Method and device for adjusting defense strategy of firewall
A protection strategy, firewall technology, applied in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Embodiments of the present application are described below in conjunction with the accompanying drawings.
[0020] The embodiments of the present application are applied in the scenario of adjusting firewall protection policies.
[0021] The embodiment of this application provides a method for adjusting the firewall protection strategy, refer to figure 1 shown, including the following steps:
[0022] S101. Acquire abnormal features in the data traffic when it is determined that data traffic enters the firewall.
[0023] Specifically, step S101 may include the following contents of S101a-S101b:
[0024] S101a. Extract abnormal traffic in the data traffic by using a machine learning algorithm, and generate abnormal features corresponding to the abnormal traffic.
[0025] Specifically, when data traffic enters the firewall, machine learning algorithms are used to cluster and classify the traffic to extract abnormal traffic in the data traffic, and then generate correspo...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com