Method and device for carrying out safety analysis on network behaviors
A security analysis and network technology, applied in the field of network security, can solve the problems of high false alarm rate, inability to fully detect abnormal traffic attacks, low performance of feature detection, etc., and achieve the effect of ensuring security and reliability, and a reliable network application environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0044] Example 1
[0045] The embodiments of the present invention perform security analysis on network behavior based on the network order construction technology based on the clustering algorithm, the network order chain construction technology based on the association analysis algorithm, and the black, white and gray list technology, overcome the shortcomings of the methods in the above three directions, and can Defend against various network attacks.
[0046] A schematic diagram of the implementation principle of a method for security analysis of network behavior provided by an embodiment of the present invention is as follows: figure 1 As shown, the specific processing flow is as follows figure 2 It includes the following processing steps:
[0047] Step S210: Set the initial whitelist, greylist and blacklist of the network host.
[0048] In the initial stage of network structure order, according to a large number of prior knowledge, the IP address and port number of e...
Example Embodiment
[0069] Embodiment 2
[0070] This embodiment provides a schematic diagram of an application scenario of an apparatus for performing security analysis on network behavior. image 3 As shown, the Internet includes routers and core switches. The routers can transmit and route network traffic. The local area network is connected to the Internet through the core switches. The local area network includes switches at the aggregation layer and access layer, PCs, and mobile terminals. Terminals can be connected to Network, communicate and share information. The network behavior security analysis device based on network order in the embodiment of the present invention is connected to the mirror port of the core switch, and is used to obtain network data packets, analyze network traffic behavior, and detect network attacks.
[0071] The specific implementation structure of the above-mentioned device for performing security analysis on network behavior is as follows: Figure 4 As shown,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap