Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer network anomaly detection method and system and mobile terminal

A computer network and anomaly detection technology, applied in the field of network security, can solve the problem that the threat database cannot create new features in time, and achieve the effect of strong real-time detection

Inactive Publication Date: 2018-04-10
HUANGHE JIAOTONG UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These devices set up a threat database in the form of signatures, so that the signatures of the threat database can be matched with the data packets transmitted by the computer network. Since the signature creation process is human-operated, new network threat signatures appear, or network threat signatures change, threats The database cannot create new features in time
[0004] Another traditional detection method is to detect anomalies by monitoring traffic rates. The detection method of traffic monitoring anomalies will generate a large number of false alarms, because many reasons unrelated to network threats will cause the rate of change of traffic or other observable quantities to occur. In addition, traditional traffic anomaly detection systems were originally designed to detect changes in predetermined behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network anomaly detection method and system and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] see figure 1 , the present invention provides a kind of method of computer network anomaly detection, the specific steps of this detection method are as follows:

[0030] S1: Monitor and analyze user and system activities, and the monitoring behavior is carried out through the neuron network distributed on each node of the network transmission and with encrypted channels;

[0031] S2: Check system configuration and vulnerabilities;

[0032] S3: Identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer network anomaly detection method and system and a mobile terminal in the technical field of network security. The detection method includes the following specific steps: S1, monitoring and analyzing activities of a user and a system; S2, checking system configuration and bugs; S3, identifying known attacks and sending an alarm to the relevant personnel; S4, performing statistical analysis on daily behaviors of the user and the system; S5, evaluating the integrity of important systems and data; and S6, operating system log management, and identifying the useractivities that violate security policies. According to the scheme of the invention, the detection system is arranged on each node of the network, so that attackers cannot easily transfer evidences, strong detection real-time performance can be achieved, the possibility of the own attacks can be reduced, and meanwhile, by adopting the high learning and adaptive capabilities of a neural network, new intrusion behavior features can be identified with high accuracy, and the new intrusion behavior features and variant forms of the known intrusion behaviors can also be identified with a certain probability.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a computer network anomaly detection method, system and mobile terminal. Background technique [0002] With the rapid development of computer networks, network threats and other network-related problems are increasing, such as network attacks, data theft, viruses, worms, malicious port scanning activities, etc. Network threats are acting faster, changing at a faster rate, and more complex. Today, cyber threats infiltrate directly through computer networks despite perimeter defenses, so there are many tools for threat detection. [0003] Traditional inspections include simple or deep packet inspection and can usually be categorized as intrusion detection and prevention devices or antivirus systems. These devices set up a threat database in the form of signatures, so that the signatures of the threat database can be matched with the data packets transmitted by the compute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 常本超郭莉娜张岐山李东东
Owner HUANGHE JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products