Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security monitoring method and device based on HTM algorithm

A network security and algorithm technology, applied in the field of network security, can solve problems such as inaccurate monitoring, achieve the effect of improving accuracy and network security

Inactive Publication Date: 2019-09-10
中电长城网际安全技术研究院(北京)有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To this end, the present invention provides a method and device for network security monitoring based on the HTM algorithm to solve the problem of inaccurate monitoring in the prior art due to monitoring all traffic of user hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method and device based on HTM algorithm
  • Network security monitoring method and device based on HTM algorithm
  • Network security monitoring method and device based on HTM algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0055] The present embodiment provides a network security monitoring method based on the HTM algorithm, including:

[0056] The first step is to obtain the network protocol traffic data of the user host.

[0057] User hosts usually use a variety of network protocols to communicate with the outside world. This embodiment monitors different network protocol traffic respectively, that is, in the actual monitoring process, the user can set and monitor one or several network protocol traffic. For ease of description, this embodiment only introduces the monitoring of one network protocol traffic.

[0058] Specifically, the network protocol flow data is extracted fro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security monitoring method and device based on an HTM algorithm. The method comprises the following steps: acquiring network protocol flow data of a user host; and processing the network protocol flow data through an HTM algorithm to obtain the network security of the user host. Subtle network protocol flow changes can be discovered, so that malicious attack behaviors can be discovered in time, and the user host protection capability is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security monitoring method and device based on a Hierarchical Temporal Memory (HTM) algorithm. Background technique [0002] Cyber ​​attacks have evolved with the birth of the Internet and with the development of the Internet. Advanced Persistent Threat (APT) highlights the directional and concealment of attacks, and poses a huge challenge to cyberspace security. How to identify hidden abnormal network attack behaviors from massive network data has become a research focus in the field of network security. [0003] The currently adopted network security monitoring method takes network traffic as the detection object, and judges the security of the network by detecting whether the network traffic is abnormal. Network traffic anomaly detection includes univariate anomaly detection and multivariate anomaly detection. Among them, univariate anomaly detection can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/082H04L41/145H04L63/1425
Inventor 罗赟骞邬江
Owner 中电长城网际安全技术研究院(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products