Supercharge Your Innovation With Domain-Expert AI Agents!

Data flow monitoring method and apparatus

A monitoring device and data flow technology, applied in the field of communication security, can solve problems such as low detection efficiency, and achieve the effects of improving monitoring efficiency and solving low monitoring efficiency

Inactive Publication Date: 2017-09-29
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a data stream monitoring method and device to solve the problem of low detection efficiency caused by detecting all access data streams in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow monitoring method and apparatus
  • Data flow monitoring method and apparatus
  • Data flow monitoring method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0031] figure 1 It is a schematic structural diagram of the data flow monitoring device provided in the first embodiment of the present invention, which is represented by figure 1 It can be seen that, in this embodiment, the data flow monitoring device 1 provided by the present invention includes:

[0032] Obtaining module 11, configured to obtain the source identification of the access data flow

[0033] The configuration module 12 is configured to configure the security attributes of the access data flow according to the preset white list and source identification, and the security attributes include white flow, gray flow, and black flow;

[0034] The monitoring module 13 is configured to divide the access data flow according to the security attribute of the access data flow.

[0035] In some embodiments, such as figure 1 As shown, the data flow monitoring device 1 in the above-mentioned embodiment also includes a preliminary judgment module 14, which is used for making a...

no. 2 example

[0042] figure 2 It is a flow chart of the data flow monitoring method provided by the second embodiment of the present invention, consisting of figure 2 It can be seen that, in this embodiment, the data flow monitoring method provided by the present invention includes the following steps:

[0043] S201: Obtain the source identification of the access data flow;

[0044] S202: According to the preset white list and source identification, configure the security attributes of the access data flow, and obtain the security attributes of the access data flow, the security attributes include white flow, gray flow, and black flow;

[0045] S203: Distribute the access data flow according to the security attribute of the access data flow.

[0046] In some embodiments, the method in the above embodiment further includes: making a preliminary judgment on the access data flow, judging whether it is an offensive data flow, and outputting the preliminary judgment result; List, set securi...

no. 3 example

[0052] The present invention will be further explained in combination with specific application scenarios.

[0053] In view of the relatively low efficiency and high complexity of the network security system existing in the deployment mode of most existing network security devices, in order to improve the detection accuracy of the access data flow and reduce the complexity of deploying the network security system in this embodiment, This embodiment provides an all-in-one security machine oriented to network function virtualization, and each functional module of the all-in-one security machine cooperates to realize the functions of the data stream management device in the first embodiment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data flow monitoring method and device. The method includes: obtaining the source identification of the access data flow; configuring the security attributes of the access data flow according to the preset white list and the source identification; Security attributes, security attributes include white flow, gray flow, and black flow; according to the security attributes of the access data flow, the access data flow is divided. Through the implementation of the present invention, after receiving the access data stream, first obtain the security attribute of the access data stream, divide the data stream according to different security attributes, and implement different monitoring strategies for data streams with different attributes, such as monitoring The flow is blocked, the white flow is released, and the gray flow is periodically and repeatedly detected, which improves the detection efficiency and solves the problem of low detection efficiency caused by the detection of all access data flows in the prior art.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a data flow monitoring method and device. Background technique [0002] The current deployment mode of most network security devices is that the security devices are connected in series. By allowing the access data stream to enter the security device, the security device detects and filters all the passing data streams. After the security device detects and filters, Normal data flow then enters the destination server. Although this deployment method can successfully resist the attack of malicious data flow on the system, the efficiency is relatively low, because the security device in the system needs to detect not only abnormal data flow, but also normal data flow. The flow passes through all the deployed security devices, resulting in poor detection efficiency, long data flow detection time, and increased load on the security devices. In the traditional network security s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/0236H04L63/0263H04L63/1408
Inventor 何利文许承启黄俊牛小兵吴少勇
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More