Data security monitoring method and device, electronic equipment and readable medium

A security monitoring and data technology, applied in the computer field, can solve the problems of fine data mining analysis, poor retrospective analysis of historical network traffic data, etc.

Pending Publication Date: 2020-06-12
CEC CYBERSPACE GREAT WALL
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To this end, the present invention provides a data security monitoring method and device, electronic equipment, and a readable medium to solve the problem that the network traffic data cannot be analyzed due to the poor ability to retrospectively analyze the historical network traffic data in the prior art. In-depth, multi-dimensional fine data mining analysis problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security monitoring method and device, electronic equipment and readable medium
  • Data security monitoring method and device, electronic equipment and readable medium
  • Data security monitoring method and device, electronic equipment and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] An embodiment of the present application provides a data security monitoring method, which can be applied to a data security monitoring device. Such as figure 1 shown, including:

[0034] Step 110: Perform protocol identification on the acquired network traffic data to determine the protocol type of the network traffic data.

[0035] Step 120: Analyze and reorganize the network traffic data layer by layer according to the protocol type and the corresponding protocol features to obtain the corresponding restored data.

[0036] For example, the restored data may be any one or several of various data records, text files, picture files and video files. The above description of the restored data is only an example, and the details can be set according to the actual situation. Other restored data that are not illustrated are also within the protection scope of the present application, and will not be repeated here.

[0037] In some specific implementations, the restored da...

Embodiment 2

[0149] Figure 7 This is a block diagram of a data security monitoring device provided by the embodiment of the present application. For the specific implementation of the device, please refer to the relevant description of the first embodiment, and the repetition will not be repeated. It is worth noting that the specific implementation of the device in this embodiment is not limited to the above embodiments, and other undescribed embodiments are also within the protection scope of the device.

[0150] Such as Figure 7 As shown, the data security monitoring device specifically includes: a protocol type determination module 701 is used to identify the protocol of the acquired network traffic data, and determine the protocol type of the network traffic data; a parsing and reorganization module 702 is used to base the protocol type and the corresponding The protocol feature is to analyze and reorganize the network traffic data layer by layer to obtain the corresponding restored...

Embodiment 3

[0157] An embodiment of the present application provides an electronic device. Figure 9 It is a structural diagram of an exemplary hardware architecture of an electronic device that can implement the data security monitoring method and device according to the embodiments of the present application.

[0158] Such as Figure 9 As shown, the electronic device 900 includes an input device 901 , an input interface 902 , a central processing unit 903 , a memory 904 , an output interface 905 , and an output device 906 . Wherein, the input interface 902, the central processing unit 903, the memory 904, and the output interface 905 are connected to each other through the bus 907, and the input device 901 and the output device 906 are respectively connected to the bus 907 through the input interface 902 and the output interface 905, and then connected to the electronic device 900 other component connections.

[0159] Specifically, the input device 901 receives external input informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security monitoring method and device, electronic equipment and a readable medium, and the method comprises the steps: carrying out the protocol recognition of obtainednetwork flow data, and determining the protocol type of the network flow data; analyzing and recombining the network flow data layer by layer according to the protocol type and the corresponding protocol characteristics to obtain corresponding restored data; and analyzing and detecting the restored data, and determining whether the restored data is abnormal or not. According to different protocoltypes, multi-level data analysis and data recombination are carried out on the obtained network flow data; according to the method, the restored data is acquired by analyzing and detecting the restored data, and whether the restored data is abnormal or not, namely hidden threats, exists in the restored data or not is determined, so that various hidden threats in the network can be discovered in time, and various network attacks with long latency time and complex attack means can be discovered.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data security monitoring method and device, electronic equipment, and a readable medium. Background technique [0002] With the comprehensive construction and rapid development of network informatization, more and more key services and applications are carried on the network. Enterprises are always faced with various operational threats such as business interruption and economic loss caused by network failures. Traditional network traffic Although the analysis method can monitor the running status in real time, discover abnormal network communication behaviors in time, and quickly locate network and application faults, it has played a certain role in ensuring the efficient operation of key businesses of the enterprise. [0003] However, the traditional network traffic analysis method cannot take into account continuous traffic monitoring, historical communication data analysi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L29/12
CPCH04L63/1425H04L63/1416H04L63/1441H04L63/1458H04L43/028H04L43/16H04L69/18H04L69/26H04L61/4511
Inventor 杨喜志王浩文黄朝富苟道伟
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products