Network security event detection method based on block chain technology
A network security and event detection technology, applied in the field of network security, can solve problems such as low processing efficiency, processing capacity limitation, processing speed limitation, etc., to achieve the effect of improving processing efficiency, avoiding violation probability, and increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0025] The invention provides a technical solution:
[0026] A method for detecting network security incidents based on blockchain technology, comprising the following steps:
[0027] S1. Serialize the data, and store the serialized detection data in the data block chain;
[0028] S2. The detection personnel and the detection data realize the signal connection, and transmit the detection data in real time;
[0029] S3. When the external data forms an imitation signal detection to access the computer, the detection data compares and analyzes the IP address and data access model of the access signal;
[0030] S4. If the analysis is abnormal, the access is rejected, and the accessed end sends a warning signal to the host administrator, and cuts off the external signal connection. If the analysis is normal, the accessed end sends a confirmation signal to the host. confirmation signal;
[0031] S5. The host performs an analogy analysis based on the received abnormal early warnin...
Embodiment 2
[0037] A method for detecting network security incidents based on blockchain technology, comprising the following steps:
[0038] S1. Serialize the data, and store the serialized detection data in the data block chain;
[0039] S2. The detection personnel and the detection data realize the signal connection, and transmit the detection data in real time;
[0040] S3. When the external data forms an imitation signal detection to access the computer, the detection data compares and analyzes the IP address and data access model of the access signal;
[0041] S4. If the analysis is abnormal, the access is rejected, and the accessed end sends a warning signal to the host administrator, and cuts off the external signal connection. If the analysis is normal, the accessed end sends a confirmation signal to the host. confirmation signal;
[0042] S5. The host performs an analogy analysis based on the received abnormal early warning information and the security accident stored in the r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com