Network safety analysis method and device based on exit data network traffic

A network security analysis and data network technology, applied in the field of network security analysis based on outbound data network traffic

Pending Publication Date: 2020-08-25
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the security analysis of outbound data network traffic mainly focuses on the design of the evaluation system framework, legal norms, a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety analysis method and device based on exit data network traffic
  • Network safety analysis method and device based on exit data network traffic
  • Network safety analysis method and device based on exit data network traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention will not be limited to the embodiments shown herein...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network safety analysis method based on exit data network traffic. The method comprises the following steps: receiving an analysis request of a user; determining to-be-analyzed exit data network flow and sum according to the analysis request; determining a retrieval keyword according to the analysis request; and traversing the to-be-analyzed exit data network traffic, andsearching for sensitive exit data matched with the retrieval keyword. The invention discloses a safety analysis method. The retrieval keywords and the to-be-analyzed exit data network flow in the analysis request are determined, the to-be-analyzed exit data network flow is traversed, and the sensitive exit data matched with the retrieval keywords is searched, so that the safety analysis of the to-be-analyzed exit data network flow from a bottom data flow analysis level is realized.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a network security analysis method and device based on outbound data network traffic. Background technique [0002] With the increasing frequency of e-commerce and other related cross-border services, the outbound data network traffic is increasing, and the outbound network traffic data may carry sensitive traffic data related to national security, industrial security, and personal privacy rights and interests. [0003] At present, the security analysis of outbound data network traffic mainly focuses on the design of the evaluation system framework, legal norms, and implementation rules. There is a lack of a method for security analysis of outbound data network traffic from the underlying data flow analysis level. Contents of the invention [0004] In view of this, the present invention provides a network security analysis method and device based on outbound data networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/335G06F16/383G06F16/35G06F16/953
CPCG06F16/335G06F16/383G06F16/35G06F16/953
Inventor 都婧刘相晨任望谢丰杨光王永涛佟鑫
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products