A business system flow monitoring system
A business system and traffic monitoring technology, applied in the field of network security systems, which can solve the problems of unequal loss and inability to obtain information about attackers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] The present invention provides a flow monitoring system for a business system, the system includes a flow detection module 1, a system control module 2 and a flow scheduling module 3, specifically as figure 1 shown.
[0029] The traffic detection module 1 is used to detect all traffic accessing the business system. A port detection sub-module 11 will be set at each port of the business system, and the port detection sub-module 11 will transmit all traffic accessing the business system to the traffic detection module 1, and the traffic detection module 1 will detect the traffic and determine whether there is a threat , so as to divide the security level. If the traffic monitoring module 1 judges that the traffic is normal, it forwards the traffic normally; if it judges that the traffic is abnormal, it classifies the security threats to the business system according to the traffic, identifies the attack type of the traffic, and sends the detection result to the Describe...
Embodiment 2
[0034] refer to figure 2 , an implementation of a traffic monitoring system for a business system, specifically comprising the following steps:
[0035] (1) Deploy the traffic monitoring system on the server of the business system;
[0036] (2) Monitor the flow of the access service system through the port detection sub-module, and transmit the monitoring data to the flow detection module of the flow monitoring system;
[0037] (3) The traffic detection module detects the traffic data to determine whether the traffic is abnormal, if there is no abnormality, then forward the traffic normally; if there is an abnormality in the traffic, classify the traffic according to the security threat, and send the traffic detection result to the system control module ;
[0038] (4) The system control module retrieves the system model database data according to the flow detection results, calculates the corresponding simulation system architecture, and generates a simulation system accord...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

