Network security protection method and system based on cloud computing
The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HUANG KAI LAN JIAHUI HUANG ZHAO |
description | The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118138374A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118138374A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118138374A3</originalsourceid><addsrcrecordid>eNqNyjEOwjAMQNEsDAi4gzlAhyhIdEUVVadO7FVIDERt4ih2hHp7GDgA0x_e36p-RHlTmYHR1RJkhVxI0EmgBBHlRR5s8sArC0a4W0YPX3ILVQ-OYq4S0nOvNg-7MB5-3aljf711Q4OZJuRsHSaUqRu1brVpzfl0Mf88H3nsNCA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network security protection method and system based on cloud computing</title><source>esp@cenet</source><creator>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</creator><creatorcontrib>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</creatorcontrib><description>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240604&DB=EPODOC&CC=CN&NR=118138374A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240604&DB=EPODOC&CC=CN&NR=118138374A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LAN JIAHUI</creatorcontrib><creatorcontrib>HUANG ZHAO</creatorcontrib><title>Network security protection method and system based on cloud computing</title><description>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEOwjAMQNEsDAi4gzlAhyhIdEUVVadO7FVIDERt4ih2hHp7GDgA0x_e36p-RHlTmYHR1RJkhVxI0EmgBBHlRR5s8sArC0a4W0YPX3ILVQ-OYq4S0nOvNg-7MB5-3aljf711Q4OZJuRsHSaUqRu1brVpzfl0Mf88H3nsNCA</recordid><startdate>20240604</startdate><enddate>20240604</enddate><creator>HUANG KAI</creator><creator>LAN JIAHUI</creator><creator>HUANG ZHAO</creator><scope>EVB</scope></search><sort><creationdate>20240604</creationdate><title>Network security protection method and system based on cloud computing</title><author>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118138374A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LAN JIAHUI</creatorcontrib><creatorcontrib>HUANG ZHAO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HUANG KAI</au><au>LAN JIAHUI</au><au>HUANG ZHAO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network security protection method and system based on cloud computing</title><date>2024-06-04</date><risdate>2024</risdate><abstract>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN118138374A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Network security protection method and system based on cloud computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T02%3A19%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HUANG%20KAI&rft.date=2024-06-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118138374A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |