Network situation awareness implementation method and device
A technology for network situational awareness and implementation method, applied in the field of network situational awareness implementation methods and devices, and can solve problems such as insufficient accuracy and real-time performance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0036] Embodiment 1: collecting network data related to network status in step 1 includes collecting network raw data flow and host log data; where collecting network raw data flow collection refers to bypassing or blocking the collection network flow from the network data link layer through winpcap through the data;
[0037] Collecting host log data refers to the process of extracting the basic elements that affect the network situation from the network security status data source. The network security status data source is a kind of network raw data, which is mostly stored in the application server or target terminal. The extraction of data (the corresponding data refers to the original data of the network), so as to further extract the basic data elements that affect the network situation.
Embodiment 2
[0038] Embodiment 2: the processing of network state-related network data described in step 1 includes collecting network raw data streams and host log data;
[0039] Among them, processing network raw data flow refers to:
[0040] Step 11: Obtain the complete network raw data stream for storage;
[0041] Step 12: The TCP / IP protocol cluster performs protocol analysis on the collected original data flow, and extracts quintuple information (source IP address, destination IP address, protocol type (such as SNMP protocol), source port number, destination port number); Specifically: the TCP / IP protocol cluster obtains the corresponding quintuple information layer by layer according to the corresponding protocol format from the physical layer, data link layer, network layer, transport layer, and application layer for the original data stream collected.
[0042] Step 13: storing the extracted quintuple information according to the TCP / IP protocol architecture; the storage format is...
Embodiment 3
[0044] Embodiment 3, in step 1, processing host log data refers to: obtaining host log data, extracting characteristic data therefrom, further obtaining system information and service information, and manually analyzing and identifying abnormal data from the host log data.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com