Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting security of Internet by simulating biological neural network

A neural network and Internet technology, which is applied in the field of protecting Internet information security and simulating biological neural network to protect Internet security. The effect of improving the response speed

Inactive Publication Date: 2007-05-09
董孝峰
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The email filtering system using behavior pattern recognition and blacklist filtering arbitrarily treats all emails from this address as spam after completing the SMTP handshake, and the filtering effect is very poor; in the email filtering system using content analysis, when emails pass through the gateway, The spam filtering engine intercepts the mail and analyzes its content, and finds that the spam is processed by rejecting, allowing, forwarding, or deleting
Although these methods can filter spam to a certain extent, they take up a lot of resources on the gateway system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting security of Internet by simulating biological neural network
  • Method and system for protecting security of Internet by simulating biological neural network
  • Method and system for protecting security of Internet by simulating biological neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The specific implementation manner of the present invention will be described below in conjunction with the accompanying drawings.

[0067] Fig. 1 is a system structure diagram of the present invention, the first part is the network sensor, the second part is the analysis center, and the third part is the network effector. Different from Update collecting local version information and Bug information, the network sensor part monitors and collects activity information and content-related information of local network communication in the present invention, and sends them to the information analysis center. Unlike Update, which downloads patches or libraries on the server, the analysis center will use the knowledge accumulated by the center to analyze the data submitted by the network sensor. If the data submitted by the network sensor has attack characteristics or contains prohibited information, the analysis center will instruct Shut down part or all of the connections o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is used for ensuring the safety of content, anti junk mail, antivirus, and anti attack. The method thereof comprises: monitoring the suspicious network behaviors through internet nodes; all collected suspicious behaviors and sampled data are sent to the information security analyzing center to analyze; the information security center uses the release processing strategy and feature base to block the attack behavior and the traffic concerning illegal content.

Description

technical field [0001] The invention relates to the field of the Internet and security systems, in particular to technology for protecting Internet information security, specifically to a method and system for protecting Internet security by simulating a biological neural network. Background technique [0002] The development of the Internet is the greatest invention at the end of the 20th century. The Internet brings great convenience to people's lives. While the Internet has brought convenience to people, viruses spread through the Internet have begun to wreak havoc, and hacker attacks have occurred from time to time. The spread of illegal information through the Internet poses a threat to national security. Therefore, anti-virus, anti-hacking, information security, and content security were born. Ability to specialize in security areas. [0003] The impact of the advent of the Internet age has made viruses have a distorted influence. Transnational and transcontinental I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
Inventor 董孝峰
Owner 董孝峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products