Unlock instant, AI-driven research and patent intelligence for your innovation.

Network flow detection method and device

A network traffic, to-be-detected technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as large transmission loss, low efficiency, and long time-consuming encryption traffic detection, and achieve the effect of ensuring accuracy

Pending Publication Date: 2022-03-01
NEW H3C BIG DATA TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a network traffic detection method and device to solve the problems of long time-consuming, low efficiency, and large transmission loss of encrypted traffic detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow detection method and device
  • Network flow detection method and device
  • Network flow detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0029] Because encryption can hide malware like other private information, it brings a series of malicious traffic such as worms, Trojan horses and viruses. In order to deal with this problem, the current common method is to decrypt the traffic and use devices such as next-generation firewalls to view the traffic; it is also possible to set up a detectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network flow management, and discloses a network flow detection method and device. The method comprises the following steps that: a gateway acquires network traffic to be detected corresponding to a specified port on a server; the gateway performs classification processing on the to-be-detected traffic data according to a preset rule to obtain traffic data corresponding to each traffic type, and the preset rule is a classification rule set for the traffic type; the gateway performs anomaly detection on the traffic data of each traffic type to obtain to-be-distributed traffic data; the gateway distributes the flow data to be distributed to the service node associated with the corresponding flow type; and the service node performs anomaly detection on the received flow data from the gateway when the micro-service is started. By implementing the method and the device, the gateway and each service node can directly perform independent anomaly detection on the traffic data without other modes, so that the detection time of the malicious traffic is saved, and the detection efficiency of the malicious traffic is improved.

Description

technical field [0001] The invention relates to the technical field of network traffic management, in particular to a method and device for detecting network traffic. Background technique [0002] Malicious crawlers, automatons, simulators and other malicious software are increasingly threatening the healthy development of the Internet. Malware usually attacks websites, APPs or APIs at the application layer by forging requests from real users to obtain Internet data, in order to achieve profit-making purposes. In order to protect private data from prying eyes, encryption methods are usually used to protect private data. However, encryption can hide malware just like other private information, thus bringing a series of malicious traffic such as worms, Trojan horses, and viruses. [0003] In order to deal with this problem, the current common method is to decrypt the traffic and use devices such as next-generation firewalls to view the traffic; it is also possible to set up a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/566G06F21/552
Inventor 唐侃毅周波褚军
Owner NEW H3C BIG DATA TECH CO LTD