Business system safety protection method based on flow monitoring

A business system and flow monitoring technology, applied in the transmission system, electrical components, etc., can solve the problems of low cost, limited protection ability, high cost, etc., and achieve the effect of reducing costs

Inactive Publication Date: 2018-04-13
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are mainly two security protection methods for business systems: local security protection and cloud protection. Among them, local security protection is a traditional protection technology with limited protection capabilities but low cost. The Internet cloud protection system integrates all deployed DDOS defenses Resources provide users with an efficient overall network security solution, which has a strong protection effect but is expensive. Therefore, how to automatically switch between the two protection methods according to the protection requirements, to ensure business continuity and reduce costs is an urgent need for enterprises to solve a technical problem of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] The traffic monitoring-based business system security protection method in this embodiment includes the following implementation steps:

[0022] 1) Local protection stage:

[0023] a) During the test phase, obtain the maximum qps (accept new requests per second) and tps (process requests per second) of the system;

[0024] b) Analyze the normal log data of the business system, obtain the daily qps, tps trend graph, compare the daily trend graph, obtain the average value of the trend graph, and the trend growth graph at each moment;

[0025] c) Analyze the log data and obtain the model of the request parameters (including the request parameters and the length and mode of the parameters);

[0026] d) During the normal operation of the business system, set the basic protection (detection parameters, parameter length, mode) for the business system through the model in c), check whether the request meets the requirements, if so, go to the next step; otherwise, filter this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the network security protection technology and discloses a business system safety protection method based on flow monitoring, automatically switching between a cloud protection mode and a local protection mode, and reducing the protection cost under the condition that the continuous operation of a business system is guaranteed. The method comprises the steps of locally establishing a foundation protection measure on the business system, monitoring the flow data when the business system operates normally, automatically switching to the cloud protection measure when theflow data reaches a switching threshold value condition, and timely switching to the local protection measure by monitoring the flow data and the protection effect of the business system at the cloudmanufacturer at the cloud protection stage.

Description

technical field [0001] The invention relates to network security protection technology, in particular to a traffic monitoring-based security protection method for a business system. Background technique [0002] With the development of the Internet, the traditional production and lifestyle have been greatly changed. Whether the business system can run normally determines the survival of an enterprise to a large extent. At present, there are mainly two security protection methods for business systems: local security protection and cloud protection. Among them, local security protection is a traditional protection technology with limited protection capabilities but low cost. The Internet cloud protection system integrates all deployed DDOS defenses Resources provide users with an efficient overall network security solution, which has a strong protection effect but is expensive. Therefore, how to automatically switch between the two protection methods according to the protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/20
Inventor 付强
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products