of the present invention. Such as figure 1 As shown, the online classroom guide control method provided by the preferred embodiment of the present invention includes steps 102-106.
[0015] In step 102, access data within a predetermined time period is acquired. Data packets can be captured in real time at the network layer to obtain access data, such as access data within three days, and the access data are Uniform Resource Locators (URLs) from different IP addresses. A URL from an IP address is an access record.
[0016] In step 104, access parameter feature information is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com