CN112491806A - Cloud platform flow security analysis system and method - Google Patents
Cloud platform flow security analysis system and method Download PDFInfo
- Publication number
- CN112491806A CN112491806A CN202011214938.5A CN202011214938A CN112491806A CN 112491806 A CN112491806 A CN 112491806A CN 202011214938 A CN202011214938 A CN 202011214938A CN 112491806 A CN112491806 A CN 112491806A
- Authority
- CN
- China
- Prior art keywords
- data packet
- network
- traffic
- packet
- flow
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004458 analytical method Methods 0.000 title claims abstract description 34
- 238000000034 method Methods 0.000 title claims abstract description 10
- 230000002159 abnormal effect Effects 0.000 claims abstract description 36
- 238000013528 artificial neural network Methods 0.000 claims abstract description 31
- 238000003062 neural network model Methods 0.000 claims abstract description 13
- 238000005206 flow analysis Methods 0.000 claims abstract description 4
- 230000010354 integration Effects 0.000 claims description 7
- 210000002569 neuron Anatomy 0.000 claims description 6
- 238000012549 training Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 abstract description 3
- 238000013507 mapping Methods 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract 1
- 230000005856 abnormality Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a cloud platform flow security analysis system and a method, wherein the cloud platform flow security analysis system comprises: the flow acquisition unit is used for acquiring a network flow data packet in real time and storing the network flow data packet into a first preset database; the flow analysis unit is used for extracting the flow characteristics of the network flow packets stored in the first preset database and storing the flow characteristics into the second preset database; and the neural network unit analyzes and judges the traffic characteristics stored in the second preset database based on the plurality of BP neural networks to determine whether the network traffic data packet is an abnormal data packet. The invention obtains better effect than single optimal neural network by establishing a mode of integrating and outputting a plurality of BP neural network models, the BP neural network has strong nonlinear mapping capability and can be used for fitting complex functions, and the network flow safety analysis system established by the invention not only has high accuracy, but also has lower complexity and can be used on different terminals.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a cloud platform traffic security analysis system and method.
Background
With the continuous increase of the scale of the internet, the cloud platform quantity is accurately and safely analyzed, the effective management of the operation state of the cloud platform network is favorably realized, the cloud platform network flow safety analysis is also an important premise for realizing the cloud platform network control and the cloud platform network planning and ensuring the cloud platform network safety with the service quality, and the cloud platform network flow safety analysis has important significance in the aspects of new generation network protocol design, network management and diagnosis, high-performance router design and the like.
Disclosure of Invention
The invention aims to provide a cloud platform flow security analysis system and a cloud platform flow security analysis method, so as to improve the accuracy and reduce the complexity.
In order to solve the above technical problem, the present invention provides a cloud platform traffic safety analysis system, including:
the flow acquisition unit is used for acquiring a network flow data packet in real time and storing the network flow data packet into a first preset database;
the flow analysis unit is used for extracting the flow characteristics of the network flow packets stored in the first preset database and storing the flow characteristics into the second preset database;
and the neural network unit analyzes and judges the traffic characteristics stored in the second preset database based on the plurality of BP neural networks to determine whether the network traffic data packet is an abnormal data packet.
Further, the cloud platform traffic safety analysis system further comprises a marking unit, which is used for marking the abnormal data packet when the network traffic data packet is judged to be the abnormal data packet, and storing the corresponding abnormal data packet into a third preset database.
Further, the flow characteristics include: the packet source IP address, the port number of the packet source address, the port number of the packet destination address, and the packet length.
Further, the cloud platform traffic safety analysis system further comprises a judgment module, a plurality of judgment rules for judging the risk level of the traffic packet are arranged in the judgment module, and the judgment rules include:
if the occurrence frequency of the IP address of the data packet source is within the range of the first frequency threshold, the network flow data packet is at high risk;
if the occurrence frequency of the IP address of the data packet source is within the range of the second frequency threshold, the network flow data packet is in danger;
if the occurrence frequency of the source IP address of the data packet is within the range of the third frequency threshold, the network flow data packet is low in risk;
and if the length of the data packet is not greater than the first length threshold value, the network flow data packet is at low risk, otherwise, the network flow data packet is at high risk.
