Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

542 results about "NetFlow" patented technology

NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. A typical flow monitoring setup (using NetFlow) consists of three main components...

Sample netflow for network traffic data collection

A new network traffic data collection technique is presented. A group of information is received, and a determination is made whether to process the group of information for network data collection according to a sample mode and a sample rate. If the determination is to process the group of information, the group of information is processed for network data collection. The group of information is forwarded according to its destination address. The group of information can be an IP packet and the sample mode can be, for example, one of linear, exponential, natural log, burst and traffic attribute. To process the group of information, a determination is made whether the group of information is part of one or more recorded traffic flows. If not, a new entry in a table is created. If so, a field in an existing entry in the table is incremented. In addition, a traffic information packet is created and transmitted to a network traffic data collection application. The traffic information packet can consist of a header and one or more flow records.
Owner:CISCO TECH INC

A dos/ddos attack detection method

The invention discloses a method for detecting a DOS / DDOS (denial of service / distributed denial of service) attack. The method comprises the following steps of: firstly extracting needed flow characteristic parameters from network stream data, determining abnormal time points and constructing a historical time window by analyzing the flow characteristic parameters, and then finding out first N destination IPs (internet protocols) with maximum flows for the abnormal time points, determining an abnormal destination IP by analyzing sub streams including all the selected destination IPs in the horizontal time window, and finally, confirming the attack and recognizing an abnormal stream. The method is different from a conventional packet-by-packet analyzing method, adapts to the characteristic of the huge flow of a backbone network, can meet the requirement on real-time performance in the abnormality detection of the Backbone Network, can detect the DoS / DDoS attack more precisely in the backbone network, and can recognize an attack stream in the backbone network, so that a network manager can set a router in time, filters the flow sent by an attacker, and prevents the flow from harming a destination host.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Weak supervision semantic segmentation method based on attention directing inference network

The invention discloses a weak supervision semantic segmentation method based on an attention directing inference network. The main content comprises the self-directing on the network attention and the supervision on the additional integration, wherein the supervision process is as follows: the attention directing inference network has two network streams of the classification stream and the attention mining; the classification stream is conductive to identifying the region of the class, the attention mining ensures that all regions possibly conductive to the classification decision making canbe included into the attention of the network, so that an attention graph becomes more complete and accurate, the attention graph can be jointly generated and trained through two loss functions; theextension of the attention directing inference network is imported to seamlessly integrate the additional supervision in the weak-supervision learning framework, thereby controlling the attention graph learning process. Based on the end-to-end framework, the supervision of the specific task can be directly applied to the attention graph at the training stage, and the difference between the weak supervision and the additional supervision can be reduced, and the generalization performance is improved.
Owner:SHENZHEN WEITESHI TECH

Attack occurrence confidence-based network security situation assessment method and system

InactiveCN108306894AAccurately reflect the security situationTimely responseData switching networksStream dataNetwork attack
The invention belongs to technical fields characterized by protocols and discloses an attack occurrence confidence-based network security situation assessment method and system. According to the attack occurrence confidence-based network security situation assessment method and system, a machine learning technology is adopted to analyze network stream data and calculate a probability that networkstreams belong to attack streams; a D-S evidence theory is used to fuse the information of multi-step attacks to obtain the confidence of attack occurrence; and a network security situation is calculated by means of situational factor integration on the basis of security vulnerability information, network service information and host protection strategies; and therefore, the accuracy of assessmentis effectively improved. Since the confidence information of detection equipment is added to the assessment system, the influence of false negatives and false positives can be effectively reduced. Anensemble learning method is adopted, so that the accuracy of confidence calculation can be improved. A network attack is regarded as a dynamic process, and merging processing is performed on the information of the multi-step attacks. Information fusion technology is adopted, so that network environment characteristics such as vulnerabilities, service information and protection strategies are comprehensively considered.
Owner:XIDIAN UNIV

Customizable metadata and contextual syndication of digital program material

A system and method for providing video and / or audio on-on demand service to owners of video and / or audio program rights for offering digital versions of those programs to web site visitors. The method or system is an Application Service Provider (ASP) model, whereby the services are provided to the video and / or audio owners over the World Wide Web and where no specifics software need reside with the video and / or audio owners. Video and / or audio programs from the owners, once converted to an appropriate digital form, are streamed over the Internet or other IP networks for viewing in real-time direct from a remote device having video and / or audio servers that store the digital programs by viewers who have purchased the right to view them. Customizable metadata is utilized to thematically and contextually identify the digital file. This metadata is searchable by a person seeking digital files for download. E-commerce transaction processing is provided on behalf of the video and / or audio owner, and revenue is appropriately conveyed to the owner and / or the web site.
Owner:KLIKVU

