A Network Security Baseline Generation Method Based on Full Traffic
A network security and full-flow technology, applied in the field of network security baseline generation based on full-flow, can solve problems such as error-prone, difficult to operate, and inflexible
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings.
[0037] The present invention proposes a method for generating a network security baseline based on full traffic, specifically, as figure 1 shown, including the following steps:
[0038] S1. In-depth analysis of network data: Bypass collection of network data packets through the mirror port of the switch, and in-depth analysis of some application layer protocols, extracting public data content and part of application layer in-depth analysis data information in network packets, and generating format data;
[0039] S2. Data cleaning and extraction: perform data cleaning on the formatted data generated after collection and / or parsing, remove duplicate or abnormal data, extract all public data content, and extract other part of the a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

