Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing automatic suppression and protection based on network equipment log

A technology of automatic suppression and network equipment, applied in the direction of safety communication devices, digital transmission systems, electrical components, etc., can solve problems such as control and adjustment, adjustment of suppression strategies, discarding, etc., and achieve the effect of improving efficiency

Active Publication Date: 2022-03-25
CHINA UNITECHS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, there are already a variety of security protection methods based on analyzing network device logs. These methods usually configure a fixed protection strategy for the IP to be protected, but cannot dynamically control and adjust according to the real-time traffic attack situation. For example, once it is determined that it is Blacklist, the black+list cannot be automatically upgraded; the resource pool IP that has not been entered in advance will be automatically discarded even if it is attacked by a large amount of traffic; Adjust the suppression strategy, etc.; therefore, the existing technology is not flexible enough, and the function is relatively single, requiring operation and maintenance managers to manually adjust the protection strategy, resulting in low efficiency of network security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing automatic suppression and protection based on network equipment log
  • Method and device for realizing automatic suppression and protection based on network equipment log
  • Method and device for realizing automatic suppression and protection based on network equipment log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are provided only to enable those skilled in the art to better understand and realize the present invention, but not to limit the present invention in any way. the scope of the invention. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0051] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0052] According to the embodiment of the present invention, a method and devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for realizing automatic suppression and protection based on a network equipment log, and the method comprises the steps: respectively collecting network equipment log information through a front-end processor server which configures each resource pool, and carrying out the classification and preprocessing; the security protection management system receives the pre-processed alarm and flow information, analyzes and stores the information, and dynamically presents the information in real time; and the safety protection management system executes automatic suppression logic according to the acquired IP alarm and flow information, the IP protection level, the alarm notification threshold value and the automatic suppression threshold value, judges whether a real-time suppression task exists at present and whether suppression is in a waiting period or an observation period, and further implements or adjusts a corresponding protection strategy and issues the corresponding protection strategy. According to the method and the device, a resource pool IP protection strategy is flexibly configured according to own service characteristics and requirements, and the working difficulty of operation and maintenance management personnel is reduced; the corresponding suppression or protection rule is dynamically adjusted according to the traffic value in the network equipment log, and the network security protection efficiency is improved.

Description

technical field [0001] The invention relates to the field of realizing security protection based on analyzing network equipment logs, in particular to a method and device for realizing automatic suppression and protection based on network equipment logs. Background technique [0002] In the prior art, there are already a variety of security protection methods based on analyzing network device logs. These methods usually configure a fixed protection strategy for the IP to be protected, but cannot dynamically control and adjust according to the real-time traffic attack situation. For example, once it is determined that it is Blacklist, the black+list cannot be automatically upgraded; the resource pool IP that has not been entered in advance will be automatically discarded even if it is attacked by a large amount of traffic; Adjust the suppression strategy, etc.; therefore, the existing technology is not flexible enough, and the function is relatively single, requiring operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/0631H04L41/069
CPCH04L63/20H04L63/02H04L63/1408H04L63/1425H04L41/0631H04L41/069H04L63/0236H04L63/101
Inventor 张琳琳
Owner CHINA UNITECHS