Unlock instant, AI-driven research and patent intelligence for your innovation.

Network monitoring method, device, computer equipment and storage medium

A network monitoring and network technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as inability to accurately detect attack behaviors, achieve timely blocking of risk events, improve threat detection capabilities, and improve accuracy degree of effect

Active Publication Date: 2022-07-19
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional attack behavior detection method has the problem of being unable to accurately detect the attack behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network monitoring method, device, computer equipment and storage medium
  • Network monitoring method, device, computer equipment and storage medium
  • Network monitoring method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the objectives, technical solutions and advantages of the present application more clear, the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0053] The network monitoring method provided in the embodiment of the present application can be applied to such as figure 1 computer equipment shown. The computer device includes a processor and a memory connected through a system bus, where a computer program is stored in the memory, and the processor can execute the steps of the following method embodiments when the processor executes the computer program. Optionally, the computer equipment may further include a network interface, a display screen and an input device. Among them, the processor of the computer device is use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to the technical fields of information security and artificial intelligence, and in particular, to a network monitoring method, apparatus, computer equipment and storage medium. The method includes: constructing a network traffic graph according to the original data in the network; constructing a traffic graph adjacency matrix based on the network traffic graph; reconstructing the traffic graph adjacency matrix by using an auto-encoding neural network model to obtain a re-establishment process. constructing a graph adjacency matrix; according to the traffic graph adjacency matrix and the reconstructed graph adjacency matrix, it is determined whether the original data includes attack traffic. Using the method can improve the accuracy of determining whether the original data includes attack traffic.

Description

technical field [0001] The present application relates to the technical fields of information security and artificial intelligence, and in particular, to a network monitoring method, apparatus, computer equipment and storage medium. Background technique [0002] With the continuous deepening of Internet attacks, hacker attacks have become more organized and intelligent from single-point and independent attacks, and the threat of attacks on the internal network has become more and more serious. The web server is a springboard to attack other network nodes in the network, such as from the web server to the application server, and then to the database server. [0003] In the traditional technology, detection methods for attacking behaviors are mainly based on preset detection rules or detection using existing historical attack methods. However, there is a problem that the traditional attack behavior detection method cannot accurately detect the attack behavior. SUMMARY OF TH...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/142
CPCH04L63/1416H04L41/142H04L41/145
Inventor 程佩哲吕博良张诚旷亚和
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA