Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal flow detection system and abnormal flow detection method based on service model

An abnormal traffic and business model technology, applied in the field of network security, can solve problems such as the inability to detect new abnormalities, poor algorithm performance, and limited encrypted traffic detection capabilities, so as to increase abnormal detection and encrypted traffic detection, and improve protection Ability to increase the effect of firewall auditing

Active Publication Date: 2018-07-17
HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED +1
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The detection of new anomalies is lagging, and the signature database cannot be upgraded to detect new anomalies;
[0005] 2. The ability to detect encrypted traffic is very limited;
[0006] 3. The performance of the algorithm is related to the complexity of the payload (payload) feature. With the increase of the types of abnormal traffic and the complexity of the payload feature, the detection cost is high and the algorithm performance is poor;
[0007] 4. The cost is too high. Because the abnormal traffic detection and analysis based on payload characteristics needs to analyze every data packet passing through the network, with the growth of the network, it will inevitably become the bottleneck of the network, and it needs to continuously improve the abnormal performance to solve it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal flow detection system and abnormal flow detection method based on service model
  • Abnormal flow detection system and abnormal flow detection method based on service model
  • Abnormal flow detection system and abnormal flow detection method based on service model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Features and exemplary embodiments of various aspects of the invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention. The present invention is by no means limited to any specific configurations and algorithms presented below, but covers any modification, substitution and improvement of elements, components and algorithms without departing from the spirit of the invention. In the drawings and the following description, well-known structures and techniques have not been shown in order to avoid unnecessarily obscuring the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormal flow detection system and an abnormal flow detection method based on a service model. The abnormal flow detection system comprises a data acquisition and analysis device, a first data detection device, and a second data detection device. The data acquisition and analysis device is used for acquisition and analysis of original target flow data of a target networkport. The first data detection device is used to filter the analyzed target flow data according to a preset flow information white list and a preset flow information black list, and is used to transmit the first flow data of the original target flow data, which is not matched with the flow information white list and the flow information black list, to the second data detection device. The seconddata detection device is used to carry out the flow attack determining of the first flow data according to a preset flow attack analysis module, and is used to identify abnormal flow data from the first flow data. By adopting the method and the system provided by the invention, problems of conventional abnormal flow detection methods such as detection lag, high detection costs, and limited detection capability are effectively solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an abnormal traffic detection system and method based on a business model. Background technique [0002] With the increasing scale of the network and the increasing types of services carried, the development of the Internet has brought great convenience to people. However, these also greatly increase the chances of various anomalies in the network, and bring greater challenges to network monitoring. Network traffic anomaly analysis is a key part of network monitoring, and it is of great significance to accurately and timely detect anomalies to improve network availability and reliability. [0003] The current abnormal traffic monitoring is based on the feature library. Since each identified attack has a signature, by capturing data packets on the network and comparing it with the signature database, it is analyzed whether it has a known attack pattern, so as to detect ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1425
Inventor 闫卓旭赵增荣赵冠哲
Owner HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products