Further, the determining rule further includes: and presetting an expression of an abnormal port number, wherein if the relationship between the port number of the source address of the data packet and the port number of the destination address of the data packet conforms to the expression of the abnormal port number, the network flow data packet is at a high risk, otherwise, the network flow data packet is at a low risk.
Further, the cloud platform traffic safety analysis system further comprises a fourth preset database, and an expression of a preset abnormal port number is stored in the fourth preset database.
Further, the cloud platform traffic safety analysis system further comprises an assignment module, wherein the assignment module is used for assigning values according to the risk level of the network traffic packet, the source IP address of the data packet, the port number of the source address of the data packet, the port number of the destination address of the data packet and the importance degree of the length of the data packet.
Further, the neural network unit comprises an input part, a neural network part and an integrated output part, wherein the input part, the neural network part and the integrated output part are sequentially connected by signals, and input factors of the input part are the risk level of the network traffic packet after assignment, the source IP address of the data packet, the port number of the source address of the data packet, the port number of the destination address of the data packet and the importance degree of the length of the data packet;
the neural network part is a BP neural network model with different hidden layer neuron numbers, and the range of the hidden layer neuron numbers is [6,10 ].
Further, the integration output part integrates output results of the plurality of BP neural network models by adopting a weighted average method, and the output result of the integration output part is a final network traffic packet abnormal condition risk index value.
The invention also provides a cloud platform flow security analysis method, which comprises the following steps:
s1, collecting network flow data packets in real time and storing the network flow data packets in a first preset database;
s2, extracting the traffic characteristics of the network traffic packet stored in the first preset database, and storing the traffic characteristics in the second preset database;
s3, judging the risk level of the traffic packet by adopting a plurality of judgment rules based on the traffic characteristics;
s4, assigning the risk level of the network traffic packet and the importance degree of the traffic characteristics;
s5, establishing a neural network part comprising a plurality of BP neural network models for learning and training, and integrating training results of the plurality of BP neural network models to obtain a network traffic packet abnormal condition risk index value based on neural network integration;
and S6, marking the network traffic packet with higher network traffic packet abnormal situation risk index value as an abnormal traffic packet.
The embodiment of the invention has the beneficial effects that: the BP neural network has strong nonlinear mapping capability and can be used for fitting complex functions.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic block diagram of a cloud platform traffic security analysis system according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a neural network unit according to a first embodiment of the present invention.
Fig. 3 is a schematic flow chart of a cloud platform traffic security analysis method according to a second embodiment of the present invention.
Detailed Description
The following description of the embodiments refers to the accompanying drawings, which are included to illustrate specific embodiments in which the invention may be practiced.
Referring to fig. 1 to fig. 2, an embodiment of the present invention provides a cloud platform traffic safety analysis system, including:
the flow acquisition unit is used for acquiring a network flow data packet in real time and storing the network flow data packet into a first preset database;
the flow analysis unit is used for extracting the flow characteristics of the network flow packets stored in the first preset database and storing the flow characteristics into the second preset database;
and the neural network unit analyzes and judges the traffic characteristics stored in the second preset database based on the plurality of BP neural networks to determine whether the network traffic data packet is an abnormal data packet.
In the embodiment, the network traffic data is collected in real time and stored in the first preset database, so that the real-time collection and storage of the network traffic data are realized, data support is provided for a network traffic safety analysis system, whether the collected network traffic data is abnormal or not is determined according to the collected network traffic data in the preset time period, the efficiency of detecting the network traffic abnormality is improved, the abnormality analysis of unknown network traffic is realized, the accuracy of detecting the network traffic abnormality is improved, the method is suitable for diversified traffic types, and the real-time requirement of abnormality detection is met.
