Network flow monitoring method and system

A network traffic and monitoring system technology, applied in the field of Internet data security, can solve problems such as wrong collection results and inability to monitor traffic, and achieve the effect of flexible monitoring methods and reliable monitoring content

Inactive Publication Date: 2019-09-06
CHINA STANDARD SOFTWARE
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] However, the existing flow monitoring methods and flow monitoring devices have the following disadvantages: the monitoring granularity can only be refined to the IP address port, and cannot monitor the flow of a certain process within a certain unit of time
Although some existing monitoring methods can associate the monitored port with the default port used by commonly used software to monitor the flow of processes, this method has certain limitations: if the commonly used software modifies the default running port, errors may occur The collection results of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow monitoring method and system
  • Network flow monitoring method and system
  • Network flow monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to have a further understanding of the technical solution and beneficial effects of the present invention, the technical solution of the present invention and its beneficial effects will be described in detail below in conjunction with the accompanying drawings.

[0077] The network flow monitoring method of the present invention mainly monitors and audits the network flow of the network process in the existing operating system environment, and captures and analyzes the content on the transport layer. The present invention can monitor the network flow of the intranet, You can also monitor the network traffic of the external network. image 3 It is a system frame diagram of a network traffic monitoring system according to an embodiment of the present invention, such as image 3 As shown, the present invention only takes intranet as an example (data flow flows to network interface 60 by network application service module 50), introduces the detailed technical sch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network traffic monitoring method and system, and the method comprises the steps: S1, monitoring a network device, and capturing a data packet from network data generated bya first service module; s2, storing the data packet; s3, analyzing the data packet, and generating a dynamic rule according to an analysis result; s4, importing a static rule, and monitoring and filtering the network data generated by the first service module according to the dynamic rule and the static rule; and S5, transmitting the monitored and filtered network data to a second service module,one of the first service module and the second service module being a network application service module, and the other being a network interface. According to the network flow monitoring method andsystem provided by the invention, the monitoring mode is flexible, the monitoring content is reliable, and the normal transmission of network data is not influenced.

Description

technical field [0001] The invention relates to the technical field of Internet data security, in particular to a method and system for monitoring network traffic. Background technique [0002] With the rapid development of network technology, Internet and communication technology, information network technology has become the basis of politics, military affairs, economy, medical treatment and even various fields of society. Information network occupies an increasingly important position in our life. While network resources are widely used, the problem of information security is becoming more and more serious. Security issues such as network attacks and data destruction also emerged, such as illegal network account sharing, illegal VOIP phone abuse, DDos attacks, worm flooding, etc., which caused a large number of security issues in network traffic, which not only brought economic losses, but also May endanger social security. In response to the above problems, network sup...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/045H04L43/062H04L63/0236H04L63/0245H04L63/0263H04L63/1408H04L63/1425H04L63/1458H04L63/30
Inventor 张培徐宁任明洋王文功岑辉林代向东申利飞
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products