Flow monitoring method and system for multi-protocol attack data
A technology of traffic monitoring and attack data, applied in the field of network security, can solve the problems of affecting the detection results, performance dependent on the design of traffic characteristics, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] In order to have a clearer understanding of the technical features, purposes and effects of the invention, the specific embodiments of the present invention are now described with reference to the accompanying drawings, in which the same reference numerals represent components with the same or similar structures but the same functions.
[0056]In this article, "schematic" means "serving as an example, example or illustration", and any illustration or implementation described as "schematic" should not be interpreted as a more preferred or more advantageous Technical solutions. In order to keep the drawings concise, the drawings only schematically show the parts related to this exemplary embodiment, and they do not represent the actual structure and true proportion of the product.
[0057] The invention discloses a flow monitoring method for multi-protocol attack data. The multi-protocol attack data is multi-protocol network flow data. The flow monitoring method includes:...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com