Intelligent security monitoring and networking alarm method and system for large-scale network attack

A network attack and security monitoring technology, applied in the field of network security, can solve the problems of slow download speed, inability to stabilize network stability, occupying network resources, etc., to achieve the effect of management, zero failure risk and high delay

Pending Publication Date: 2022-08-09
金祺创(北京)技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security when using the network has always been a concern for citizens. Traditional network security is to establish a security protection system. The security protection system is installed on a computer or a background server. When malicious network attacks occur, through security protection The system blocks, but when the computer is running, its security protection system cannot perform intelligent self-test and analysis, so that it cannot better stabilize the stability of the network, and when the security protection system is performing malicious network attacks When blocking, it will take up a lot of network resources, which will cause the problem of slow upload and download speed when citizens use the network. Therefore, an intelligent security monitoring and networking system for large-scale network attacks is proposed. Alarm method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security monitoring and networking alarm method and system for large-scale network attack
  • Intelligent security monitoring and networking alarm method and system for large-scale network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0063] The present invention provides a technical solution, such as figure 1 and 2As shown, an intelligent security monitoring and networking alarm method for large-scale network attacks, including network attack detection, bypass blocking equipment, specific network traffic blocking, and online behavior management;

[0064] The network attack detection supports fine-grained network attack detection and correlation analysis with netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent security monitoring and networking alarm method and system for large-scale network attacks. The method comprises the steps of network attack detection, bypass blocking equipment, specific network flow blocking and networking behavior management. Wherein the network attack detection supports fine-grained network attack detection, and supports correlation analysis, bypass deployment, zero delay and zero fault risk with network assets; the system is connected to the switch in a bypass mode, service interruption is not needed during access, any delay and interruption cannot be brought to the network during operation, and the reliability reaches the carrier-class 99.99% requirement; the single-machine processing capability of the system can reach 10Gbps, and fine-grained detection and accurate blocking of network data messages are supported; the system supports identification of more than 30 protocols, detection of 13 file types, detection of more than 3000 malicious codes and self-defined detection rules.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a large-scale network attack-oriented intelligent security monitoring and networking alarm method and system. Background technique [0002] With the continuous development of computer technology, network security issues have become more and more concerned, and information networks and security systems have gradually become the basis and guarantee for the healthy development of informatization. There are generally unknown vulnerabilities in equipment and business systems, which makes network security facing more severe challenges and puts forward higher requirements for network security monitoring in the context of the civilianization of network weapons and the organization of network attacks. [0003] The security of network use has always been a concern of citizens. The traditional network security is to establish a set of security protection systems. The security prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1441H04L63/1416H04L63/1425
Inventor 张玉祺杨晓英林明鲁星星周思彤齐文宇张浩波明有为
Owner 金祺创(北京)技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products