Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data flow identification method and device

An identification method and data flow technology, applied in the field of network security, can solve the problems of unrecognizable abnormal data flow and small range of abnormal data flow, etc., and achieve the effect of making up for the small recognition range

Active Publication Date: 2020-02-18
HANGZHOU DPTECH TECH
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the attack signatures in the attack signature database are usually obtained by parsing the data packets that have been identified as abnormal data flows, although the attack signature database has a high recognition accuracy for these identified abnormal data flows, but the The scope of abnormal data flow is small, and it is impossible to identify new abnormal data flow that has not been identified as abnormal data flow and abnormal data flow disguised as normal data flow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow identification method and device
  • Data flow identification method and device
  • Data flow identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0025] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data flow identification method and device. The method is applied to network equipment, and comprises the following steps: receiving a data packet sent by intrusion preventionequipment; finding a corresponding data packet feature table item from a preset data packet feature table according to the packet feature information of the data packet; if the abnormal level of thedata stream is lower than the specified level, inputting the data packet into a data stream identification model matched with the abnormal level of the data stream, and identifying whether the data stream to which the data packet belongs is an abnormal data stream or not according to an output result of the data stream identification model; and if the abnormal level of the data stream is higher than the specified level, identifying the data stream to which the data packet belongs as an abnormal data stream. On the basis of the intrusion prevention equipment, supplementary identification is carried out on the data stream identified as the non-abnormal data stream by the intrusion prevention equipment, so that the defect that the identification range of the intrusion prevention equipment onthe abnormal data stream is relatively small is overcome.

Description

technical field [0001] The present application relates to network security technology, in particular to a data flow identification method and device. Background technique [0002] At present, the attack signature database in the intrusion prevention device is usually used to identify abnormal data flow. After receiving the data packet, the intrusion prevention device will extract the packet feature of the data packet and match it with the attack signature in the attack signature database. If the match is successful, the data flow to which the data packet belongs will be identified as an abnormal data flow. [0003] Since the attack signatures in the attack signature database are usually obtained by parsing the data packets that have been identified as abnormal data flows, although the attack signature database has a high recognition accuracy for these identified abnormal data flows, but the The scope of the abnormal data flow is small, and it is impossible to identify the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 陈露姹
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products