Security risk detection processing system and method thereof

A security risk and disposal system technology, which is applied in the field of network security risk detection and security protection, can solve the problems of protocol non-awareness, false positives, false positives, etc., and achieve the effect of ensuring normal operation, reducing impact, and improving accuracy

Pending Publication Date: 2021-12-17
中国人寿保险股份有限公司上海数据中心
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the problems of being unable to understand the upper layer protocols of the network, and the matching of network threat features is not accurate. The main reason for the above problems is that the intrusion prevention system works at the network layer, so it has no awareness of the protocols above the network layer; secondly , IPS mainly uses regular methods to match network attack payloads, which is prone to false positives or missed negatives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk detection processing system and method thereof
  • Security risk detection processing system and method thereof
  • Security risk detection processing system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] A security risk detection and disposal system, including an overall analysis module 1, a Flink stream processing module 2, and a linkage disposal module 3 connected in sequence, the overall analysis module 1 is respectively connected to multiple security devices 4, and is used to receive multiple security devices 4 The log information sent in real time, through processing the received log information, publishes the processed log information to the kafka message queue for consumption by other information consumers, and enters the Flink stream processing module 2 for data analysis. Specifically, The overall analysis module 1 includes an information processing unit, and the information processing unit is used to analyze, normalize and enrich the log information;

[0053]The Flink stream processing module 2 is used to analyze and judge whether the data is a network threat, and send the data judged to be a network threat to the linkage processing module 3 for processing. Spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security risk detection processing system and a method thereof. The system comprises an overall analysis module, an Flink streaming processing module and a linkage processing module which are connected in sequence. The overall analysis module is connected with a plurality of security devices and used for receiving log information sent by the security devices in real time, the received log information is processed, the processed log information is published to a kafka message queue for other information consumers to consume, and data analysis is carried out in an Flink streaming processing module; the Flink streaming processing module is used for analyzing and judging whether the data is a network threat and sending the data judged to be the network threat to the linkage processing module for processing; and the linkage processing module carries out forbidding processing on the data which is judged to be the network threat in combination with preset white list data. Compared with the prior art, the security attack is detected based on the directed graph, the risk can be timely and accurately detected, and the risk can be automatically handled so as to realize automatic defense.

Description

technical field [0001] The invention relates to the technical field of network security risk detection and security protection, in particular to a security risk detection and disposal system and method thereof. Background technique [0002] With the establishment of the current security situational awareness platform, security alarm logs are sent to the situational awareness platform for centralized analysis and disposal. Usually, most situational awareness platforms use correlation analysis methods to analyze security alarms. This method relies heavily on the accuracy of various security alarm data and log specifications, and it is difficult to guarantee the accuracy of risk detection. [0003] In addition, the traditional method of dealing with information security risks is realized through IPS (Intrusion Prevention System) equipment. The traditional method is the fourth layer (network layer) active protection means. This method has the problems of being unable to unders...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/101H04L63/1441H04L63/20
Inventor 陈帆朱筱璐彭晓悦
Owner 中国人寿保险股份有限公司上海数据中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products