Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security detection method and device

A technology of network security and detection method, applied in the field of network security, can solve the problem of no reallocation, etc., and achieve the effect of improving the utilization rate of the website

Pending Publication Date: 2022-03-25
安徽健坤通信股份有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method has some problems: (1) not inform users of bad websites through pop-up windows or short messages, and use anti-virus software to remove bad websites, so as to increase network space to serve other websites and purify the network environment; (2) ) does not reallocate network bandwidth resources based on the amount of traffic corresponding to the URL monitored within a predetermined time frame, thereby increasing website utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security detection method and device
  • Network security detection method and device
  • Network security detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] see Figure 1 to Figure 3 , the present invention provides a technical solution:

[0053] figure 1 It is a simple step of the network security detection method in the embodiment of the present invention, and the subject of execution of this process may be any device that can be used for network security detection, such as a server and a terminal. Terminals can be personal computers, mobile phones, and tablet computers, etc.; servers can be personal computers and computer clusters, etc. Here, the execution subject may be a network security detection device.

[0054] The steps of a network security detection method are as follows:

[0055] S101. Monitor traffic within a predetermined network range, and obtain the Uniform Resource Locator URL pointed to by the traffic;

[0056] The predetermined network range refers to part or all of the wide area network or local area network. There may be one or more websites within the predetermined network range. Each website may h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security detection method and device, and the method comprises the steps: monitoring the flow in a preset network range, and obtaining a URL (Uniform Resource Locator) pointed by the flow; before the URL is added into a URL set waiting for security detection, determining that the URL is an effective URL; or the URL is not included in the URL set; or the URL is not subjected to security detection; determining a priority for performing security detection on the URL; according to the arranged priority, performing security detection on the URL; classifying positive and negative URLs corresponding to the traffic; aiming at the front URL, rearranging the flow quantity of the URL; aiming at the bad URL, determining all webpages of the URL, and informing a user through a popup window mode; according to the flow quantity of the rearranged URLs, implementing network bandwidth resource redistribution; and clearing out the network system. The method has the advantages that the website utilization rate is increased, more network space is released, and the network environment is purified.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security detection method and device. Background technique [0002] With the development and wide application of Internet technology, it has brought a lot of convenience to people's life, and computer network has been closely related to people's life, so computer network security has received more and more attention and attention. [0003] At present, computer website pages are full of various bad information, including text, links, and source codes, which bring great harm to computer users, especially immature teenagers, and are not conducive to the physical and mental development of teenagers. In the prior art, security detection methods for websites are all based on crawler technology to capture Uniform Resource Locators (Uniform Resource Locators, URLs), and then perform security detection on webpages corresponding to the captured URLs to discover these pot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L43/0876H04L43/16H04L41/0213H04L41/0894H04L41/0896G06F16/955
CPCH04L63/1408H04L63/0236H04L63/0245H04L43/0876H04L43/16H04L41/0213H04L41/0893H04L41/0896G06F16/955
Inventor 赵忠杰
Owner 安徽健坤通信股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products