Network traffic monitoring and auditing method and system

A network traffic and traffic technology, applied in the field of network security, can solve the problems of difficult operation and maintenance deployment and high deployment complexity in the whole process of competition monitoring, so as to solve the deployment complexity, reduce the burden of operation and maintenance and referees, and reduce the difficulty of deployment. Effect

Inactive Publication Date: 2021-01-29
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and system for network traffic monitoring and auditing, which can solve the problems of high complexity and difficulty in operation and maintenance deployment in the existing computer competition system for the whole process of competition monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic monitoring and auditing method and system
  • Network traffic monitoring and auditing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention is described in detail below in conjunction with examples, but the present invention is not limited to these examples.

[0019] Embodiments of the present invention provide a method for monitoring and auditing network traffic, such as figure 1 As shown, the method includes:

[0020] Step 11, deploying dynamic probes on hosts and switches;

[0021] Step 12, utilize dynamic probe to obtain the flow data of host computer and switch port;

[0022] Step 13, judging whether the traffic data is normal;

[0023] Step 14, when the traffic data is abnormal, send out an alarm message.

[0024] The dynamic probe deployment scheme mainly includes the deployment of the probe host audit function in the physical host and virtualization environment. In this way, the dynamic scene port traffic can be collected, so as to analyze the traffic data.

[0025] By collecting the traffic data of the host and the switch port, the data of the game process is analyzed to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic monitoring and auditing method and system, belongs to the technical field of network security, and can solve the problems of relatively high deployment complexity and relatively high operation and maintenance deployment difficulty in the whole competition monitoring process in an existing computer competition system. The method comprises the following steps: deploying dynamic probes on a host and a switch; acquiring traffic data of a host and a switch port by using a dynamic probe; determining whether the flow data is normal or not; and when the traffic data is abnormal, sending alarm information. The method is used for monitoring and auditing under the computer practical training competition.

Description

technical field [0001] The invention relates to a network flow monitoring and auditing method and system, belonging to the technical field of network security. Background technique [0002] With the rapid development of industrial informatization and Internet of Things technology, industrial control systems are becoming more and more open, and more and more industrial control systems are exposed to the Internet, and exchange data with enterprise intranets and even the Internet. Security threats such as viruses, Trojan horses, intrusion attacks, and denial of service faced by traditional information networks are also spreading to industrial control systems. [0003] Faced with such a situation, in addition to overall security protection construction, my country's industrial control network security industry also needs to improve security awareness and the knowledge and skills of relevant personnel through security training. This has led to the need to hold various competitio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/931
CPCH04L49/208H04L63/1416H04L63/1425
Inventor 傅涛王力郑建平
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products