Service safety analysis method and system thereof

A security analysis and business technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as high cost, inability to effectively detect internal network security threats, and inability to cope with large-scale network data traffic

Active Publication Date: 2016-10-19
BEIJING VENUS INFORMATION SECURITY TECH +1
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Firewalls, IDS and other security devices cannot effectively detect internal network security threats. If you want to detect internal threats, you need to deploy nodes in different network areas, and the cost is high
[0004] 2. Rule-based detection methods such as IDS cannot detect 0day attacks in time
[0005] 3. IDS is based on deep packet inspection technology, which cannot cope with the data traffic of large-scale networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service safety analysis method and system thereof
  • Service safety analysis method and system thereof
  • Service safety analysis method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings, which cannot be used to limit the protection scope of the present invention.

[0050] Aiming at many deficiencies in threat detection of traditional security detection equipment such as firewalls and intrusion detection systems (IDS), security analysis technology based on network flow Netflow technology, combined with big data statistics, anomaly detection and other technologies, can provide more timely effective solution.

[0051] Netflow technology was first invented by Cisco in 1996. It is applied to Cisco routers and switches to record end-to-end access information. It is a technical means to analyze and measure the characteristics of IP data flows passing through network devices.

[0052] However, the traditional Netflow technology based on Cisco's patent is usually applied to network performance ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service safety analysis method and a system thereof. The method comprises the following steps of receiving Netflow data sent by network equipment and simultaneously actively collecting all network flow data; analyzing the collected flow data and generating the Netflow data; carrying out flow filtering, flow polymerization and characteristic extraction on the acquired Netflow data, using a threat detection technology to carry out threat detection on the Netflow data after the flow filtering, the flow polymerization and the characteristic extraction, storing a detection result in black, white and grey lists and using a service view form to display the detection result of the Netflow data; and combining the service data to carry out association analysis on the detection result and acquiring a safety state of a service system in real time. In the scheme of the invention, in a complex network environment, an abnormal flow can be accurately analyzed.

Description

technical field [0001] The invention relates to computer system integration and application technology, in particular to a method and system for business security analysis. Background technique [0002] The rapid development of computer networks and mobile Internet applications has brought great convenience to social work and life. Correspondingly, enterprise networks are becoming more and more responsible, and the threats and losses caused by various network security issues are also increasing. With the continuous expansion of network scale, attack methods are becoming more and more diverse. Especially in recent years, advanced persistent threat (APT) attacks have become more and more common. Enterprise networks are facing more and more internal and external threats. Traditional security detection equipment such as firewalls, intrusion Detection systems such as IDS have shown many deficiencies in threat detection: [0003] 1. Firewalls, IDS and other security devices cann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 郜小亮张延佳胡盛华
Owner BEIJING VENUS INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products