Network security event detection method based on block chain technology

A network security and event detection technology, applied in the field of network security, can solve problems such as low processing efficiency, processing capacity limitation, processing speed limitation, etc., to achieve the effect of improving processing efficiency, avoiding violation probability, and increasing security

Pending Publication Date: 2020-09-11
XUZHOU VOCATIONAL COLLEGE OF BIOENG
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Security incidents also occur frequently when people use mobile applications, such as data leakage, hacker attacks, infrastructure attacks, discovery of security vulnerabilities, malware, industry financing investment acquisitions, etc. Traditionally, network security incidents are handled independently , which will lead to the limitation of processing speed and processing capacity, and lack of supervision on the processing process, resulting in improper handling of network security incidents or low processing efficiency, which will bring huge losses to users and society

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The invention provides a technical solution:

[0026] A method for detecting network security incidents based on blockchain technology, comprising the following steps:

[0027] S1. Serialize the data, and store the serialized detection data in the data block chain;

[0028] S2. The detection personnel and the detection data realize the signal connection, and transmit the detection data in real time;

[0029] S3. When the external data forms an imitation signal detection to access the computer, the detection data compares and analyzes the IP address and data access model of the access signal;

[0030] S4. If the analysis is abnormal, the access is rejected, and the accessed end sends a warning signal to the host administrator, and cuts off the external signal connection. If the analysis is normal, the accessed end sends a confirmation signal to the host. confirmation signal;

[0031] S5. The host performs an analogy analysis based on the received abnormal early warnin...

Embodiment 2

[0037] A method for detecting network security incidents based on blockchain technology, comprising the following steps:

[0038] S1. Serialize the data, and store the serialized detection data in the data block chain;

[0039] S2. The detection personnel and the detection data realize the signal connection, and transmit the detection data in real time;

[0040] S3. When the external data forms an imitation signal detection to access the computer, the detection data compares and analyzes the IP address and data access model of the access signal;

[0041] S4. If the analysis is abnormal, the access is rejected, and the accessed end sends a warning signal to the host administrator, and cuts off the external signal connection. If the analysis is normal, the accessed end sends a confirmation signal to the host. confirmation signal;

[0042] S5. The host performs an analogy analysis based on the received abnormal early warning information and the security accident stored in the r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security event detection method based on a block chain technology, which comprises the following operation steps: S1, serializing data, and storing the serialized detection data in a data block chain; S2, realizing signal connection between the detection personnel and the detection data, and transmitting the detection data in real time; and S3, after external dataform simulation signal detection to access the computer, the detection data performs comparative analysis on the IP address and the data access model of the access signal. Through the analog signal,the real-time recording signal and the real-time comparative analysis alarm, abnormal signals are processed in time, the invasion probability of an external access end to a user network is avoided, and the use security of the method is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for detecting network security events based on block chain technology. Background technique [0002] With the rapid development of the Internet in recent years, more and more people choose to shop and consume online. When people shop online, they will compare and refer to the ratings and rankings of commodities and virtual products or product reviews written by other users. Because people rely on these ratings and opinions, and as the problem of information overload becomes more and more serious, thus promoting Developed recommender systems for automation and personalization. However, due to the unfair competition of business or the incentive of natural profit, various biased online reviews are left for extreme ratings in product competitions, resulting in the so-called "spoofing attacks". Malicious users take advantage of the openness of collaborative filteri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57G06F16/27H04L29/06
CPCG06F21/554G06F21/577G06F16/27H04L63/1416
Inventor 杜淑颖
Owner XUZHOU VOCATIONAL COLLEGE OF BIOENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products