Network transmission protocol intrusion detection method and system
A network transmission protocol and intrusion detection technology, applied in the computer field, can solve the problems of increased performance consumption, low matching detection efficiency, waste of system resources, etc., and achieve the effect of reducing data flow, reducing calculation amount, and improving detection efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052]In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0053] The scanning and matching efficiency of network security products for data streams has always been the focus of network security products. With the substantial increase in network traffic, network security products must continuously improve the specifications of hardware products in order to ensure the detection of security threats as much as possible while ensuring the high-speed opera...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