In any of the above embodiments, preferably, the flow characteristics include: the packet source IP address, the port number of the packet source address, the port number of the packet destination address, and the packet length.
In any of the foregoing embodiments, preferably, the system further includes a determining module, where a plurality of determining rules for determining the risk level of the traffic packet are set in the determining module, where the determining rules include:
if the occurrence frequency of the IP address of the data packet source is within the range of the first frequency threshold, the network flow data packet is at high risk;
the first frequency threshold value can be preferably set to be more than 70%, when the occurrence frequency of the IP address of the data packet source is more than 70%, the network traffic data packet is high risk;
and if the occurrence frequency of the IP address of the data packet source is within the second frequency threshold range, the network flow data packet is in danger.
The second frequency threshold value can be set to be more than 50% and less than 70%, when the occurrence frequency of the source IP address of the data packet is in the range of more than 50% and less than 70%, the network traffic data packet is in danger;
if the occurrence frequency of the source IP address of the data packet is within the range of the third frequency threshold, the network flow data packet is low in risk;
the third frequency threshold value can be preferably set to be less than 50%, when the occurrence frequency of the IP address of the data packet source is less than 50%, the network flow data packet is in danger;
if the length of the data packet is not larger than the first length threshold value, the network flow data packet is in low risk, otherwise, the network flow data packet is in high risk;
the first length threshold can be set according to the current network traffic protocol, and the risk is high when the data packet is too long or too short.
In the above embodiment, preferably, the determination rule further includes: and presetting an expression of an abnormal port number, wherein if the relationship between the port number of the source address of the data packet and the port number of the destination address of the data packet conforms to the expression of the abnormal port number, the network flow data packet is in a high risk level, and otherwise, the network flow data packet is in a low risk level.
Preferably, the system further includes a fourth preset database, where the fourth preset database stores a preset expression of an abnormal port number, and the expression indicates that, for example, when the network protocol of the packet is TCP, the port number of the source address of the packet is 30, and the port number of the destination address of the packet is 49, that the packet is an abnormal TCP port access, and the traffic packet is at a high risk level.
In any of the above embodiments, preferably, the system further includes an assignment module, where the assignment module is configured to assign a value according to the risk level of the network traffic packet, the source IP address of the data packet, the port number of the source address of the data packet, the port number of the destination address of the data packet, and the importance degree of the length of the data packet.
Characteristics such as a data packet source IP address, a port number of a data packet source address, a port number of a data packet destination address, a data packet length and the like can be graded and judged by an expert grading method, the importance degree of the characteristics is determined, and the assignment condition of the risk grade is shown in table 1:
TABLE 1
Risk rating | High risk | Low risk |
Assignment of value | 3 | 1 |
The relationship between the importance level and the importance coefficient is specifically shown in table 2:
TABLE 2
Coefficient of importance | Of importance | Of moderate importance | Of general importance |
Assignment of value | 2 | 1.5 | 1 |
In any of the above embodiments, preferably, the neural network unit includes an input portion, a neural network portion, and an integrated output portion, where the input portion, the neural network portion, and the integrated output portion are sequentially connected by signals, and an input factor of the input portion is a risk level of the network traffic packet after being assigned, and an importance degree of a source IP address of the data packet, a port number of a source address of the data packet, a port number of a destination address of the data packet, and a length of the data packet;
the neural network part is a BP neural network model with different hidden layer neuron numbers, and the range of the hidden layer neuron numbers is [6,10 ].
And the integrated output part integrates the output results of the BP neural network models by adopting a weighted average method, and the output result of the integrated output part is the final network traffic packet abnormal condition risk index value.
In any of the foregoing embodiments, preferably, the system further includes a marking unit, configured to mark an abnormal data packet when the network traffic data packet is determined to be the abnormal data packet, and store the corresponding abnormal data packet in a third preset database.
