Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flow-based abnormal communication behavior detection method and system

An abnormal detection and detection system technology, applied in transmission systems, electrical components, etc., can solve problems such as poor generality, hazards, and insufficient real-time performance, and achieve the effects of strong real-time performance, comprehensive discovery range, and high data processing efficiency.

Active Publication Date: 2019-08-20
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF6 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Aiming at the problem of insufficient real-time performance and poor generality of detection in the current internal network anomaly detection, the present invention proposes a flow-based abnormal communication behavior detection method and system, relying on flow (flow) data, for important network Nodes and ordinary network nodes use different methods to construct traffic models, respectively conduct network anomaly detection, and then correlate network events of important targets and common targets, and dig out certain harmful network intrusion behaviors and abnormal communication behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow-based abnormal communication behavior detection method and system
  • Flow-based abnormal communication behavior detection method and system
  • Flow-based abnormal communication behavior detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions of the present invention will be described below in conjunction with the drawings and embodiments.

[0042] The purpose of the present invention is to realize the real-time and universal detection of abnormal communication behaviors in the enterprise internal network, so as to quickly discover various abnormalities and maintain the security of the internal network. First of all, the flow-based abnormal communication behavior detection method of the present invention is described, and an implemented business process is as follows figure 1 As shown, the specific implementation steps are described below.

[0043] Step 1: Configure key target IP. The source of key targets consists of two parts: external submission and monitoring and analysis acquisition.

[0044] 1) Based on the key objectives submitted externally. As a fixed part of the key target set, the externally submitted key targets are the main service targets of this system; for the extern...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a flow-based abnormal communication behavior detection method and system, and belongs to the field of passive discovery of network security abnormal events. The detection systemcomprises: a configuration management module used for configuring a white list IP, a key target IP and a general target IP, a data acquisition module and a storage module used for acquiring and storing network flow data information, a key target abnormity detection module and a general target abnormity detection module used for detecting key targets and general targets respectively, and an abnormity evaluation module. According to the detection method provided by the invention, different methods are adopted to construct flow models for important network nodes and common network nodes, networkanomaly detection is carried out respectively, network events of important targets and common targets are associated, and network intrusion behaviors and abnormal communication behaviors with certainhazards are mined. The method has good discovery capability for various types of traffic abnormal behaviors, and is low in computation complexity for flow data, and is high in abnormity discovery real-time performance.

Description

technical field [0001] The invention relates to the field of passive discovery of abnormal network security events, and is a method and system for abnormal detection of full-volume communication behaviors based on full-volume flow data and targeting an internal network to communicate with an external IP address system. Background technique [0002] With the rapid development of computer and network technology, the scale of Internet users is increasing day by day. According to a report released by China Internet Network Information Center (CNNIC), as of December 2015, the number of Internet users in my country has reached 688 million, and the Internet penetration rate is 50.3%. At the same time, 89.0% of enterprises across the country use the Internet for office work. The Internet has become an indispensable and important infrastructure in people's production and life. [0003] At the same time, network security issues have become increasingly prominent, and frequent network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 李志辉严寒冰丁丽温森浩姚力朱芸茜王小群陈阳李世淙徐剑王适文肖崇蕙贾子骁张帅吕志泉韩志辉马莉雅雷君周彧周昊高川楼书逸文静吕卓航杜飞
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products