Unlock instant, AI-driven research and patent intelligence for your innovation.

A business system flow monitoring system

A business system and traffic monitoring technology, applied in the field of network security systems, which can solve the problems of unequal loss and inability to obtain information about attackers.

Active Publication Date: 2020-09-01
海南上德科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing network security protection systems often passively withstand and defend against external malicious attacks. For the attacker and the attacked, the possible losses caused by each attack are not equal, which also puts the attacked system at a disadvantage. status, and when the system is attacked, it cannot obtain relevant information about the attacker, so as to carry out targeted defense. This information inequality also greatly increases the difficulty of defending against network traffic attacks. Therefore, it is necessary to establish a business The system traffic monitoring system can induce attackers and obtain attack information, so that targeted defense measures can be taken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A business system flow monitoring system
  • A business system flow monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The present invention provides a flow monitoring system for a business system, the system includes a flow detection module 1, a system control module 2 and a flow scheduling module 3, specifically as figure 1 shown.

[0029] The traffic detection module 1 is used to detect all traffic accessing the business system. A port detection sub-module 11 will be set at each port of the business system, and the port detection sub-module 11 will transmit all traffic accessing the business system to the traffic detection module 1, and the traffic detection module 1 will detect the traffic and determine whether there is a threat , so as to divide the security level. If the traffic monitoring module 1 judges that the traffic is normal, it forwards the traffic normally; if it judges that the traffic is abnormal, it classifies the security threats to the business system according to the traffic, identifies the attack type of the traffic, and sends the detection result to the Describe...

Embodiment 2

[0034] refer to figure 2 , an implementation of a traffic monitoring system for a business system, specifically comprising the following steps:

[0035] (1) Deploy the traffic monitoring system on the server of the business system;

[0036] (2) Monitor the flow of the access service system through the port detection sub-module, and transmit the monitoring data to the flow detection module of the flow monitoring system;

[0037] (3) The traffic detection module detects the traffic data to determine whether the traffic is abnormal, if there is no abnormality, then forward the traffic normally; if there is an abnormality in the traffic, classify the traffic according to the security threat, and send the traffic detection result to the system control module ;

[0038] (4) The system control module retrieves the system model database data according to the flow detection results, calculates the corresponding simulation system architecture, and generates a simulation system accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service system traffic monitoring system. The system comprises a traffic detection module, a system control module and a traffic scheduling module, the traffic detection module is used for performing mirror detection on all traffics accessing the service system to discover abnormal traffic that threatens the security of the service system; the system control module is used for dynamically generating a corresponding simulation system according to the abnormal access information, and completing the configuration of the simulation system network; and the traffic scheduling module is used for scheduling the detected abnormal traffic to the simulation system, and accomplishing corresponding attack detection, forensics and protection works. The service system traffic monitoring system provided by the invention can schedule suspicious access traffics to protect the system that actually performs the service.

Description

technical field [0001] The invention relates to the field of network security systems, in particular to a traffic monitoring system of a business system. Background technique [0002] Existing network security protection systems often passively withstand and defend against external malicious attacks. For the attacker and the attacked, the possible losses caused by each attack are not equal, which also puts the attacked system at a disadvantage. status, and when the system is attacked, it cannot obtain relevant information about the attacker, so as to carry out targeted defense. This information inequality also greatly increases the difficulty of defending against network traffic attacks. Therefore, it is necessary to establish a business The system traffic monitoring system can induce attackers and obtain attack information, so that targeted defense measures can be taken. Contents of the invention [0003] In view of this, the object of the present invention is to provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 江隆海吴多新王文龙李明清
Owner 海南上德科技有限公司