Referring to fig. 3, a second embodiment of the present invention provides a cloud platform traffic safety analysis method, including the following steps:
s1, collecting network flow data packets in real time and storing the network flow data packets in a first preset database;
s2, extracting the traffic characteristics of the network traffic packet stored in the first preset database, and storing the traffic characteristics in the second preset database;
s3, judging the risk level of the traffic packet by adopting a plurality of judgment rules based on the traffic characteristics;
s4, assigning the risk level of the network traffic packet and the importance degree of the traffic characteristics;
s5, establishing a neural network part comprising a plurality of BP neural network models for learning and training, and integrating training results of the plurality of BP neural network models to obtain a network traffic packet abnormal condition risk index value based on neural network integration;
and S6, marking the network traffic packet with higher network traffic packet abnormal situation risk index value as an abnormal traffic packet.
The cloud platform traffic safety analysis method disclosed by the second embodiment of the invention is a specific processing step of a cloud platform traffic safety analysis system, and the beneficial effects of the method are completely consistent with those of the first embodiment, and detailed description is not provided herein.
As can be seen from the above description, the embodiments of the present invention have the following beneficial effects: the BP neural network has strong nonlinear mapping capability and can be used for fitting complex functions.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (10)
1. A cloud platform traffic security analysis system, comprising:
the flow acquisition unit is used for acquiring a network flow data packet in real time and storing the network flow data packet into a first preset database;
the flow analysis unit is used for extracting the flow characteristics of the network flow packets stored in the first preset database and storing the flow characteristics into the second preset database;
and the neural network unit analyzes and judges the traffic characteristics stored in the second preset database based on the plurality of BP neural networks to determine whether the network traffic data packet is an abnormal data packet.
2. The cloud platform traffic safety analysis system according to claim 1, further comprising a marking unit, configured to mark an abnormal data packet and store the corresponding abnormal data packet in a third preset database when the network traffic data packet is determined to be the abnormal data packet.
3. The cloud platform traffic security analysis system of claim 1, wherein the traffic characteristics comprise: the packet source IP address, the port number of the packet source address, the port number of the packet destination address, and the packet length.
4. The cloud platform traffic safety analysis system according to claim 3, further comprising a judgment module, wherein a plurality of judgment rules for judging the risk level of the traffic packet are provided in the judgment module, and the judgment rules include:
if the occurrence frequency of the IP address of the data packet source is within the range of the first frequency threshold, the network flow data packet is at high risk;
if the occurrence frequency of the IP address of the data packet source is within the range of the second frequency threshold, the network flow data packet is in danger;
if the occurrence frequency of the source IP address of the data packet is within the range of the third frequency threshold, the network flow data packet is low in risk;
and if the length of the data packet is not greater than the first length threshold value, the network flow data packet is at low risk, otherwise, the network flow data packet is at high risk.
5. The cloud platform traffic security analysis system of claim 4, wherein the decision rule further comprises: and presetting an expression of an abnormal port number, wherein if the relationship between the port number of the source address of the data packet and the port number of the destination address of the data packet conforms to the expression of the abnormal port number, the network flow data packet is at a high risk, otherwise, the network flow data packet is at a low risk.
6. The cloud platform traffic safety analysis system according to claim 5, further comprising a fourth preset database, wherein an expression of a preset abnormal port number is stored in the fourth preset database.
7. The cloud platform traffic security analysis system of claim 6, further comprising an assignment module, wherein the assignment module is configured to assign a value according to a risk level of the network traffic packet and importance levels of a source IP address of the data packet, a port number of a source address of the data packet, a port number of a destination address of the data packet, and a length of the data packet.
8. The cloud platform traffic safety analysis system according to claim 7, wherein the neural network unit includes an input portion, a neural network portion, and an integrated output portion, the input portion, the neural network portion, and the integrated output portion are sequentially connected by signals, and input factors of the input portion are a risk level of the network traffic packet after being assigned, and importance degrees of a source IP address of the data packet, a port number of a source address of the data packet, a port number of a destination address of the data packet, and a length of the data packet;
the neural network part is a BP neural network model with different hidden layer neuron numbers, and the range of the hidden layer neuron numbers is [6,10 ].
