Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security detection method and device

A network security and detection method technology, applied in the field of information security, can solve problems such as heavy workload, inability to complete correlation analysis, and low efficiency of network security analysis

Active Publication Date: 2018-09-11
BEIJING QIANXIN TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the security of the network, at present, when an attack or suspicious attack is found in the network, it is necessary to search the network log and analyze various fields related to the attack in the network log, resulting in low analysis efficiency of the existing network security , the workload is very heavy
With the expansion of the network scale, various logs are massive, and it is almost impossible to perform correlation analysis according to traditional methods in the era of big data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security detection method and device
  • Network security detection method and device
  • Network security detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] An embodiment of the present invention provides a network security detection method, such as figure 1 As shown, the method includes:

[0028] 101. Identify network elements for network security analysis.

[0029] When detecting and analyzing network security, due to the different types of network security threats, it is necessary to determine different network elements to analyze network security for different types of netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security detection method and device, and relates to the technical field of information security. According to the invention, on the basis of a large data analysis technique, when a network threat is detected, the scope that the network threat involves can be rapidly and accurately determined. The technical scheme of invention is as follows: the network security detection method comprises the following steps: confirming network elements which perform network security analysis; acquiring network data, and associating all the network elements in the network data to obtain a network-element associated network; performing network security detection according to the network-element associated network. The network security detection method and the device, which are disclosed by the invention, are particularly suitable for the discovery process of APT attacks.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a network security detection method and device. Background technique [0002] With the continuous development of information technology, the degree of informatization of human society is getting higher and higher, and the dependence of the whole society on network information is also getting higher and higher, so the importance of network security is also getting higher and higher. However, there are more and more attacks that threaten network security. For example, APT (Advanced Persistent Threat, Advanced Persistent Threat) attack, which uses advanced attack methods to carry out long-term persistent network attacks on specific targets. One of the attack methods that poses a great threat to network security. [0003] In order to ensure the security of the network, at present, when an attack or suspicious attack is found in the network, it is necessary to search the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 蒋梦飏黄鑫张卓
Owner BEIJING QIANXIN TECH