Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and an apparatus for deploying a network safety probe

A network security and network technology, applied in the field of network security probe deployment methods and devices, can solve problems such as inundation of key information, and achieve the effects of reasonable deployment, improved response speed, and network security.

Active Publication Date: 2015-04-15
CHINA TELECOM CORP LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, a large number of network security probes will generate a large amount of alarm information, which will bring massive real-time data processing problems, and bring unnegligible pressure on network transmission and subsequent analysis and calculation; on the other hand, once a network attack occurs, business If there is a fault, so many network security devices will send out alarm information one after another. There is correlation between these alarm information. The alarm information of many network security devices does not indicate that the fault is on it. The information helps to quickly troubleshoot faults. However, a large number of network security probes will bring a large amount of redundant alarm information. These redundant alarm information will easily lead to the flooding of key information. Security managers need to further analyze the alarm information of many network security devices. Only through analysis can an effective security strategy be formulated, which greatly delays the response speed of business security assurance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and an apparatus for deploying a network safety probe
  • A method and an apparatus for deploying a network safety probe
  • A method and an apparatus for deploying a network safety probe

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that unless specifically stated otherwise, the relative arrangement of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention.

[0042] At the same time, it should be understood that, for ease of description, the sizes of the various parts shown in the drawings are not drawn according to actual proportional relationships.

[0043] The following description of at least one exemplary embodiment is actually only illustrative, and in no way serves as any limitation to the present invention and its application or use.

[0044] The technologies, methods, and equipment known to those of ordinary skill in the relevant fields may not be discussed in detail, but where appropriate, the technologies, methods, and equipment should be regarded as part o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a method and an apparatus for deploying network safety probes. The method comprises: acquiring network nodes, where network safety devices have been deployed, in a network; executing respectively, for each of the network nodes where the network safety devices have been deployed, statistics on traffic information for both each of the network nodes and a father node and on the number of leaf nodes owned by each of the network nodes, to obtain a network topology characteristic and a traffic characteristic; obtaining an attribute value for each of the network nodes according to the network topology characteristic and the traffic characteristic; selecting critical nodes from the network nodes where the network safety devices have been deployed according to the size of the attribute value for each of the network nodes; and deploying the network safety probe respectively on the critical nodes. According to the embodiments of the method and the apparatus for deploying network safety probes, mass redundant alarm information of the network safety devices can be reduced greatly, processing efficiencies of subsequent network transmission and subsequent analysis and computation can be increased, and guarantee response speed of service safety can be improved.

Description

Technical field [0001] The invention relates to communication technology, in particular to a method and device for deploying network security probes. Background technique [0002] The rapid development of the Internet has profoundly changed the way people live and work, and the safe operation of the Internet has become an important condition for the daily operation of human society. [0003] Awareness of the security status of the entire network is a prerequisite for achieving network security operations, manageability and control. The real-time perception of the security status of the entire network depends on the reasonable deployment of network security probes. The existing common network security probe deployment method is to deploy the network security probe synchronously according to the deployment status of the network security equipment. [0004] In the process of implementing the present invention, the inventor found that the existing method of synchronous deployment of ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0803H04L63/20
Inventor 刘东鑫肖宇峰刘国荣沈军
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products