Network security protection method and system based on cloud computing

The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HUANG KAI, LAN JIAHUI, HUANG ZHAO
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HUANG KAI
LAN JIAHUI
HUANG ZHAO
description The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118138374A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118138374A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118138374A3</originalsourceid><addsrcrecordid>eNqNyjEOwjAMQNEsDAi4gzlAhyhIdEUVVadO7FVIDERt4ih2hHp7GDgA0x_e36p-RHlTmYHR1RJkhVxI0EmgBBHlRR5s8sArC0a4W0YPX3ILVQ-OYq4S0nOvNg-7MB5-3aljf711Q4OZJuRsHSaUqRu1brVpzfl0Mf88H3nsNCA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network security protection method and system based on cloud computing</title><source>esp@cenet</source><creator>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</creator><creatorcontrib>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</creatorcontrib><description>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240604&amp;DB=EPODOC&amp;CC=CN&amp;NR=118138374A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240604&amp;DB=EPODOC&amp;CC=CN&amp;NR=118138374A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LAN JIAHUI</creatorcontrib><creatorcontrib>HUANG ZHAO</creatorcontrib><title>Network security protection method and system based on cloud computing</title><description>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEOwjAMQNEsDAi4gzlAhyhIdEUVVadO7FVIDERt4ih2hHp7GDgA0x_e36p-RHlTmYHR1RJkhVxI0EmgBBHlRR5s8sArC0a4W0YPX3ILVQ-OYq4S0nOvNg-7MB5-3aljf711Q4OZJuRsHSaUqRu1brVpzfl0Mf88H3nsNCA</recordid><startdate>20240604</startdate><enddate>20240604</enddate><creator>HUANG KAI</creator><creator>LAN JIAHUI</creator><creator>HUANG ZHAO</creator><scope>EVB</scope></search><sort><creationdate>20240604</creationdate><title>Network security protection method and system based on cloud computing</title><author>HUANG KAI ; LAN JIAHUI ; HUANG ZHAO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118138374A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HUANG KAI</creatorcontrib><creatorcontrib>LAN JIAHUI</creatorcontrib><creatorcontrib>HUANG ZHAO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HUANG KAI</au><au>LAN JIAHUI</au><au>HUANG ZHAO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network security protection method and system based on cloud computing</title><date>2024-06-04</date><risdate>2024</risdate><abstract>The invention relates to the technical field of network security protection, in particular to a network security protection method and system based on cloud computing, and the method comprises the steps: obtaining the flow table information of target network flow from a target switch according to a preset collection period; extracting a plurality of basic flow table features from the flow table information to obtain a basic flow table feature set, extracting a plurality of composite flow table features through a feature extraction formula to obtain a composite flow table feature set, and combining the basic flow table feature set and the composite flow table feature set to obtain a flow table feature set. According to the method, the target network flow can be monitored in real time, automatic response including intrusion detection and flow cleaning can be carried out according to the preset rule, network security threats can be effectively handled, the target network flow can be analyzed more comprehensively</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN118138374A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Network security protection method and system based on cloud computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T02%3A19%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HUANG%20KAI&rft.date=2024-06-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118138374A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true