Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet security monitoring method, electronic equipment and storage medium

A security monitoring and Internet technology, applied in the Internet field, can solve problems such as the inability to assess the risk level of network attacks, the inability to judge the impact of network attacks, and the difficulty in accurately locating core nodes, so as to achieve the effect of efficient Internet security monitoring

Pending Publication Date: 2022-05-03
CHINA MOBILE GROUP SHANDONG +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current Internet security monitoring technology can only monitor link fluctuations, but cannot assess the risk level of network attacks; nor can it judge the degree of impact of network attacks on each node
Therefore, it is difficult to accurately locate the core nodes of current network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet security monitoring method, electronic equipment and storage medium
  • Internet security monitoring method, electronic equipment and storage medium
  • Internet security monitoring method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to better understand the technical solutions of the present application, the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0025] It should be clear that the described embodiments are only some of the embodiments of the present application, not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0026] Terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. The singular forms "a", "said" and "the" used in the embodiments of this application and the appended claims are also intended to include plural forms unless the context clearly indicates otherwise.

[0027] figure 1 It is a flow chart of an Internet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an internet security monitoring method, electronic equipment and a storage medium, and relates to the technical field of internet. The Internet security monitoring method comprises the following steps: clustering acquired alarm information to obtain a plurality of alarm factors; and generating an alarm matrix according to the alarm scores of the plurality of alarm factors. Then determining a feature vector of each alarm factor in the alarm matrix; and finally, further determining the alarm weight of each alarm factor according to the feature vector, and determining the alarm factor with the maximum alarm weight as an alarm root cause. Therefore, when the network attack is faced, the influence degree of the network attack on each node can be quickly judged, the core node of the network attack is accurately positioned, and efficient Internet security monitoring is realized.

Description

【Technical field】 [0001] The present application relates to the technical field of the Internet, in particular to an Internet security monitoring method, electronic equipment and storage media. 【Background technique】 [0002] Internet security has risen to a national strategy and is an important part of national security. The explosive growth of network attacks not only exposes end users to direct threats, but also affects the security of network-side infrastructure and systems. Through Internet security monitoring, predicting the impact of network attacks and effectively locating the core nodes of network attacks are problems that need to be solved urgently. [0003] The current Internet security monitoring technology can only monitor link fluctuations, but cannot assess the risk level of network attacks; nor can it judge the degree of impact of network attacks on each node. Therefore, it is difficult to accurately locate the core nodes of current network attacks. 【Cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L41/0631H04L41/0604G06K9/62
CPCH04L41/065H04L41/0604H04L41/0609G06F18/23
Inventor 王健宋春咏刘绪忠鲁彪司桂静
Owner CHINA MOBILE GROUP SHANDONG