Workflow node processing method and system applied to network security environment

A network security and disposal method technology, applied in the field of workflow node disposal, can solve the problem of low efficiency of workflow node event disposal, and achieve the effect of improving efficiency and high execution efficiency

Inactive Publication Date: 2021-01-08
中孚安全技术有限公司 +3
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a workflow node disposal method and system applied in a network security environment, aiming to solve the problem of low efficiency of workflow node event disposal in the prior art, and realize automatic matching and dynamic adjustment of event disposal process nodes s efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Workflow node processing method and system applied to network security environment
  • Workflow node processing method and system applied to network security environment
  • Workflow node processing method and system applied to network security environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementation methods and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a workflow node processing method and system applied to a network security environment, and the method comprises the steps: deleting flows, which do not meet the flow matching degree, in a flow resource library from the flow resource library, constructing a candidate flow set, and finding a flow, which meets the given flow matching degree with a recommended flow p, in the candidate flow set; extracting a flow path taking end node of flow p as a starting node from each found flow to serve as a recommended flow path, and forming a recommended flow path set, thereby achieving disposal of workflow nodes. According to the invention, the diversity of the processes is met, the method and the system are suitable for complex and diverse process scenes, and the execution efficiency is high through a breadth-first search algorithm. Moreover, the method has intelligent matching performance, the process does not need to be realized through tedious solidification, and the efficiency of automatic matching and dynamic adjustment of event handling process nodes is greatly improved. The method is not limited to the current network security environment, and can be abstractly used in a more generalized scene.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a workflow node processing method and system applied to a network security environment. Background technique [0002] Big data in the network security environment has a great diversity of data types, such as virus killing, identity authentication, operation and maintenance monitoring, etc. There are hundreds of different sub-categories of security events, so the processing of such diverse security events is closed Different procedures are bound to be used, which in turn involves personnel of various roles in different units and departments. [0003] The business processes of traditional businesses may be large in number, but most of them have single scenarios and types, and the whole is not complicated. Most of the nodes and levels are fixed or do not change much. For example, several fixed roles are configured, and the processes flow during the period, and the diversity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06K9/62G06F17/16
CPCH04L67/10H04L63/20G06F17/16G06F18/22
Inventor 董方辉王蒙李兴国苗功勋
Owner 中孚安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products