Network security detecting method and device

A network security and detection method technology, applied in the field of big data, can solve problems such as low efficiency, complex calculation, and inability to meet the detection requirements of dynamic changes and large data volumes

Active Publication Date: 2018-02-06
CHINA TELECOM CORP LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Typical network security systems usually use pattern string matching technology for intrusion detection, anti-virus, and anti-spam detection. This method is complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security detecting method and device
  • Network security detecting method and device
  • Network security detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0033] The flowchart of an embodiment of the network security monitoring method of the present invention is as follows figure 1 shown.

[0034] In step 101, a network state diagram is generated in real time according to the network communication state. The information represented by the nodes in the network state diagram includes hosts, IP addresses, users, etc., and the information represented by the connection lines in the network state diagram includes communication between hosts, user login, IP address switching, etc. In one embodiment, the network state diagram is as figure 2 shown.

[0035] In step 102, a predetermined characteristic subgraph is matched in the network state diagram, wherein the predetermined characteristic subgraph is a state diagram when an abnormality occurs in the network communication sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security detecting method and device and relates to the field of big data. The network security detecting method includes generating a network state diagram in real time according network communication states; matching a predetermined feature sub diagram in the network state diagram, wherein the predetermined feature sub diagram is a state diagram when errors of the network communication states occur; determining abnormal events corresponding to the predetermined feature sub diagram when the matching goes successfully. According to the invention, the sub diagram corresponding to abnormal states can be searched in the network state diagram generated in real time by adopting an image matching method and whether an abnormal state occurs in the network can bedetermined. Compared with a traditional keyword based search method, the diagram matching technology is more suitable for complex-mode search on data having high relevance, so that network security detection efficiency can be improved greatly.

Description

technical field [0001] The invention relates to the field of big data, in particular to a network security detection method and device. Background technique [0002] With the rapid development of the Internet, network data updates are becoming more and more frequent, and network security issues have also attracted much attention. The requirements for the accuracy and real-time performance of network security detection are getting higher and higher. Threat methods pose higher challenges to network security detection. [0003] Typical network security systems usually use pattern string matching technology for intrusion detection, anti-virus, and anti-spam detection. This method is computationally complex and inefficient, and can no longer meet the detection requirements of dynamic network data changes and large data volumes in the mobile Internet era. In many aspects such as network threat diagnosis, virus detection, network failure and vulnerability elimination, better netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 董威
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products