Network behavior risk perception and defense method based on behavior characteristic big data analysis

A risk perception and big data technology, applied in the field of network security, can solve the problems that affect the security and reliability of network data communication, low efficiency of network data risk information monitoring, low monitoring accuracy and efficiency, etc., to eliminate threats to network security Data dissemination, good system expansion ability, and the effect of improving work efficiency and quality

Active Publication Date: 2020-02-14
NANJING XINWANG VIDEO NETWORK TECH +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, with the promotion and application of network information technology, many business activities need to be carried out on the basis of the network, which also leads to a large amount of data that threatens the security of network operation such as Trojan horses and malicious scripts, and relevant laws and regulations such as violence, pornography, etc. Illegal data information that is likely to cause adverse social impacts and information that threatens network security is widely disseminated in the network, which seriously affects the security and reliability of network data communications, and is likely to cause great negative social impacts and seriously affect social health. Orderly development, in response to this problem, although a variety of technical means are currently used to monitor the network data in the network server, in order to timely discover and stop the data transmission that threatens the norm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network behavior risk perception and defense method based on behavior characteristic big data analysis
  • Network behavior risk perception and defense method based on behavior characteristic big data analysis
  • Network behavior risk perception and defense method based on behavior characteristic big data analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the technical means, creative features, achievement goals and effects realized by the present invention easy to understand, the present invention will be further described below with reference to the specific embodiments.

[0023] like figure 1 -4 Network behavior risk perception and defense method based on behavioral feature big data analysis, including the following steps:

[0024]S1. The hardware configuration of the risk assessment server. First, according to the TCP / IP communication protocol parameters, network structure type, database structure type and client distribution method of the specified network to be protected, set up a risk assessment server based on AI architecture and at least one other The risk assessment control terminal connected between the AI ​​architecture-based risk assessment servers connects the AI ​​architecture-based risk assessment server to each database, gateway and client of the designated network to be protected throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network behavior risk perception and defense method based on behavior characteristic big data analysis. The network behavior risk perception and defense method comprises five steps of risk assessment server hardware configuration, risk assessment server software configuration, data risk assessment, risk elimination and recovery and data updating. According to the invention, on one hand, effective monitoring and management among all levels of hardware equipment participating in network data transmission can be effectively realized; on the other hand, the initiative ofillegal data information identification and detection operation and the working efficiency and precision of the detection operation are effectively improved; and relevant illegal data information sources can be correspondingly limited and managed, so that the working efficiency and quality of network data transmission detection are effectively improved, and data propagation threatening the network security can be completely eradicated from the source.

Description

technical field [0001] The invention relates to a network behavior risk perception and defense method based on behavior characteristic big data analysis, and belongs to the technical field of network security. Background technique [0002] At present, with the promotion and application of network information technology, many business activities need to be carried out on the basis of the network. At the same time, it also leads to a large number of data such as Trojan horses and malicious scripts that threaten the security of network operation and related laws and regulations such as violence, pornography, etc. Illegal data information that is likely to cause adverse social impact and information that threatens network security are widely spread in the network, which seriously affects the security and reliability of network data communication, and is likely to cause great negative social impact and seriously affect social health. Orderly development, in response to this probl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06G06F16/24G06F16/23
CPCH04L41/0803H04L41/082H04L41/085H04L63/20G06F16/24G06F16/2372
Inventor 石光捷张良付飞龙张晓莉李映范滢
Owner NANJING XINWANG VIDEO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products