System and method for detection of Trojan horse return link based on six-dimensional spatial traffic analysis model
A traffic analysis, six-dimensional space technology, applied in the field of information security, can solve problems such as inability to achieve security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.
[0038] The present invention provides an embodiment of a six-dimensional spatial flow analysis model generation system, such as figure 1 shown, including:
[0039] Dimension establishment module 101, is used for establishing the basic element dimension that is made up of source IP, source port, purpose IP, purpose port, protocol number; Set up the time dimension that is made up of the start time and end time of each session; Set up by slope, transmission Change dimensions composed of speed; establish information dimensions composed of fixed keywords, floating keywords, key loa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


