Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security monitoring method based on the network life frequency spectrum

A network security and spectrum technology, applied in secure communication devices, data exchange networks, digital transmission systems, etc., can solve problems such as network unavailability, network congestion, and the inability of the network to provide normal services.

Inactive Publication Date: 2007-08-15
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The impact of abnormal traffic on the network is mainly reflected in two aspects. It occupies bandwidth resources, congests the network, causes network packet loss, increases delay, and in severe cases, causes network unavailability; occupies network device system resources (CPU, memory, etc.) , so that the network cannot provide normal services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method based on the network life frequency spectrum
  • Network security monitoring method based on the network life frequency spectrum
  • Network security monitoring method based on the network life frequency spectrum

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0084] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0085] The system based on the method of the invention is composed of flow collection, frequency spectrum structure, drawing and display modules. The specific implementation and application of each module are as follows:

[0086] (1) Traffic collection: through hardware network devices integrated with security function chips, under the control of network traffic security policies, collect traffic information in the entire network environment with a fixed network traffic sampling cycle;

[0087] (2) Spectrum structure: extract the network security characteristic parameters that represent the network security and health degree, and assign different weight coefficients to the network security characteristic parameters according to their decisive role and influence degree on the network security and health degree, and perform normalization Process and construct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The network security monitor method based on network life frequency spectrum comprises: with fixed network-flow sampling period, collecting network flow, extracting network security eigen parameter and normalizing to form a network life spectrum representing network security and healthy level vividly. This invention is real time and dynamic, and provides reference and support for management decision.

Description

technical field [0001] The invention relates to a network security monitoring method based on network vital spectrum, and proposes a network vital spectrum representing network security and health, belonging to the field of computer network security. Background technique [0002] With the construction of information technology and the popularization of network applications, network security issues have encountered new severe challenges - DoS / DDoS attacks, large-scale outbreaks of worms, large amounts of spam that are difficult to suppress, and wanton flooding of various P2P video / voice downloads Abnormal network traffic generated by such applications seriously affects the network speed of the local area network and information applications, leading to large-scale network interruptions, a large waste of resources and hundreds of millions of economic losses. Although various security devices and products such as firewalls, IDS / IPS, and anti-viruses have been deployed in the ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06H04L12/56H04L12/801
Inventor 庄文君李清玉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products