9. The cloud platform traffic safety analysis system according to claim 8, wherein the integration output part integrates output results of the plurality of BP neural network models by using a weighted average method, and the output result of the integration output part is a final network traffic packet abnormal situation risk index value.
10. A cloud platform flow security analysis method is characterized by comprising the following steps:
s1, collecting network flow data packets in real time and storing the network flow data packets in a first preset database;
s2, extracting the traffic characteristics of the network traffic packet stored in the first preset database, and storing the traffic characteristics in the second preset database;
s3, judging the risk level of the traffic packet by adopting a plurality of judgment rules based on the traffic characteristics;
s4, assigning the risk level of the network traffic packet and the importance degree of the traffic characteristics;
s5, establishing a neural network part comprising a plurality of BP neural network models for learning and training, and integrating training results of the plurality of BP neural network models to obtain a network traffic packet abnormal condition risk index value based on neural network integration;
and S6, marking the network traffic packet with higher network traffic packet abnormal situation risk index value as an abnormal traffic packet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011214938.5A CN112491806A (en) | 2020-11-04 | 2020-11-04 | Cloud platform flow security analysis system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011214938.5A CN112491806A (en) | 2020-11-04 | 2020-11-04 | Cloud platform flow security analysis system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112491806A true CN112491806A (en) | 2021-03-12 |
Family
ID=74928168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011214938.5A Pending CN112491806A (en) | 2020-11-04 | 2020-11-04 | Cloud platform flow security analysis system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112491806A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022078A (en) * | 2022-06-28 | 2022-09-06 | 杭州康吉森自动化科技有限公司 | Controller built-in network safety protection method and device and electronic equipment |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007070838A2 (en) * | 2005-12-13 | 2007-06-21 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
CN102821002A (en) * | 2011-06-09 | 2012-12-12 | 中国移动通信集团河南有限公司信阳分公司 | Method and system for network flow anomaly detection |
CN105553998A (en) * | 2015-12-23 | 2016-05-04 | 中国电子科技集团公司第三十研究所 | Network attack abnormality detection method |
CN105577685A (en) * | 2016-01-25 | 2016-05-11 | 浙江海洋学院 | Intrusion detection independent analysis method and system in cloud calculation environment |
CN107864110A (en) * | 2016-09-22 | 2018-03-30 | 中国电信股份有限公司 | Botnet main control end detection method and device |
CN110086776A (en) * | 2019-03-22 | 2019-08-02 | 国网河南省电力公司经济技术研究院 | Intelligent substation Network Intrusion Detection System and detection method based on deep learning |
US20190303567A1 (en) * | 2018-03-28 | 2019-10-03 | Nvidia Corporation | Detecting data anomalies on a data interface using machine learning |
US10505976B2 (en) * | 2016-12-28 | 2019-12-10 | T-Mobile Usa, Inc. | Real-time policy filtering of denial of service (DoS) internet protocol (IP) attacks and malicious traffic |
CN110581834A (en) * | 2018-06-11 | 2019-12-17 | 中国移动通信集团浙江有限公司 | communication capability opening abnormity detection method and device |
CN111131325A (en) * | 2020-01-03 | 2020-05-08 | 浙江大学 | Data protocol anomaly identification system and method |
CN111181932A (en) * | 2019-12-18 | 2020-05-19 | 广东省新一代通信与网络创新研究院 | DDOS attack detection and defense method, device, terminal equipment and storage medium |
-
2020
- 2020-11-04 CN CN202011214938.5A patent/CN112491806A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007070838A2 (en) * | 2005-12-13 | 2007-06-21 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
