CN114554254A - Network security operation and maintenance method based on flow analysis and strategy visualization technology - Google Patents

Network security operation and maintenance method based on flow analysis and strategy visualization technology Download PDF

Info

Publication number
CN114554254A
CN114554254A CN202210153219.XA CN202210153219A CN114554254A CN 114554254 A CN114554254 A CN 114554254A CN 202210153219 A CN202210153219 A CN 202210153219A CN 114554254 A CN114554254 A CN 114554254A
Authority
CN
China
Prior art keywords
user
flow
video
safety
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210153219.XA
Other languages
Chinese (zh)
Inventor
肖辉
董升来
杨木伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Original Assignee
Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Planning Institute Of Radio And Television Of State Administration Of Radio And Television filed Critical Planning Institute Of Radio And Television Of State Administration Of Radio And Television
Priority to CN202210153219.XA priority Critical patent/CN114554254A/en
Publication of CN114554254A publication Critical patent/CN114554254A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25891Management of end-user data being end-user preferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/23418Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests

Abstract

The invention discloses a network security operation and maintenance method based on flow analysis and strategy visualization technology, which comprises the following steps: A. making a basic division based on the flow registration; B. carrying out directional classification according to the flow source crowd; C. determining the user type according to the video flow; D. actively judging the safety of the video characters according to the released video; E. comprehensively judging the safety according to the statistical data; F. giving a user security authentication, and detecting abnormal users at irregular intervals; the method is based on flow analysis, divides the client class of the network issued video or characters, directionally classifies the client class according to the main source of the clicked lookup flow, performs basic qualitative authentication on the user type, irregularly detects abnormal and non-authenticated users, and ensures a green network environment.

Description

Network security operation and maintenance method based on flow analysis and strategy visualization technology
Technical Field
The invention relates to the technical field of network security operation and maintenance management, in particular to a network security operation and maintenance method based on a flow analysis and strategy visualization technology.
Background
With the development of network technology, the communication between cities becomes more, the distance between people is shortened, more business opportunities are developed through the network, the network is a double-edged sword, which not only can bring convenience, but also brings certain dangerousness, in the practical application of the network, a part of network resources are used for doing illegal crimes, such as stealing of other people information through trojans or spreading of illegal information through network propaganda, the influence caused by offline illegal crimes is very limited, the spreading influence range is relatively small, but the network illegal crimes can cause serious social problems, the cost of the network crimes becomes lower, so that network traps such as bamboo shoots in spring after rain can emerge, the traditional network supervision cannot realize the comprehensive supervision of the network, when problems are discovered, certain bad influences are caused, and today of the rapid development of the current network video software, the safe and stable operation of the network is ensured, so that how to effectively solve the problems becomes a difficult problem which is urgently needed to be solved at present.
Disclosure of Invention
The invention aims to provide a network security operation and maintenance method based on flow analysis, which is used for classifying client sides issuing videos or characters on a network, directionally classifying the client sides according to main sources of click lookup flow, performing basic qualitative authentication on user types, irregularly detecting abnormal and unauthenticated users and ensuring the flow analysis and strategy visualization technology of a green network environment.
In order to achieve the purpose, the invention provides the following technical scheme: the network security operation and maintenance method based on the flow analysis and strategy visualization technology comprises the following operation and maintenance control method steps:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
Preferably, step a makes a basic division based on traffic registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
Preferably, the step B is based on the traffic source population for directional classification:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
Preferably, step C characterizes the user type according to the video traffic:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video flow analysis qualitative users.
Preferably, step D actively judges the security of the video text according to the published video: a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users; b. the safety is judged by means of the system priority active judgment and manual rapid quantitative qualitative classification in the middle period; c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
Preferably, step E comprehensively judges the security according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
Preferably, step F gives the user a security certificate, and detects the abnormal user irregularly: a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
Compared with the prior art, the invention has the beneficial effects that:
(1) the invention can perform data visualization on user information based on flow analysis, and combines with the flow information to perform user directional classification, and the user classification, the user work classification and the user flow source can realize the safe operation supervision on users of an internet platform, ensure the network safety, and avoid illegal criminal propaganda of the users through the network or illegal criminal propaganda by borrowing and stealing network accounts.
(2) The invention can reduce the workload of the monitored by carrying out safety certification on the user in the network safety operation and maintenance method, gives irregular spot inspection to the non-certification account number, and finds out the illegal video or characters to be checked immediately.
Drawings
Fig. 1 is a schematic view of the overall structure of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, in the network security operation and maintenance method based on traffic analysis and policy visualization technology, the operation and maintenance control method includes the steps of:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
Step A, basic division is made based on flow registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
And B, directionally classifying according to the flow source crowd:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
Step C, according to the video flow qualitative user type:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video traffic analysis qualitative users.
Step D, actively judging the safety of the video characters according to the released video:
a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users; b. in the middle period, the safety is judged by combining the priority active judgment of the system and manual work to carry out rapid quantitative qualitative classification; c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
Step E, comprehensively judging the safety according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
Step F, giving user safety authentication, and detecting abnormal users in an irregular way:
a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
The above embodiments are only preferred embodiments of the present invention, and are not intended to limit the technical solutions of the present invention, so long as the technical solutions can be realized on the basis of the above embodiments without creative efforts, which should be considered to fall within the protection scope of the patent of the present invention.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. The network security operation and maintenance method based on the flow analysis and strategy visualization technology comprises the following operation and maintenance control method steps:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
2. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: the step A makes basic division based on flow registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
3. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and B, directionally classifying according to the flow source crowd:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
4. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and C, according to the video flow qualitative user type:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video flow analysis qualitative users.
5. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and the step D is to actively judge the safety of the video characters according to the released video:
a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users;
b. in the middle period, the safety is judged by combining the priority active judgment of the system and manual work to carry out rapid quantitative qualitative classification;
c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
6. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and E, comprehensively judging the safety according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
7. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: the step F gives the user safety certification, and irregularly detects abnormal users:
a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
CN202210153219.XA 2022-02-18 2022-02-18 Network security operation and maintenance method based on flow analysis and strategy visualization technology Pending CN114554254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210153219.XA CN114554254A (en) 2022-02-18 2022-02-18 Network security operation and maintenance method based on flow analysis and strategy visualization technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210153219.XA CN114554254A (en) 2022-02-18 2022-02-18 Network security operation and maintenance method based on flow analysis and strategy visualization technology

Publications (1)

Publication Number Publication Date
CN114554254A true CN114554254A (en) 2022-05-27

Family

ID=81674925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210153219.XA Pending CN114554254A (en) 2022-02-18 2022-02-18 Network security operation and maintenance method based on flow analysis and strategy visualization technology

Country Status (1)

Country Link
CN (1) CN114554254A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733937A (en) * 2017-12-01 2018-02-23 广东奥飞数据科技股份有限公司 A kind of Abnormal network traffic detection method
CN108173697A (en) * 2018-01-17 2018-06-15 北京科来神州科技有限公司 A kind of video private network security O&M early warning managing and control system
US20200021885A1 (en) * 2018-07-13 2020-01-16 Avago Technologies International Sales Pte. Limited Secure monitoring of system-on-chip applications
CN112579903A (en) * 2020-12-24 2021-03-30 北京百度网讯科技有限公司 User account processing method, device, equipment and storage medium
US20210204152A1 (en) * 2019-12-31 2021-07-01 Hughes Network Systems, Llc Traffic flow classification using machine learning
CN113225359A (en) * 2021-07-12 2021-08-06 深圳市永达电子信息股份有限公司 Safety flow analysis system based on brain-like calculation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733937A (en) * 2017-12-01 2018-02-23 广东奥飞数据科技股份有限公司 A kind of Abnormal network traffic detection method
CN108173697A (en) * 2018-01-17 2018-06-15 北京科来神州科技有限公司 A kind of video private network security O&M early warning managing and control system
US20200021885A1 (en) * 2018-07-13 2020-01-16 Avago Technologies International Sales Pte. Limited Secure monitoring of system-on-chip applications
US20210204152A1 (en) * 2019-12-31 2021-07-01 Hughes Network Systems, Llc Traffic flow classification using machine learning
CN112579903A (en) * 2020-12-24 2021-03-30 北京百度网讯科技有限公司 User account processing method, device, equipment and storage medium
CN113225359A (en) * 2021-07-12 2021-08-06 深圳市永达电子信息股份有限公司 Safety flow analysis system based on brain-like calculation

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
***;李洪敏;贾军;卢敏;: "一种基于流量与日志的专网用户行为分析方法", 信息安全研究, no. 09 *
罗军舟;杨明;凌振;吴文甲;顾晓丹;: "网络空间安全体系与关键技术", 中国科学:信息科学, no. 08 *
董升来;肖锋;张月;易晓峰;苏永强;吕金芝;: "有线电视网络安全通报预警机制技术平台和管理保障研究", 广播与电视技术, no. 09 *

Similar Documents

Publication Publication Date Title
EP3306512B1 (en) Account theft risk identification method, identification apparatus, and prevention and control system
WO2021017614A1 (en) Threat intelligence data collection and processing method and system, apparatus, and storage medium
JP4808703B2 (en) Method and system for identifying related network security threats using improved intrusion detection audit and comparison of intelligent security analysis
CN110716932B (en) Data processing method, system, device and storage medium
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN110727922A (en) Anti-fraud decision model construction method based on multi-dimensional data flow
CN111092910B (en) Database security access method, device, equipment, system and readable storage medium
CN112953971A (en) Network security traffic intrusion detection method and system
CN115982012A (en) Evaluation model and method for interface management capability maturity
US20170270602A1 (en) Object manager
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN110365634B (en) Abnormal data monitoring method, device, medium and electronic equipment
CN114554254A (en) Network security operation and maintenance method based on flow analysis and strategy visualization technology
CN115174193B (en) Data security intrusion detection method, device and equipment based on GA algorithm
CN115221509A (en) Authentication behavior portrait method based on 5W1H account
CN115379456A (en) Power 5G network risk assessment method and device, electronic equipment and storage medium
CN112437070B (en) Operation-based spanning tree state machine integrity verification calculation method and system
CN113922977A (en) Anti-cheating method and system based on mobile terminal
CN111209171B (en) Closed loop handling method and device for security risk and storage medium
CN112507304A (en) Information management system for retired soldiers
CN111447211A (en) Network fraud prevention system
CN111625855A (en) Multi-mechanism information sharing system and method based on block chain
KR101809671B1 (en) Apparatus and method for detecting anomaly authentication
CN110995692A (en) Network security intrusion detection method based on factor analysis and subspace collaborative representation
CN113364693B (en) Block chain data distribution method and system based on type attribute information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination