Data processing system and method for network flow monitoring
A data processing system and network traffic technology, which is applied in the field of data processing systems for network traffic monitoring, can solve a large number of data processing and analysis problems, achieve efficient data organization forms and systems, avoid leakage risks, and enhance security.
Pending Publication Date: 2022-07-22
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention discloses a data processing system and method for network flow monitoring, the system comprises a data acquisition layer, a data processing layer and a data output and display layer, the data acquisition layer is used for acquiring network flow monitoring data; the data processing layer mainly comprises an offline calculation module and a real-time calculation module; and the data output and display layer is used for displaying, analyzing and processing results after data calculation. According to the invention, a multi-level hierarchical division data processing architecture is adopted, so that the network flow monitoring system has an efficient data organization form and system; the service data with high real-time requirement is processed and calculated, so that the user can be helped to find and solve problems in time; and the network flow data adopts an intranet security isolation storage mode, so that the security of the data is enhanced, and the risk of sensitive data leakage is avoided.
Application Domain
Transmission
Technology Topic
Internet trafficMonitoring data +8
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Malicious website prompt method and router
Owner:TENCENT TECH (SHENZHEN) CO LTD +1
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Credible virtual machine platform
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal
Owner:深圳市小石安防科技有限公司
Multiple-factor detection system for aging condition of fuse and assessment method for aging condition
Owner:LINGAO NUCLEAR POWER +2
Classification and recommendation of technical efficacy words
- improve security
Method, device and system used for digesting security policy conflicts
Owner:CHINA TELECOM CORP LTD
Automatic charging system for electric automobile
Owner:WUHAN INSTITUTE OF TECHNOLOGY
Block chain system, and data storage method and apparatus
Owner:ADVANCED NEW TECH CO LTD
Pesticide micro-capsule granules and preparation method thereof
Owner:联合国南通农药剂型开发中心 +1