Method and apparatus for detecting data collection omission in traffic collection device

A technology of traffic collection and equipment data, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem that the collection method of data wandering is not unique, and achieve the effect of improving the supervision effect

Active Publication Date: 2018-01-12
BEIJING ACT TECH DEV CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This paper shows that the method of data wandering collection is not unique, and the collection of data traffic can also be done through the SNMP protocol. Similarly, the present invention does not use the SNMP protocol in data collection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for detecting data collection omission in traffic collection device
  • Method and apparatus for detecting data collection omission in traffic collection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] refer to figure 1 and figure 2 A method and device for detecting false positives in data collection of flow collection equipment according to the present invention includes: the first step of discovering false positives of active IP data, and the second step of finding false positives of active domain name data.

[0040] Step 1 The active IP data false negative discovery includes:

[0041] (1) For the underreporting of active IP data, it is necessary to obtain comprehensive IP data in the computer room in the province as a verification benchmark for the data underreported by the information security management system; the acquisition process of the IP benchmark table in the computer room of the information security management system is as follows: : a) From the IP data reported manually by the enterprise and on the basis of the enterprise IDC, find out the IP data that is used in a non-dynamic manner and has the property of the machine room; b) The IP data reported ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting data collection omission in a traffic collection device and relates to an information security technology in the technical field of information. The method comprises the following steps: step 1 is discovery of omission of active IP data, and step 2 is discovery of omission of active domain name data. According to the invention, a DNS data source is used to supplement original data, and data which has the attribute of a computer room is extracted, and then a simulation request is performed, such that the performance demand for the simulation request is reduced, a more comprehensive simulation request is also provided, and discovered omission is more comprehensive and accurate. When the simulation request is performed, an http (get/post) requestis firstly performed, and then afterwards, data whose simulation request result return values are not within a reasonable scope is subjected to an https (get/post) request. Such a mode, compared to amode of performing http&https simulation requests on all data, can reduce the performance demand for the simulation request, and compared to a mode of only performing the http simulation request, canalso enhance comprehensiveness of the simulation request. According to the invention, the network supervision level can be effectively improved, and data missed by an information security managementsystem is discovered for analysis of omission reasons of the information security management system.

Description

technical field [0001] The invention relates to the field of information security technology in the field of information technology, especially the field of Internet management and control. Background technique [0002] At present, the relevant Internet management departments and enterprises in the communication industry of various provinces and cities deploy active traffic collection equipment at all enterprise operators in the provinces and cities to obtain network traffic data, and access traffic data mainly through http / https requests. Some devices also include FTP, POP3, STMP and other access. Relevant Internet management departments and enterprises obtain and record the source IP, access domain name, IP address of the access domain name and other information in the access traffic data through collection equipment, and use it as a data source for analyzing the network development of the province. Generally, the active traffic data collection device deployed at the ente...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/12
Inventor 林飞陈维赵喜荣易永波毛俊王钟何涛彭浩勇廖艳云易祥
Owner BEIJING ACT TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products