Network security monitoring method and device based on HTM algorithm
A network security and algorithm technology, applied in the field of network security, can solve problems such as inaccurate monitoring, achieve the effect of improving accuracy and network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0055] The present embodiment provides a network security monitoring method based on the HTM algorithm, including:
[0056] The first step is to obtain the network protocol traffic data of the user host.
[0057] User hosts usually use a variety of network protocols to communicate with the outside world. This embodiment monitors different network protocol traffic respectively, that is, in the actual monitoring process, the user can set and monitor one or several network protocol traffic. For ease of description, this embodiment only introduces the monitoring of one network protocol traffic.
[0058] Specifically, the network protocol flow data is extracted fro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com