Unlock instant, AI-driven research and patent intelligence for your innovation.

A safety detection method, device and system

A security detection and behavioral technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to achieve business-level security detection, and achieve the effect of security detection

Active Publication Date: 2021-06-18
STATE GRID HEBEI ELECTRIC POWER RES INST
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Relevant security detection methods are aimed at suspicious connections or suspicious assets, and often use single-node and sub-regional detection strategies to find single-point problems, which cannot achieve security detection at the business level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safety detection method, device and system
  • A safety detection method, device and system
  • A safety detection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined arbitrarily with each other.

[0054] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0055] see figure 1 , an embodiment of the present invention proposes a security detection method, including at least one of the following steps:

[0056] Step 100, determine a business behavior center of gravity vector within a preset communication range; wherein, the business behavior center of gravity vector is used to describe the distribution characteris...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a security detection method, device, and system. The security detection method includes at least one of the following steps: determining a business behavior gravity center vector within a preset communication range; wherein the business behavior gravity center vector is used for Describe the distribution characteristics of key business behaviors of the business; determine whether there is a business abnormality within the preset communication range according to the business behavior gravity center vector. The embodiment of the present invention realizes the security detection of the service level within the preset communication range based on the gravity center vector of the service behavior within the preset communication range.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to the field of big data network security analysis, especially a security detection method, device and system. Background technique [0002] With the in-depth development of information technology (IT, Information Technology) in all walks of life and the complexity of IT technology itself, IT technology tends to be hierarchical in structure and widely used in distributed deployment. The traditional single network operation and maintenance The methods are increasingly unable to meet the changing IT technology and new attack methods emerging in an endless stream. Technologies such as virtualized cloud computing have also changed the way IT is deployed under the original structure. [0003] In recent years, with the increase in the number of users, the scale of the network has grown exponentially; at the same time, the types of services carried by the network have also shown a trend of di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20
Inventor 董立勉左晓军侯波涛郗波王春璞刘惠颖张君艳邢文茹
Owner STATE GRID HEBEI ELECTRIC POWER RES INST