Flow identification method based on network flow gravitation cluster

The invention relates to a flow identification method based on network flow gravitation cluster. The method comprises a training stage and an identification stage. The training stage comprises the steps of selecting network flow characteristic attributes, and forming flow training sets after normalization processing is conducted on each network flow; selecting isolation flows by a Z fraction, and isolating the flows; conducting iteration classified-learning on each network flow in the training sets by using semi-supervised learning network flow gravitation cluster principles and methods in all non-isolated flow sets; and at last, finishing classification of the isolation flows and forming a flow classification model. The identification stage comprises the steps of forming a network flow sequence to be identified; conducting flow gravitation classification on each network flow to be identified in network flows, mapping each network flow to specific network traffic business types through a flow cluster and finishing identification to the network flows. According to the flow identification method based on the network flow gravitation cluster, unknown and encrypted flows can be identified, and the locally optimal solution problem of cluster identification is solved, and identification accuracy is improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method and system for shortening time delay in peer-to-peer network streaming media live broadcast system

The invention discloses a method and a system for shortening time delay in a peer-to-peer network streaming media live broadcast system. The system is provided with a media source node and a cache routing server, wherein the media source node is used for the media resource management of the whole system; the cache routing server is used for media resource management, routing calculation and peer client end management in a local domain; the cache routing server is used for selecting a proper peer client end from other managed peer client ends and establishing streaming media data interaction with a request peer client end; when needed media streaming data does not exist in the peer client end managed by the cache routing server, the cache routing server is used for requesting needed streaming media data information from other cache routing servers and transmitting the needed streaming media data information to the request peer client end; and when the cache routing server is failed forobtaining the needed streaming media data from other cache routing servers, the cache routing server is used for obtaining the needed data from the media source node and transmitting the needed data to the request peer client end.
Owner:CHINA TELECOM CORP LTD

Botnet distributed real-time detection method and system

The invention discloses a botnet distributed real-time detection method and system. The botnet distributed real-time detection method comprises the steps of generating a network flow metadata Netflow information and sending the network flow metadata Netflow information to a data detection component by a data generation component; extracting multiple training detection characteristics from marked training data and establishing a detection model serving as a detection standard of a real-time detection unit by a detection model training unit of the data detection component; and by the real-time detection unit of the data detection component, receiving the Netflow information sent in real time, extracting multiple detection characteristics and comparing with the detection model, and obtaining alarm information including a detection object identifier when the comparison result is matched, and comparing the alarm information with a blacklist and a whitelist of a host to obtain a confirmed controlled bot host and a doubtful controlled bot host. The scheme of the botnet distributed real-time detection method and system not only can be applied to an enterprise network with gigabit flow, but also can be applied to a ISPs network; and the overall detection performance of the botnet detection is improved.
Owner:CHINA INFORMATION TECH SECURITY EVALUATION CENT +2

Unconventional network access behavior monitoring system and monitoring method

The invention discloses an unconventional network access behavior monitoring system. The unconventional network access behavior monitoring system is set in an Internet data center (IDC) machine room of a telecom operator, connected with an access layer switch and a convergence layer router which are accessed in a high broadband user private network in a communication mode and collects traffic flow data based on NetFlow. The unconventional network access behavior monitoring system comprises a basic information database, an Internet Protocol (IP) traffic flow data acquisition and analysis module, a high broadband users private network border gateway protocol (BGP) routing information filtering module, a high broadband users private network active subscriber identity module, a high broadband users private network active user behavior legitimacy identifying module and a information display and blacklist management module. The invention further provides an unconventional network access behavior monitoring method. According to the unconventional network access behavior monitoring system and the monitoring method, aiming at high broadband (> 45 Mb/s) IDC clients, irregularities of unconventional accessing to telecom operator Internet through renting operators IDC data special line and the like is effectively monitored.
Owner:SOUTHERN TELECOM SERVICE CENT CO LTD SHANGHAI

Indirect distributed denial of service attack defense method and system based on Web agency

InactiveCN102438025AAttack Response ImplementationEnable early detectionData switching networksSmall probabilityHidden semi-Markov model
The invention relates to an indirect distributed denial of service attack defense method and an indirect distributed denial of service attack defense system based on a Web agency. A behavior characteristic of a proxy-to-server network flow is described by extracting the space-time local property of the proxy-to-server network flow; the interference of a small-probability large value on an available signal is restrained by a nonlinear mapping function; a normal behavior model of the proxy-to-server network is constructed through a hidden semi-markov model (HsMM); normal degree estimation, namely long-time behavior estimation and short-time behavior estimation, under different time scales is performed by using behavior indexes acquired by the model; as to an abnormal behavior sequence (HTTP request sequence), an attack response is implemented by adopting a soft control method; and the basis of the soft control represents an HsMM model parameter and a structure index which are used for performing a normal behavior. The parameter for describing the proxy-to-server network is the space-time local property which is irrelevant to the change of the Web content on a target server; and the detection property of the method is the nature property based on the agent network flow and irrelevant to the size of the attack flow. By the method, the attack response can be realized before the resources of the target server are used by the attack flow, so that early detection can be realized effectively.
Owner:SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products