Network traffic monitoring and auditing method and system

A network traffic and traffic technology, applied in the field of network security, can solve the problems of difficult operation and maintenance deployment and high deployment complexity in the whole process of competition monitoring, so as to solve the deployment complexity, reduce the burden of operation and maintenance and referees, and reduce the difficulty of deployment. Effect

Inactive Publication Date: 2021-01-29
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and system for network traffic monitoring and auditing, which can solve the problems of high complexi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic monitoring and auditing method and system
  • Network traffic monitoring and auditing method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] The present invention will be described in detail below with reference to the examples, but the present invention is not limited to these examples.

[0019] The embodiment of the present invention provides a network traffic monitoring and auditing method, such as figure 1 As shown, the method includes:

[0020] Step 11. Deploy dynamic probes on hosts and switches;

[0021] Step 12. Use dynamic probes to obtain the traffic data of the host and switch ports;

[0022] Step 13. Determine whether the traffic data is normal;

[0023] Step 14: When the traffic data is abnormal, an alarm message is sent.

[0024] The dynamic probe deployment scheme mainly includes the deployment of the probe host audit function in physical hosts and virtualized environments. In this way, dynamic scene port traffic can be collected to analyze the traffic data.

[0025] By collecting the traffic data of the host and switch ports, the traffic analysis of the data during the game is carried ou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic monitoring and auditing method and system, belongs to the technical field of network security, and can solve the problems of relatively high deployment complexity and relatively high operation and maintenance deployment difficulty in the whole competition monitoring process in an existing computer competition system. The method comprises the following steps: deploying dynamic probes on a host and a switch; acquiring traffic data of a host and a switch port by using a dynamic probe; determining whether the flow data is normal or not; and when the traffic data is abnormal, sending alarm information. The method is used for monitoring and auditing under the computer practical training competition.

Description

technical field [0001] The invention relates to a network flow monitoring and auditing method and system, belonging to the technical field of network security. Background technique [0002] With the rapid development of industrial informatization and Internet of Things technology, industrial control systems are becoming more and more open, and more and more industrial control systems are exposed to the Internet, and exchange data with enterprise intranets and even the Internet. Security threats such as viruses, Trojan horses, intrusion attacks, and denial of service faced by traditional information networks are also spreading to industrial control systems. [0003] Faced with such a situation, in addition to overall security protection construction, my country's industrial control network security industry also needs to improve security awareness and the knowledge and skills of relevant personnel through security training. This has led to the need to hold various competitio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/931
CPCH04L49/208H04L63/1416H04L63/1425
Inventor 傅涛王力郑建平
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products