Network node flow anomaly analysis method and system

A technology of network nodes and network traffic, applied in the field of cloud computing, can solve the problems of large calculation amount of statistical data method, difficult network traffic data, and increase the difficulty of detection, so as to reduce the difficulty of detection, reduce the amount of calculation, and reduce the difficulty. Effect

Inactive Publication Date: 2017-08-18
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above two anomaly detection methods for network traffic data are very difficult to implement. First of all, due to the large dynamic changes of the backbone network and the large scale of data traffic, the calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network node flow anomaly analysis method and system
  • Network node flow anomaly analysis method and system
  • Network node flow anomaly analysis method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0044] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0045] The embodiment of the invention discloses a method for analyzing abnormal network node traffic, see figure 1 As shown, the method includes:

[0046] Step 11: Preprocessing the network traffic data to obtain the network nodes through which the network traffic data flows.

[0047] In this embodiment, the above-mentioned network traffic data is the data that the host side transmits to the network through the sending port. These network t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network node flow anomaly analysis method. The method comprises the following steps: carrying out preprocessing on network flow data to obtain network nodes where the network flow data flow by; obtaining a connection behavior feature of each network node where the network flow data flow by; calculating a network flow connection diagram of the network node by using the connection behavior feature; and judging whether the flow of the network node is abnormal by using the network flow connection diagram. According to the network node flow anomaly analysis method disclosed by the invention, the connection behavior feature of each network node where the network flow data flow by is obtained, and flow anomaly analysis is carried out by using the network flow connection diagram formed by the connection behavior feature, thereby simplifying the network scale and reducing the calculated amount of detection. In general, by adoption of the network node flow anomaly analysis method disclosed by the invention, the difficulty of detecting the network flow data anomaly can be effectively reduced. In addition, the invention further discloses a network node flow anomaly analysis system correspondingly.

Description

technical field [0001] The invention relates to cloud computing technology, in particular to a method and system for analyzing network node flow abnormality. Background technique [0002] Network technology is constantly improving. While network applications bring convenience to people, they may also bring hidden dangers to people's information security. For example, recently more and more network applications will illegally use unauthorized ports or encrypt and hide transmission traffic data without permission. When users encounter malicious network applications, they will face huge information security risks. [0003] There are two existing solutions to the information security problem during traffic data transmission in the network. The first method is to use statistical data to detect traffic data anomalies, for example, to detect the size, time slot, quantity, and byte volume of packets of traffic data transmitted by network applications. Another solution is to perfor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 文钧正
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products