Check patentability & draft patents in minutes with Patsnap Eureka AI!

A network security risk assessment system and a working method thereof

A risk assessment system and network security technology, applied in transmission systems, electrical components, etc., can solve the problems of network security security threats, difficult to detect in time, etc., to achieve the effect of improving security

Inactive Publication Date: 2019-06-04
苏州水易数据科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In many cases, viruses or other unsafe factors spread through the upstream and download of traffic, posing a serious security threat to network security
And because the attacker attacks silently, it is difficult to be discovered in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security risk assessment system and a working method thereof
  • A network security risk assessment system and a working method thereof
  • A network security risk assessment system and a working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] refer to Figure 1-2 as an example.

[0050] A network security risk assessment system, comprising: a user terminal 1 .

[0051] The user terminal 1 includes a traffic monitoring module 11 , an attack extraction module, an attacker database 13 , a traffic judging module 14 , and an abnormality prompting module 15 .

[0052] The traffic monitoring module 11 is used to regularly monitor the traffic of the user terminal 1, and the traffic includes uplink traffic and downlink traffic. The traffic monitoring module 11 intercepts abnormal traffic exceeding a preset traffic threshold, and intercepts the sender and / or receiver of the abnormal traffic.

[0053] The traffic monitoring module 11 monitors the traffic of the user terminal 1 in real time, and monitors and records the upstream traffic and the downstream traffic respectively. The preset flow threshold can be set as the value of the regular flow of the user terminal 1, and can be specifically set by the user terminal...

Embodiment 2

[0066] refer to Figure 3-6 as an example.

[0067] A working method of a network security risk assessment system, the steps comprising:

[0068] The traffic monitoring module 11 regularly monitors the traffic of the user terminal 1 .

[0069] The traffic monitoring module 11 intercepts abnormal traffic exceeding a preset traffic threshold, and intercepts the sender and / or receiver of the abnormal traffic.

[0070] The attack extraction module communicates with the abnormal traffic sender and / or receiver, and extracts the characteristics of the abnormal traffic sender and / or receiver.

[0071] The attacker database 13 compares the attacker features extracted by the attack extraction module according to the stored features of the known attackers.

[0072] If the sender and / or receiver is the same as the data in the attacker database 13, then mark the sender and / or receiver as an abnormal communication party.

[0073] The traffic determination module 14 performs traffic type...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security risk assessment system and a working method thereof. The system comprises a user terminal. The user terminal comprises a flow monitoring module, an attack extraction module, an attacker database, a flow judgment module and an abnormity prompting module; The flow monitoring module is used for monitoring the flow of the user terminal at regular time, and the flow comprises uplink flow and downlink flow; The flow monitoring module intercepts the abnormal flow exceeding a preset flow threshold value and intercepts a sender and / or a receiver of the abnormal flow; The attack extraction module is used for communicating with the abnormal traffic sender and / or receiver and extracting the characteristics of the abnormal traffic sender and / or receiver; Andif the sender and / or the receiver is marked as an abnormal communication party, the abnormal prompting module pushes an abnormal signal to the user terminal when the sender and / or the receiver communicates with the user terminal.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security risk assessment system and a working method thereof. Background technique [0002] With the rapid development of computer technology and the Internet, and the frequent occurrence of network information security incidents in recent years, network information security issues have gradually penetrated into various industries and become the focus of attention. In order to prevent the occurrence of security incidents in advance and avoid losses, network information security assessment has become a key link in understanding network security performance. In many cases, viruses or other unsafe factors spread through the upstream and download of traffic, posing serious security threats to network security. And because the attacker attacks in a silent manner, it is difficult to be discovered in time. Contents of the invention [0003] Purpose of the invention: [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 金驰
Owner 苏州水易数据科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More