Check patentability & draft patents in minutes with Patsnap Eureka AI!

Network security intelligent analysis method, system and device

A network security and intelligent analysis technology, applied in the field of network security, can solve problems such as single algorithm scenarios and limitations, and achieve the effect of improving adaptability and efficiency, enhancing accuracy, and high-performance information processing and analysis

Pending Publication Date: 2020-06-09
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a network security intelligent analysis method, system and equipment, which solves the technical problem that the intelligent analysis system architecture in the prior art is mainly limited to a single algorithm scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security intelligent analysis method, system and device
  • Network security intelligent analysis method, system and device
  • Network security intelligent analysis method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0080] The network topology implementation of network security intelligent analysis in this embodiment is as follows: Figure 4 shown by Figure 4 It can be seen that the entire network topology spans the Internet zone, DMZ zone and security IV zone, and the DMZ zone is a security buffer between the Internet and the intranet. In order to prevent the firewall from restricting the normal operation of crawlers, external intelligence data collection and processing are carried out in the Internet zone, while the storage of collected intelligence is carried out in the DMZ zone. Since most of the internal security data comes from devices in the intranet area and border devices, and for the sake of overall security, the collection, storage and processing of internal security data, as well as algorithm libraries, and related devices for algorithm microservices and visual display are placed in Safe Zone IV.

[0081] The deployment and implementation of the network topology in this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security intelligent analysis method, system and device, and the method comprises the following steps that: network security data is collected, and the preprocessingof the collected data is carried out; the preprocessed network security data is input into an algorithm library according to the data type; the micro-service in a network security intelligent analysisalgorithm library analyzes different types of network security data, diagnoses a security situation of the network, and visually displays the security situation. According to the embodiment of the invention, the network security data in the security network is collected, the accuracy of intelligent analysis is greatly enhanced by using network security data, multi-dimensional attack research andjudgment are provided, and different types of network security data are analyzed through different network security intelligent analysis algorithm models, so that the method and the system can performintelligent analysis on multiple scenes, and the defect that an intelligent analysis system architecture in the prior art is limited to a single algorithm scene is overcome.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security intelligent analysis method, system and equipment. Background technique [0002] At present, the traditional intelligent analysis system architecture mainly adopts the offline analysis mode, and only connects to one data source. However, the offline system architecture is often limited to a single algorithm scenario, and only makes outdated analysis judgments based on historical data. It cannot be applied to the requirements of "real-time analysis and quick response" in network security. Therefore, the offline intelligent analysis framework is generally only used for experimental verification analysis. In order to cope with the current complex security situation, intelligent analysis of a single scene is far from enough, and an intelligent analysis architecture that can adapt to multiple scenarios is urgently needed. [0003] To sum up, the intellige...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F16/182G06F16/951
CPCH04L63/1425G06F16/182G06F16/951H04L67/51H04L67/133
Inventor 陈霖许爱东杨航关泽武刘介玮
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More