IDS system for monitoring and analysis based on real-time network flow and detection method

A real-time network and detection method technology, applied in the field of network security, can solve problems such as high maintenance costs, insufficient attention to network security, and inability to solve the target, and achieve the effect of improving accuracy

Pending Publication Date: 2022-04-19
江苏开博科技有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the network security awareness of small, medium and micro enterprises in my country is relatively weak, and they do not pay enough attention to network security. In addition, the previous network security systems and equipment are difficult to effectively manage in the face of massive unreliable security incidents. The equipment is expensive and the maintenance cost is relatively high. Without professional security operation and maintenance personnel, even if a lot of costs are spent on network security protection, the results achieved are mostly unsatisfactory
[0005] Thus existing work cannot address the goals proposed in the present invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IDS system for monitoring and analysis based on real-time network flow and detection method
  • IDS system for monitoring and analysis based on real-time network flow and detection method
  • IDS system for monitoring and analysis based on real-time network flow and detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0059] Threat-aware device endpoints:

[0060] A switch equipped with a linux system is used for installing and using related functions and programs of the present invention. The main procedures for realizing the functions are as follows:

[0061] (1) Monitoring terminal running program:

[0062] Watchdog, that is, "watchdog", can automatically restart the device when the terminal device is abnormal (such as system crash, etc.), so as to protect the normal operation of the intrusion detection program.

[0063] Linux kernel specific modules communicate with userspace via character devices. Once the user space program opens the character device, it will cause a 1-minute timer to be started in the kernel. After that, the user space program needs to ensure that data is written to the device within 1 minute, and each write operation will cause the timer to be reset. device.

[0064] If the user space program has no write operation within 1 minute, the expiration of the timer wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an IDS system for monitoring and analyzing based on real-time network flow and a detection method, and belongs to the technical field of network security. The monitoring system comprises an interaction module, a data processing module, an intrusion detection module and a visualization module. The detection method comprises the following steps that the interactive system obtains initial data of the user terminal asset data flow of the advanced threat detection perception and response platform, the initial data is received by the data processing module, the data is preprocessed and then packaged into preprocessed data blocks, then anomaly detection is conducted, and a result is output. The traffic abnormality judgment module judges whether intrusion data exists or not, and if yes, the intrusion detection module sends the preprocessed data block to the interaction module for early warning and response; if not, returning the data to the data processing module; and when any one of the deep packet detection result and the deep flow detection result is abnormal or both are abnormal, judging that the collected Internet of Things data flow is abnormal. And the visualization module is used for representing a final result by using a graph.

Description

technical field [0001] The invention relates to an IDS system and a detection method for monitoring and analyzing based on real-time network traffic, belonging to the technical field of network security. Background technique [0002] The network has become an important information construction infrastructure in our country, and frequent network security incidents have caused serious threats to it. In recent years, some research work has begun to focus on real-time intrusion detection, and enterprises and security operators have deployed a large number of network security devices. When a network attack occurs, the network security devices deployed at all levels of the network will generate network security alarm information. However, the focus of these concerns lies in the following two aspects: (1) passive detection, which sends an alarm after the intrusion occurs, and minimizes system losses; (2) uses a large number of filtering rules to check one by one. However, the ala...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/22
CPCH04L63/1408H04L63/1416H04L63/1425H04L41/22H04L63/08
Inventor 陈玉东何卓群邵大培
Owner 江苏开博科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products