A network security risk assessment system and a working method thereof
A risk assessment system and network security technology, applied in transmission systems, electrical components, etc., can solve the problems of network security security threats, difficult to detect in time, etc., to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] refer to Figure 1-2 as an example.
[0050] A network security risk assessment system, comprising: a user terminal 1 .
[0051] The user terminal 1 includes a traffic monitoring module 11 , an attack extraction module, an attacker database 13 , a traffic judging module 14 , and an abnormality prompting module 15 .
[0052] The traffic monitoring module 11 is used to regularly monitor the traffic of the user terminal 1, and the traffic includes uplink traffic and downlink traffic. The traffic monitoring module 11 intercepts abnormal traffic exceeding a preset traffic threshold, and intercepts the sender and / or receiver of the abnormal traffic.
[0053] The traffic monitoring module 11 monitors the traffic of the user terminal 1 in real time, and monitors and records the upstream traffic and the downstream traffic respectively. The preset flow threshold can be set as the value of the regular flow of the user terminal 1, and can be specifically set by the user terminal...
Embodiment 2
[0066] refer to Figure 3-6 as an example.
[0067] A working method of a network security risk assessment system, the steps comprising:
[0068] The traffic monitoring module 11 regularly monitors the traffic of the user terminal 1 .
[0069] The traffic monitoring module 11 intercepts abnormal traffic exceeding a preset traffic threshold, and intercepts the sender and / or receiver of the abnormal traffic.
[0070] The attack extraction module communicates with the abnormal traffic sender and / or receiver, and extracts the characteristics of the abnormal traffic sender and / or receiver.
[0071] The attacker database 13 compares the attacker features extracted by the attack extraction module according to the stored features of the known attackers.
[0072] If the sender and / or receiver is the same as the data in the attacker database 13, then mark the sender and / or receiver as an abnormal communication party.
[0073] The traffic determination module 14 performs traffic type...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



