Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protection method and network security protection system

A network security and network intrusion technology, applied in the field of network security, can solve the problems of limited storage capacity, high false negative rate, insufficient model accuracy, etc., and achieve the effect of high analysis and prediction accuracy and good network protection

Inactive Publication Date: 2019-06-14
STATE GRID JIBEI ELECTRIC POWER COMPANY +1
View PDF0 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problem of model granularity, ordinary anomaly detection methods have limited computing power, and it is difficult to establish a fine-grained model that is sensitive to abnormal behavior, resulting in a high false negative rate
Taking abnormal traffic detection as an example, the modeling object is often based on the traffic between security domains, which makes the attack traffic between individuals submerged in a large amount of background traffic, making it difficult to detect effectively
[0004] The problem of the number of features, ordinary anomaly detection methods have limited computing power, and it is difficult to establish a high-dimensional model that describes network behavior from different dimensions, resulting in a high false positive rate
The limitation of the number of features selected makes it only possible to judge the abnormality of network behavior based on low-dimensional features
[0005] Model training problem, due to limited storage capacity, it is difficult to fully train the model based on long-term data, resulting in insufficient accuracy of the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and network security protection system
  • Network security protection method and network security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0024] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0025] Embodiments of the present invention provide a network security protection method, such as figure 1 as shown, figure 1 It is a schematic flowchart of a network security protection method according to an embodiment of the present invention, and the method inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security protection method and system. The network security protection method comprises the steps of obtaining multi-dimensional data; preprocessing the acquired multi-dimensional data to generate to-be-analyzed data; analyzing the to-be-analyzed data and generating an early warning report, wherein the early warning report is used for forecasting threats; analyzing the to-be-analyzed data and generating an early warning report, wherein the early warning report at least comprises situation awareness, real-time analysis early warning or network intrusion attackpath and threat traceability analysis; wherein the situation awareness comprises the step of extracting a flow upper limit in a normal network state from the to-be-analyzed data by using machine learning, trusted flow data are divided from the to-be-analyzed data according to the flow upper limit, a flow assessment model is established according to the trusted flow data, network flow is assessed according to the flow assessment model, and the early warning report is generated if abnormal flow is monitored. And the real-time analysis early warning is used for carrying out early warning on abnormal data.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security protection method and a network security protection system. Background technique [0002] In network security protection methods, anomaly detection is one of the protection methods, but due to the limitations of technical conditions, common anomaly detection methods face the following problems: [0003] The problem of model granularity, ordinary anomaly detection methods have limited computing power, and it is difficult to establish a fine-grained model that is sensitive to abnormal behavior, resulting in a high false negative rate. Taking abnormal traffic detection as an example, the modeling object is often based on the traffic between security domains, which makes the attack traffic between individuals submerged in a large amount of background traffic, making it difficult to detect effectively. [0004] The problem of the number of features, ordinary anomaly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 来骥张实君彭柏许大卫万莹刘昀陈重韬王海峰李贤孟德聂正璞李信吴佳王艺霏辛霆麟肖娜徐相森
Owner STATE GRID JIBEI ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products