Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic stream scheduling method, system and computer storage medium based on load capacity

A load capacity and flow scheduling technology, applied in the field of network security, can solve problems such as lack of elasticity, large calculation consumption, and increase in traffic attack characteristics, and achieve the effects of overall performance, real-time accurate detection, and prevention of false positives and delays

Active Publication Date: 2021-11-09
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous accumulation of network attack characteristics and rules and the rapid growth of business traffic, the intrusion detection system is in the process of detecting viruses, Trojans, worms, botnets, buffer overflow attacks, distributed denial of service attacks (DDos), scanning detection, spoofing hijacking, etc. , Structured query language (SQL) injection, cross-site scripting (XSS), website hanging horse, abnormal traffic and other malicious attack behaviors are comprehensively detected, because comprehensive detection requires a large amount of calculation, although multi-core technology is used, it is still Unable to meet the rapid growth of traffic and the sharp increase of attack features, the current market products often use the closed detection function to overcome performance bottlenecks when the traffic is very large, so there will be a large number of false positives
With the continuous accumulation of network intrusion features and the sharp increase of network bandwidth, in order to meet the problems of real-time detection and false negatives, parallel detection technology is used. The existing technology mainly adopts multi-core and multi-threading methods, but there are performance bottlenecks in hardware multi-core and multi-threading. And lack of elasticity, the overall performance is lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic stream scheduling method, system and computer storage medium based on load capacity
  • Dynamic stream scheduling method, system and computer storage medium based on load capacity
  • Dynamic stream scheduling method, system and computer storage medium based on load capacity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] figure 1 is a flow chart of the first preferred embodiment of the dynamic flow scheduling method based on load capability of the present invention. Such as figure 1 As shown, in step S1, multiple load flow node groups are constructed, and each load flow node group includes multiple distributed computing nodes. The distributed computing node is the smallest detection unit, which completes the intrusion detection and analysis of the data flow. When the number of intrusion signatures is larger, the intrusion signature library loaded in the distributed computing nodes is larger, and the calcula...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a dynamic flow scheduling method, system and computer storage medium based on load capacity. The method includes constructing a plurality of load flow node groups, generating a node processing capacity table of each load flow node group according to the load condition of each distributed computing node, and loading the intrusion signature database to each load flow node group All the rule files and distribute the whole rule files to each distributed computing node of each load flow node group; generate a dynamic scheduling flow that distributes the received data traffic to different load flow node groups based on the load balancing algorithm A rule; based on the dynamic scheduling flow rule, distribute data traffic to each of the load traffic node groups and copy the distributed data traffic to each distributed computing node in the load traffic node group. The invention can ensure real-time and accurate detection, prevent omission and time delay caused by performance, and realize the maximization of overall performance.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically, relates to a dynamic flow scheduling method, system and computer storage medium based on load capacity. Background technique [0002] With the continuous accumulation of network attack characteristics and rules and the rapid growth of business traffic, the intrusion detection system is in the process of detecting viruses, Trojans, worms, botnets, buffer overflow attacks, distributed denial of service attacks (DDos), scanning detection, spoofing hijacking, etc. , Structured query language (SQL) injection, cross-site scripting (XSS), website hanging horse, abnormal traffic and other malicious attack behaviors are comprehensively detected, because comprehensive detection requires a large amount of calculation, although multi-core technology is used, it is still Unable to meet the rapid growth of traffic and the sharp increase of attack features, current products on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/48G06F9/50
CPCG06F9/4881G06F9/5038G06F9/505G06F9/5083
Inventor 戚建淮伍贤云唐娟刘建辉宋晶
Owner SHENZHEN Y& D ELECTRONICS CO LTD