Unlock instant, AI-driven research and patent intelligence for your innovation.

System, method and device for monitoring network data

A network and data monitoring technology, applied in the computer field, can solve the problems of increasing the complexity of monitoring mirror data, affecting the efficiency of monitoring mirror data, and poor portability, so as to improve portability and flexibility, improve transmission efficiency, and reduce resources. The effect of spending

Pending Publication Date: 2020-11-10
北京天空卫士网络安全技术有限公司
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When the traffic of the image data to be monitored is large, the method of monitoring the network data using the kernel module (kernel-module) is to obtain all the bypass image data without processing, so it is necessary to apply for a large amount of space in the kernel to cache the unprocessed data data, the kernel memory usage rate may be too high, resulting in system stability problems caused by excessive resource consumption, which affects the efficiency of monitoring mirror data; and mirror data is mainly transmitted based on the transmission control protocol, so in the kernel module for To judge the validity of the data, it is necessary to process multiple connections of the data, which increases the complexity of mirror data processing; because the kernel module runs on the Linux system, the portability is poor, which in turn increases the complexity of monitoring mirror data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, method and device for monitoring network data
  • System, method and device for monitoring network data
  • System, method and device for monitoring network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0063] Such as figure 1 As shown, the embodiment of the present invention provides a schematic structural diagram of a system 100 for monitoring network data, including a data acquisition unit 101 and a data monitoring unit 102 .

[0064] The data acquisition unit 101 is used to obtain mirror data matching the data acquisition strategy from the data exchange server accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system, a method and a device for monitoring network data, and relates to the technical field of computers. One specific embodiment of the method comprises the steps of processing to-be-monitored network mirror image data according to a self-defined transmission protocol by utilizing a data acquisition and analysis tool, reducing the resource overhead of system cache andmirror image data transmission by combining the data and adjusting the data transmission frequency, improving the system stability and the data monitoring efficiency, and improving the user experience. Multiple connections based on a transmission control protocol are combined and processed, so that the mirror image data transmission efficiency is improved. By restoring the mirror image data containing the self-defined transmission protocol into the data format of the standard transmission control protocol and establishing the virtual connection based on the application layer protocol, the mirror image data can be compatible with a third-party network application layer for analysis and application, and the flexibility of monitoring the network mirror image data is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a system, method and device for monitoring network data. Background technique [0002] In today's Internet era, data security and information security have become issues that enterprises must pay attention to. Usually, the solution for data traffic monitoring is to bypass and mirror the network traffic that needs to be analyzed to the network security monitoring equipment on the backbone network of the enterprise. This can ensure that the normal business traffic of users will not be affected, and at the same time, the network security monitoring equipment can analyze the network data traffic of the bypass mirror in time, and feed back the risk of data traffic to the network administrator; the solution for security products to analyze the traffic of the bypass mirror is usually It is mainly implemented in the form of a traditional Linux-based kernel module (kernel-module), that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/26H04L29/06
CPCH04L67/1095H04L67/141H04L69/329H04L67/025H04L67/146H04L63/0236H04L43/04H04L43/08
Inventor 李刚赵军候俊峰
Owner 北京天空卫士网络安全技术有限公司