Network flow analysis and file extraction system and method

A network traffic and extraction method technology, applied in the field of network traffic analysis and file extraction, can solve the problems of control, inability to identify fine-grained, malicious traffic, etc., and achieve the effect of preventing network intrusion attacks

Pending Publication Date: 2020-12-04
福州林科斯拉信息技术有限公司
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method cannot perform fine-grained control, and it is difficult to identify malicious traffic masquerading as normal traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow analysis and file extraction system and method
  • Network flow analysis and file extraction system and method
  • Network flow analysis and file extraction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments.

[0070] Such as figure 1 Shown: The left side is the company intranet, which contains multiple computer devices, and the right side is the public network server, including various web servers, content servers, mail servers, etc. Between the company intranet and the public network server, a network switch is often used as a communication interface, thereby effectively isolating the intranet and the extranet for access control. The deployment scheme of the embodiment of the present invention is: the method of creating mirrored traffic on the network switch, and the mirrored traffic includes the data content of the two-way communication between the company's intranet and the public network. Then transmit the mirrored traffic to the device for traffic analysis, complete the traffic analysis in this device, and write the results to the database and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network flow analysis and file extraction system. The system comprises a flow capture module, a flow preprocessing module, a protocol statistics module, a protocol analysis module and a file extraction module. Under the condition that normal communication flow of an enterprise is not influenced, communication flow between the enterprise and a public network can be captured, flow of different IPs and different protocols is counted, transmitted files are extracted in real time, and file content is written into a disk.

Description

technical field [0001] The invention relates to a method for realizing network traffic analysis and file extraction, in particular to a method for extracting files transmitted in network traffic in a high-bandwidth network environment, and belongs to the technical field of computer network security. Background technique [0002] With the continuous development of computer communication technology, network security is receiving more and more attention. For enterprises, if malicious software invades the intranet and leaks sensitive data of the enterprise, it will cause huge losses. In a complex traffic environment, how to effectively identify malicious traffic has gradually become an increasing concern of many enterprises. Traditional network protection often only analyzes network traffic data packets to detect whether they contain some malicious features, thereby preventing malicious traffic from connecting to the corporate intranet. However, this method cannot perform fine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/1425
Inventor 姜剑
Owner 福州林科斯拉信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products