Hardware independence method and system for realizing network traffic security analysis

A technology for network traffic and security analysis, which is applied in the hardware-independent method and system to realize the field of network traffic security analysis, and can solve the problems that traffic analysis is limited by the hardware platform and cannot be effectively deployed, and achieves the effect of effective deployment

Active Publication Date: 2020-11-13
武汉思普崚技术有限公司
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a hardware-independent method and system for realizing network traffic security analysis, to solve the problem that the existing traffic analysis is limited by the hardware platform and cannot be effectively deployed, and adopts physical clustering traffic first, and deploys several The virtual machine executes the traffic security analysis process. The virtual machine can dynamically deploy a special virtual machine to process the specified traffic according...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware independence method and system for realizing network traffic security analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0032] figure 1 A general flow chart of the hardware-independent method for implementing network traffic security analysis provided by this application, the method includes:

[0033] Obtain network traffic through a physical interface, analyze the speed of network traffic within a specified time, extract the identification information of the network traffic, cluster the acquired network traffic according to the identification information, and combine the speed distribution of network traffic to obtain clustering of different identification information The velocity distribution corresponding to the subsequent network traffic;

[0034] Arrange sev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hardware independence method and system for realizing network traffic security analysis. The problems are solved that existing flow analysis is limited by a hardware platform,and effective deployment cannot be achieved. The method comprises the steps of: physically clustering the flow, and deploying a plurality of virtual machines on the platform to execute a traffic security analysis process, wherein the virtual machine can be distributed according to the speed of clustering flow; dynamically deploying a special virtual machine to process the specified flow; and meanwhile, arranging hardware probes on the bus, so that preliminary keyword matching can be directly carried out on the flow message, the flow message serves as an interface in butt joint with other third parties, abnormal points are found through deep detection of the flow by the virtual machine, tracing and morphological analysis comparison are carried out on the abnormal points to obtain an attackcoverage surface and virtual machine distribution, and effective deployment of a defense strategy is realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a hardware-independent method and system for implementing network traffic security analysis. Background technique [0002] Existing traffic analysis methods usually rely on a specific hardware platform. The greater the network traffic, the higher the requirements for hardware and deployment. However, the deployment environments in real scenarios are diverse, and the hardware facilities provided are also different, which puts forward new requirements for the traffic analysis system. [0003] The future traffic analysis system should be widely applicable to various hardware platforms. Users can ignore the hardware and leave it to the platform system to adapt. The platform system can be dynamically adjusted according to the current state of the hardware platform. [0004] Therefore, there is an urgent need for a targeted hardware-independent method and system fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26G06N20/00
CPCG06N20/00H04L43/12H04L63/1416H04L63/1425
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products