Threat detection system and method based on group intelligence theory
A threat detection and theoretical technology, applied in the field of network security, can solve the problems of effectiveness and light weight, and achieve the effect of improving security and reliability, and improving accuracy and speed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.
[0036] In view of the fact that the current cloud environment adopts the IPS / IDS system for monitoring and protection, there are detection blind spots and the inability to inherit virtual nodes with limited capabilities, and there is no balance between effectiveness and lightweight. For the embodiments of the present invention, see figure 1 As shown, a threat detection system based on crowd intelligence theory is provided, including:
[0037] Heterogeneous static detector, embedded in each cloud node in the cloud environment, detects threats by listening to cloud node ports;
[0038]The heterogeneous dynamic detector is plugged into each cloud node in the cloud environment and detects threats in a dynamic roaming mann...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com