Security early warning method and device based on protocol identification in scheduling data network

A technology for dispatching data network and protocol identification, which is applied in data exchange network, digital transmission system, electrical components, etc. It can solve the problems of security protection, data monitoring in the dispatching data network, and security warning for malicious intrusion of the dispatching data network. , to achieve the effect of ensuring network security

Inactive Publication Date: 2019-11-08
HEFEI YOUO ELECTRONICS TECH
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention lies in the fact that the existing technology cannot monitor and protect the data in t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security early warning method and device based on protocol identification in scheduling data network
  • Security early warning method and device based on protocol identification in scheduling data network
  • Security early warning method and device based on protocol identification in scheduling data network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0042] Such as figure 1 As shown, it is a flow chart of the security warning method based on protocol identification in the dispatching data network provided by the embodiment of the present invention, such as figure 2 As shown, it is a schematic diagram of the principle of the security early warning method based on protocol identification in the dispatching data network provided by the embodiment of the present invention. The security early warning method based on protocol identification in the dispatching data network provided by the present invention includes:

[0043] Step S1: Preprocessing the incoming data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security early warning method and device based on protocol identification in a scheduling data network. The method comprises the following steps: preprocessing data coming from a network traffic entrance; performing protocol identification on the preprocessed data; performing deep analysis and early warning on the data subjected to protocol identification; the method hasthe advantages that data in the whole scheduling data network is monitored and subjected to safety protection, and safety early warning is carried out on malicious invasion and other risk behaviors existing in the scheduling data network.

Description

technical field [0001] The present invention relates to the monitoring of dispatching data network, and more specifically relates to a security early warning method and device based on protocol identification in dispatching data network. Background technique [0002] The industrial control system in the dispatching data network mainly relies on forward and reverse isolation devices and vertical encryption machines for horizontal and vertical access control, but there is a lack of effective monitoring and protection methods in each area. In order to improve the reliability, availability and controllability of the network, it is necessary to analyze the protocol identification characteristics of the network communication protocol, that is, the communication fingerprint of the network protocol, so as to be able to analyze the information flow, behavior mode, information dissemination and content on the network. Take control. Research on the characteristics of network protocol ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/18H04L63/0236H04L63/0263H04L63/1408H04L69/22
Inventor 刘甫学何兵兵石海春张超缪凯
Owner HEFEI YOUO ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products