CN102821002A (en) * | 2011-06-09 | 2012-12-12 | 中国移动通信集团河南有限公司信阳分公司 | Method and system for network flow anomaly detection |
CN105553998A (en) * | 2015-12-23 | 2016-05-04 | 中国电子科技集团公司第三十研究所 | Network attack abnormality detection method |
CN105577685A (en) * | 2016-01-25 | 2016-05-11 | 浙江海洋学院 | Intrusion detection independent analysis method and system in cloud calculation environment |
CN107864110A (en) * | 2016-09-22 | 2018-03-30 | 中国电信股份有限公司 | Botnet main control end detection method and device |
US10505976B2 (en) * | 2016-12-28 | 2019-12-10 | T-Mobile Usa, Inc. | Real-time policy filtering of denial of service (DoS) internet protocol (IP) attacks and malicious traffic |
US20190303567A1 (en) * | 2018-03-28 | 2019-10-03 | Nvidia Corporation | Detecting data anomalies on a data interface using machine learning |
CN110581834A (en) * | 2018-06-11 | 2019-12-17 | 中国移动通信集团浙江有限公司 | communication capability opening abnormity detection method and device |
CN110086776A (en) * | 2019-03-22 | 2019-08-02 | 国网河南省电力公司经济技术研究院 | Intelligent substation Network Intrusion Detection System and detection method based on deep learning |
CN111181932A (en) * | 2019-12-18 | 2020-05-19 | 广东省新一代通信与网络创新研究院 | DDOS attack detection and defense method, device, terminal equipment and storage medium |
CN111131325A (en) * | 2020-01-03 | 2020-05-08 | 浙江大学 | Data protocol anomaly identification system and method |
Non-Patent Citations (1)
Title |
---|
唐林等: "神经网络和IP标记在DDoS攻击防御中的应用", 《计算机仿真》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022078A (en) * | 2022-06-28 | 2022-09-06 | 杭州康吉森自动化科技有限公司 | Controller built-in network safety protection method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116192888A (en) | Network state monitoring and management method and system based on Internet of things | |
CN113378899B (en) | Abnormal account identification method, device, equipment and storage medium | |
CN109087277B (en) | Method for measuring PM2.5 of fine air particles | |
CN111191767A (en) | Vectorization-based malicious traffic attack type judgment method | |
CN115269342B (en) | Monitoring cloud platform based on edge computing and monitoring method thereof | |
CN115619271B (en) | Charging pile state evaluation method and device based on CNN and random forest | |
CN115222303B (en) | Industry risk data analysis method and system based on big data and storage medium | |
CN110648172B (en) | Identity recognition method and system integrating multiple mobile devices | |
CN108924057A (en) | The port flow intelligence control system of system on a kind of cloud | |
CN115116224B (en) | Edge end data acquisition and transmission system and method | |
CN112491806A (en) | Cloud platform flow security analysis system and method | |
CN116962469A (en) | Wisdom garden electric energy monitoring management system | |
CN105871861A (en) | Intrusion detection method for self-learning protocol rule | |
CN114189350B (en) | LightGBM-based train communication network intrusion detection method | |
CN111901134B (en) | Method and device for predicting network quality based on recurrent neural network model (RNN) | |
CN112449371A (en) | Performance evaluation method of wireless router and electronic equipment | |
CN110995713A (en) | Botnet detection system and method based on convolutional neural network | |
CN117880206A (en) | Load balancing method and system for Internet of things management equipment | |
CN112491627A (en) | Network quality real-time analysis method and device | |
CN110816938B (en) | Big data analysis method based on comprehensive detection platform of cigarette packaging machine | |
CN106789411B (en) | Method and device for acquiring active IP data in machine room | |
CN113449966B (en) | Gypsum board equipment inspection method and system | |
CN114095903B (en) | Construction method of automobile electrical network | |
KR100738550B1 (en) | Network intrusion detection system using genetic algorithm and method thereof | |
CN118296061B (en) | Analysis processing method, system, terminal and storage medium for power data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210312 |