Unlock instant, AI-driven research and patent intelligence for your innovation.

Network traffic analysis method and system combining threat intelligence and machine learning

A technology of network traffic and machine learning, applied in the field of network security, can solve problems such as poor prediction results and achieve the effect of protecting business data

Active Publication Date: 2020-08-25
武汉思普崚技术有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if there are some network attack predictions, it is only based on the historical data of its own network for machine learning, and the prediction effect is very poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic analysis method and system combining threat intelligence and machine learning
  • Network traffic analysis method and system combining threat intelligence and machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0044] figure 1 A general flow chart of the network traffic analysis method combining threat intelligence and machine learning provided by this application, the method includes:

[0045] Collect one or more of the operating status data, IP data, domain name information, URL information, transmission file data, and database dynamic information of sensors, node equipment, information platforms, and network equipment from different sources;

[0046] After receiving the collected data, perform initialization processing, remove redundant and repeated information in the data, and initialize and convert the data into a unified format according to the ty...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network flow analysis method and system combining threat intelligence and machine learning. The method comprises: collecting data information of multiple ways and preprocessing the data inforamtion into an information data stream. The method overcomes the defect that in the prior art, information only comes from events and behaviors occurring locally, analyzes the association between the information data stream and the popular security event to obtain the security situation value of the key device, and then predicts the attack source and attack path of the network through the model, thereby realizing real-time dynamic prediction of network security and better protecting service data of different users.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network traffic analysis method and system combining threat intelligence and machine learning. Background technique [0002] Most of the existing traffic analysis methods and systems are passive and static, using rules to match the extracted keywords to draw conclusions about whether they are attacked. Even if there are some network attack predictions, it is only based on the historical data of its own network for machine learning, and the prediction effect is very poor. [0003] Therefore, there is an urgent need for a dynamically learning network traffic analysis method and a corresponding system. Contents of the invention [0004] The purpose of the present invention is to provide a network traffic analysis method and system that combines threat intelligence and machine learning, collect data information from various channels, preprocess it into intelli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26G06F16/955G06N20/00
CPCG06F16/955G06N20/00H04L41/142H04L41/145H04L43/045H04L63/1416H04L63/1433
Inventor 段彬
Owner 武汉思普崚技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More