Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security situation awareness method based on artificial intelligence

A technology of situational awareness and network security, which is applied in the directions of secure communication devices, energy consumption reduction, advanced technology, etc., can solve the problems of ineffective allocation of resources, large IP uplink traffic due to the number of bandwidth resource connections, and large bandwidth resource encroachment, etc., to achieve Realize the effect of network security situation awareness

Active Publication Date: 2022-08-09
智联信通科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a resource that cannot be effectively allocated and is more vulnerable to DDoS attacks
Since the resource occupation of the public cloud egress by different users is unknown after connection, the experience of end users will be affected by each other
One of the users may use multi-threaded download tools and DDoS tools to make the network suffer from DDoS attacks, causing the party to actually occupy more bandwidth resources, and the infringement of bandwidth resources is mainly reflected in the user's target IP. Too many connections and the upstream traffic of the target IP is too large
[0004] At present, the commonly used method is to simply limit the flow of the connection, and to limit the bandwidth of the target IP based on automatic configuration.
However, it is ineffective to limit the bandwidth of all IPs in advance, because in the case of multiple connection clients such as DDoS and multi-threaded downloads, only the bandwidth limitation of the target IP cannot effectively limit its resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation awareness method based on artificial intelligence
  • Network security situation awareness method based on artificial intelligence
  • Network security situation awareness method based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to further illustrate the technical means and effects adopted by the present invention to achieve the predetermined purpose of the invention, the following describes an artificial intelligence-based network security situational awareness method proposed by the present invention with reference to the accompanying drawings and preferred embodiments, and its specific implementation The mode, structure, features and efficacy are described in detail as follows. In the following description, different "one embodiment" or "another embodiment" are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics in one or more embodiments may be combined in any suitable form.

[0036] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.

[0037]The embodiment of the present invention ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of artificial intelligence, in particular to a network security situation awareness method based on artificial intelligence. The method comprises the following steps: acquiring the connection number, the access duration, the access times, the uplink flow sequence and the total uplink flow of each target IP; calculating an access behavior evaluation index of the target IP based on the access times, the access duration and the uplink flow sequence; analyzing the uplink traffic to obtain a traffic distribution score of each target IP; obtaining a behavior white coefficient according to the connection number and the traffic distribution score; and obtaining the maximum connection number and the maximum uplink flow of the target IP according to the access behavior evaluation index, the behavior battle coefficient and the uplink flow. According to the embodiment of the invention, the maximum connection number and the maximum uplink flow corresponding to each target IP are obtained by analyzing the connection number, the uplink flow and the access duration of the target IP, and the DDoS attack is avoided by limiting the connection number and the uplink flow of the target IP, so that the purpose of network security situation awareness is achieved.

Description

technical field [0001] The invention relates to the technical field of artificial intelligence, in particular to a network security situational awareness method based on artificial intelligence. Background technique [0002] Network security situational awareness is to acquire, understand, display and predict the future development trend of network security based on the security elements that can cause changes in network situation in a large-scale network environment. With the rapid development of computer technology, the business processed on the computer has also developed from the mathematical operation and file processing based on a single computer, the internal business processing and office automation based on the simple connection of the internal network to the complex internal network and enterprise extranet based on the , the enterprise-level computer processing system of the global Internet and the worldwide information sharing and business processing. While the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/142
CPCH04L63/1425H04L63/1458H04L41/142Y02D30/50
Inventor 田常立王晨陈倩张垒周志远田艳艳刘茂宽赵立勋
Owner 智联信通科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products