Method for network security detection in complex network

A network security and complex network technology, applied in electrical components, transmission systems, etc., can solve the problems of difficulty in implementing DDos attack detection models, and it is difficult to achieve real-time dynamic security monitoring. Guaranteed real-time effect

Active Publication Date: 2018-01-12
北京天帷网络安全技术有限公司
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The unpredictability of network security attacks and its own concealment make attacks more rampant and destructive in the entire network.
For example, it is even more difficult to establish and implement a DDos attack detection model. There are many ways to monitor and defend against DDos attacks, but it is difficult to achieve real-time dynamic security monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for network security detection in complex network
  • Method for network security detection in complex network
  • Method for network security detection in complex network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for network security detection in a complex network. The method comprises the following steps: positioning a network node in time and space; establishing a security attack detection database of node security abnormities in a network and corresponding solutions; based on a KDD algorithm, mining and analyzing network traffic and event density in historical access data of each node, and establishing a dynamic Poisson distribution model and setting a security threshold and a threat threshold of the network traffic and the event density; detecting access behavior of the nodes, and comparing monitoring values of the network traffic and the event density of the nodes with the security threshold and the threat threshold; if the monitoring values are smaller than the safety threshold, it being indicated that the behavior of the nodes is safe; if the monitoring values are greater than the safety threshold and smaller than the threat threshold, dynamically tracking working behavior of the nodes; and if the monitoring values are greater than the threat threshold, stopping access work of the nodes, and calling the security attack detection database to address security threats of the nodes.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for network security detection in complex networks. Background technique [0002] With the increasing accessibility of information and data, there is growing concern about data security and privacy. Ensuring network security and providing a good network environment for civil society are necessary conditions for the development of the Internet. With the gradual development of the Internet, there are always large-scale and diverse network security attacks lurking in the network. Security threats in the network have the characteristics of strong concealment, reproducibility, and difficulty in retrospect. Existing network security detection methods must deal with a large amount of multi-dimensional and unstructured data. Data, many threat detection methods have troubles in many aspects such as detection results and efficiency in the process of processing abnormal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 何泾沙蔡方博郭文华穆鹏宇
Owner 北京天帷网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products