Unlock instant, AI-driven research and patent intelligence for your innovation.

A Network Security Baseline Generation Method Based on Full Traffic

A network security and full-flow technology, applied in the field of network security baseline generation based on full-flow, can solve problems such as error-prone, difficult to operate, and inflexible

Active Publication Date: 2021-04-27
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has many problems such as high threshold, difficult operation, inflexibility, and error-prone.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Network Security Baseline Generation Method Based on Full Traffic
  • A Network Security Baseline Generation Method Based on Full Traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.

[0037] The present invention proposes a method for generating a network security baseline based on full traffic, specifically, as figure 1 shown, including the following steps:

[0038] S1. In-depth analysis of network data: Bypass collection of network data packets through the mirror port of the switch, and in-depth analysis of some application layer protocols, extracting public data content and part of application layer in-depth analysis data information in network packets, and generating format data;

[0039] S2. Data cleaning and extraction: perform data cleaning on the formatted data generated after collection and / or parsing, remove duplicate or abnormal data, extract all public data content, and extract other part of the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security baseline generation method based on full flow. The method collects, analyzes and processes network full flow data to generate formatted data and store it in a distributed database, and then aggregates the formatted data , analysis, statistics and other operations to generate a network security baseline, which can be used to identify network intrusion behavior. The network security baseline generation method based on full flow proposed by the present invention can generate a more comprehensive network security baseline, can quickly generate a large-scale and rapid security baseline in the entire regional network, and can quickly and flexibly modify the network security baseline, which has universal application It can be widely used in various network environments. In addition, it avoids the need to rely on the collaborative participation of business experts, network security experts, and network operation and maintenance personnel in the traditional network security baseline generation method, and greatly reduces the technical threshold for network security baseline generation.

Description

technical field [0001] The invention relates to a network security baseline, in particular to a method for generating a network security baseline based on full flow. Background technique [0002] Against the backdrop of the rapid development of the Internet, more and more network security issues have undoubtedly been exposed. With the frequent occurrence of security incidents in major enterprises, network security management has become a hot topic of social concern. As an important link in network security management, network security baseline generation is widely used in industries such as telecommunications, electric power, and finance that use a large number of communication networks and information systems based on IP networks and computer technology. Network security baselines play an important and fundamental role in improving the security of communication networks and information systems in these industries. [0003] The network security baseline refers to the minim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20
Inventor 徐砚李鹏许爱东
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD