Network attack data analysis and intelligent processing method
A network attack and data analysis technology, applied in the field of network engineering, can solve the problems of heavy losses, single function and strategy, ignoring attack event logic and correlation, etc., to achieve the effect of strong adaptability and perfect strategy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
specific Embodiment
[0062] A specific embodiment, a network attack data analysis and intelligent processing method, including the following steps,
[0063] Step 1. Connect various network security devices to one or more SDN switches to form a security resource pool;
[0064] Step 2, the security controller issues a security control command to operate the SDN switch, and pulls the network traffic to the designated network security device for security processing according to the security needs of different users;
[0065] Step 3: The security controller conducts centralized policy management and real-time status monitoring of the network security equipment. When the network security equipment is abnormal, the security controller issues a security policy instruction to balance the load or migrate traffic in time to ensure that normal network communication is not affected. ;
[0066] Also includes the following steps:
[0067] The first step is to collect device information, actively collect real-t...
specific Embodiment 2
[0139] Specific embodiment 2, as an improvement to the present invention, in the 6th step also includes network attack-defense strategy game method, network attack-defense game comprises two parts: a. static attack-defense game research and b. dynamic attack-defense game research, wherein,
[0140] a. Static offensive and defensive game research, the interdependence of offensive and defensive decisions before the attack occurs, combined with static Bayesian game theory, an active defense strategy analysis method suitable for complex network systems is given, including
[0141] (1) Design the offensive and defensive Agent structure system in the network offensive and defensive confrontation scene, analyze the game type based on active defense and the elements of participants, attack and defense costs and benefits;
[0142] (2) Extend the definition of the object Petri net, introduce the attack and defense information structure on the transition and the transition output arc, and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com