A network traffic analysis method and system combining threat intelligence and machine learning

A network traffic and machine learning technology, applied in the field of network security, can solve problems such as poor prediction effect, and achieve the effect of protecting business data

Active Publication Date: 2021-02-09
武汉思普崚技术有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if there are some network attack predictions, it is only based on the historical data of its own network for machine learning, and the prediction effect is very poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network traffic analysis method and system combining threat intelligence and machine learning
  • A network traffic analysis method and system combining threat intelligence and machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0044] figure 1 A general flow chart of the network traffic analysis method combining threat intelligence and machine learning provided by this application, the method includes:

[0045] Collect one or more of the operating status data, IP data, domain name information, URL information, transmission file data, and database dynamic information of sensors, node equipment, information platforms, and network equipment from different sources;

[0046] After receiving the collected data, perform initialization processing, remove redundant and repeated information in the data, and initialize and convert the data into a unified format according to the ty...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a network traffic analysis method and system that combines threat intelligence and machine learning, collects data information from various channels, preprocesses it into intelligence data streams, and overcomes the existing technical information that only comes from local events and behaviors , analyze the correlation between the intelligence data flow and popular security events, obtain the security situation value of key equipment, and then use the model to predict the attack source and attack path of the network, realize real-time dynamic prediction of network security, and better protect the business of different users data.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network traffic analysis method and system combining threat intelligence and machine learning. Background technique [0002] Most of the existing traffic analysis methods and systems are passive and static, using rules to match the extracted keywords to draw conclusions about whether they are attacked. Even if there are some network attack predictions, it is only based on the historical data of its own network for machine learning, and the prediction effect is very poor. [0003] Therefore, there is an urgent need for a dynamically learning network traffic analysis method and a corresponding system. Contents of the invention [0004] The purpose of the present invention is to provide a network traffic analysis method and system that combines threat intelligence and machine learning, collect data information from various channels, preprocess it into intelli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26G06F16/955G06N20/00
CPCG06F16/955G06N20/00H04L41/142H04L41/145H04L43/045H04L63/1416H04L63/1433
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products