Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security protection method and network security protection device

A network security and network communication technology, which is applied in the field of network security protection methods and network security protection devices, can solve problems such as heavy workload, poor versatility, and complicated protection methods, and achieve good versatility, good versatility, and efficient network The effect of security protection

Active Publication Date: 2020-07-10
UNIONMANTECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the existing protection methods are cumbersome and complex, with a large workload and poor versatility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and network security protection device
  • Network security protection method and network security protection device
  • Network security protection method and network security protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The specific implementation manners of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation manners described here are only used to illustrate and explain the embodiments of the present invention, and are not intended to limit the embodiments of the present invention.

[0063] The network security protection method provided by the embodiment of the present invention is as follows: figure 1 shown, including the following steps:

[0064] Step S101, intercepting network communication data to obtain data to be identified;

[0065] In this embodiment, network communication data is continuously intercepted to monitor various network communication data in real time. Specifically, the following two methods may be preferably used to intercept network communication data to obtain data to be identified:

[0066] The first method includes: continuously inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and provides a network security protection method and device, and the method comprises the steps: intercepting network communication data, and obtaining to-be-recognized data; converting the to-be-recognized data into an image in a predetermined format; performing image feature extraction on the image in the predetermined format toobtain image feature points; inputting the image feature points into a trained communication intention recognition model to obtain a first communication intention output by the trained communication intention recognition model; and protecting the network security according to the first communication intention. According to the technical scheme provided by the invention, network security protectioncan be automatically and efficiently carried out, and the universality is good.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security protection method and a network security protection device. Background technique [0002] Existing network security protection strategies mainly include access control, network isolation, information filtering, information fault tolerance, data mirroring, data backup, and data auditing, among which information filtering and access control are the primary protection strategies. [0003] Existing protection methods include data packet feature matching and / or network communication behavior feature matching. At this stage, these two feature matching methods need to establish their corresponding feature databases in advance, and design different features for different types of network data. The extraction method needs to analyze the data packets to obtain identifiable data and count the communication steps in the network communication process. On the basis ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/46G06K9/62G06N20/10
CPCH04L63/1408H04L63/1441G06N20/10G06V10/462G06F18/23
Inventor 肖俊海詹启军林榕
Owner UNIONMANTECH