Method and system for analyzing and restoring network application behavior

A network application and behavioral technology, applied in transmission systems, instruments, computing, etc., can solve problems such as low security and low security precision, and achieve the effect of improving security precision and increasing dimensions

Active Publication Date: 2021-07-16
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current network security and network information auditing are mainly based on the collection, analysis, identification and user behavior analysis of the information flow generated by network application behaviors to determine whether the user's network application behavior is safe. Among them, the information flow generated by network application behavior is the record The information of network activities makes the security accuracy of information security audit results low and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for analyzing and restoring network application behavior
  • Method and system for analyzing and restoring network application behavior
  • Method and system for analyzing and restoring network application behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a method and system for analyzing and restoring network application behavior, which can improve the security accuracy of information security auditing. The network application behavior analysis and restoration method includes: writing process characteristic analysis network data packets into the data warehouse; performing flow restoration on the process characteristic analysis network data packets written into the data warehouse to obtain process characteristic analysis data files; analyzing the obtained process characteristic analysis data file to obtain network application behavior information flow; conduct information security audit on the acquired network application behavior information flow.

Description

technical field [0001] The present application relates to the technical field of information security monitoring, and specifically relates to a method and system for analyzing and restoring network application behavior. Background technique [0002] With the rapid development of computer network technology, the number of Internet users has maintained rapid growth. As of June 2016, my country's Internet users have exceeded 710 million, and the Internet penetration rate has reached 51.7%. +" action plan to promote the diversification and mobile development of government and enterprise services. [0003] However, the continuous growth of the number of Internet users has also brought many problems to network security and network supervision. For example, privacy information leakage, network attacks, stolen card numbers, etc. Therefore, the demand for information security such as network security and network information audit is becoming stronger and stronger. [0004] The curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/55
CPCG06F21/552H04L63/1408
Inventor 孙波房靖杜雄杰姚珊侯美佳董建武李胜男张泽亚刘云昊谢印东王俊彪韩兆岩李硕冯家玮
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products