Network space surveying and mapping method based on service verification
A technology of cyberspace and space, applied in the field of network security, can solve the problems of low success rate of active detection, unreachable target IP, affecting network usage, etc., and achieve the effect of enriching space surveying and mapping information, improving use value, and improving efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] A network space mapping method based on service verification, characterized in that: the method includes the following steps:
[0039] A. Analyze traffic logs, mirrored traffic, and offline data in sequence to obtain analysis results;
[0040] The traffic log is analyzed: the metadata decoding server MDP parses the offline data packets put into the designated folder;
[0041] The image traffic is analyzed: access traffic from the mirror traffic port of the core switch to the INTER network card, and use the metadata decoding server MDP to parse the traffic data into quintuple+PAYLOAD data;
[0042] The offline data is analyzed: IP, destination port, and protocol obtained from the quintuple information. If there is PAYLOAD, then use the fingerprint analysis engine to identify the equipment corresponding to the port, operating system, application, and primary key information from PAYLOAD, and at the same time Save the communication attributes of the original IP and the de...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com