Invasion detection method and system

A technology of intrusion detection and network data, applied in the field of network security, can solve problems such as intrusion, inability to effectively protect computer network security, and loss of user interests

Inactive Publication Date: 2017-04-26
BEIJING AN XIN TIAN XING TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network hackers will use some security loopholes in the network protocol, write corresponding network data, invade the user's computer network, steal the user's relevant information, and cause losses to the user's interests
The inventor found afte

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion detection method and system
  • Invasion detection method and system
  • Invasion detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] The invention is applicable to numerous general purpose or special purpose computing device environments or configurations. For example: personal computer, server computer, handheld or portable device, tablet type device, multiprocessor device, distributed computing environment including any of the above devices or devices, etc.

[0065] The present invention provides an intrusion detection method, the execution body of which can also be the processor of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an invasion detection method. For network data presently transmitted to a user computer network, traversal matching for target attributes of the network data and test attributes of each node of a pre-established decision tree is firstly carried out, classification of the network data is determined, the pre-established decision tree is generated through processing training data of the network invasion data, and categories corresponding to nodes correspond to different invasion types. The method is advantaged in that whether the classification network data is invasion data is determined, network data invasion detection is realized, a detection process is more effective, and protection on a computer network of the user can be better realized.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an intrusion detection method and system. Background technique [0002] With the rapid development of information technology, computer networks have been widely used in various fields of life and work. People can use computer networks to carry out various daily activities such as network communication, games, and shopping. To a certain extent, computer networks have become an indispensable part of people's lives. [0003] With the popularization of computer network applications, computer network security has become a problem that people must face. Network hackers will take advantage of some security loopholes in the network protocol, write corresponding network data, invade the user's computer network, steal the user's relevant information, and cause losses to the user's interests. The inventor found through many times of practical research that there is no effective n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 翟建军钟金鑫齐志彬陈青民李周丁晓
Owner BEIJING AN XIN TIAN XING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products