CN114554254A - Network security operation and maintenance method based on flow analysis and strategy visualization technology - Google Patents
Network security operation and maintenance method based on flow analysis and strategy visualization technology Download PDFInfo
- Publication number
- CN114554254A CN114554254A CN202210153219.XA CN202210153219A CN114554254A CN 114554254 A CN114554254 A CN 114554254A CN 202210153219 A CN202210153219 A CN 202210153219A CN 114554254 A CN114554254 A CN 114554254A
- Authority
- CN
- China
- Prior art keywords
- user
- flow
- video
- safety
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25891—Management of end-user data being end-user preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/23418—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/24—Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
Abstract
The invention discloses a network security operation and maintenance method based on flow analysis and strategy visualization technology, which comprises the following steps: A. making a basic division based on the flow registration; B. carrying out directional classification according to the flow source crowd; C. determining the user type according to the video flow; D. actively judging the safety of the video characters according to the released video; E. comprehensively judging the safety according to the statistical data; F. giving a user security authentication, and detecting abnormal users at irregular intervals; the method is based on flow analysis, divides the client class of the network issued video or characters, directionally classifies the client class according to the main source of the clicked lookup flow, performs basic qualitative authentication on the user type, irregularly detects abnormal and non-authenticated users, and ensures a green network environment.
Description
Technical Field
The invention relates to the technical field of network security operation and maintenance management, in particular to a network security operation and maintenance method based on a flow analysis and strategy visualization technology.
Background
With the development of network technology, the communication between cities becomes more, the distance between people is shortened, more business opportunities are developed through the network, the network is a double-edged sword, which not only can bring convenience, but also brings certain dangerousness, in the practical application of the network, a part of network resources are used for doing illegal crimes, such as stealing of other people information through trojans or spreading of illegal information through network propaganda, the influence caused by offline illegal crimes is very limited, the spreading influence range is relatively small, but the network illegal crimes can cause serious social problems, the cost of the network crimes becomes lower, so that network traps such as bamboo shoots in spring after rain can emerge, the traditional network supervision cannot realize the comprehensive supervision of the network, when problems are discovered, certain bad influences are caused, and today of the rapid development of the current network video software, the safe and stable operation of the network is ensured, so that how to effectively solve the problems becomes a difficult problem which is urgently needed to be solved at present.
Disclosure of Invention
The invention aims to provide a network security operation and maintenance method based on flow analysis, which is used for classifying client sides issuing videos or characters on a network, directionally classifying the client sides according to main sources of click lookup flow, performing basic qualitative authentication on user types, irregularly detecting abnormal and unauthenticated users and ensuring the flow analysis and strategy visualization technology of a green network environment.
In order to achieve the purpose, the invention provides the following technical scheme: the network security operation and maintenance method based on the flow analysis and strategy visualization technology comprises the following operation and maintenance control method steps:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
Preferably, step a makes a basic division based on traffic registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
Preferably, the step B is based on the traffic source population for directional classification:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
Preferably, step C characterizes the user type according to the video traffic:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video flow analysis qualitative users.
Preferably, step D actively judges the security of the video text according to the published video: a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users; b. the safety is judged by means of the system priority active judgment and manual rapid quantitative qualitative classification in the middle period; c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
Preferably, step E comprehensively judges the security according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
Preferably, step F gives the user a security certificate, and detects the abnormal user irregularly: a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
Compared with the prior art, the invention has the beneficial effects that:
(1) the invention can perform data visualization on user information based on flow analysis, and combines with the flow information to perform user directional classification, and the user classification, the user work classification and the user flow source can realize the safe operation supervision on users of an internet platform, ensure the network safety, and avoid illegal criminal propaganda of the users through the network or illegal criminal propaganda by borrowing and stealing network accounts.
(2) The invention can reduce the workload of the monitored by carrying out safety certification on the user in the network safety operation and maintenance method, gives irregular spot inspection to the non-certification account number, and finds out the illegal video or characters to be checked immediately.
Drawings
Fig. 1 is a schematic view of the overall structure of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, in the network security operation and maintenance method based on traffic analysis and policy visualization technology, the operation and maintenance control method includes the steps of:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
Step A, basic division is made based on flow registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
And B, directionally classifying according to the flow source crowd:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
Step C, according to the video flow qualitative user type:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video traffic analysis qualitative users.
Step D, actively judging the safety of the video characters according to the released video:
a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users; b. in the middle period, the safety is judged by combining the priority active judgment of the system and manual work to carry out rapid quantitative qualitative classification; c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
Step E, comprehensively judging the safety according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
Step F, giving user safety authentication, and detecting abnormal users in an irregular way:
a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
The above embodiments are only preferred embodiments of the present invention, and are not intended to limit the technical solutions of the present invention, so long as the technical solutions can be realized on the basis of the above embodiments without creative efforts, which should be considered to fall within the protection scope of the patent of the present invention.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. The network security operation and maintenance method based on the flow analysis and strategy visualization technology comprises the following operation and maintenance control method steps:
A. making a basic division based on the flow registration;
B. carrying out directional classification according to the flow source crowd;
C. determining the user type according to the video flow;
D. actively judging the safety of the video characters according to the released video;
E. comprehensively judging the safety according to the statistical data;
F. and (4) giving a user security authentication, and detecting abnormal users at irregular intervals.
2. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: the step A makes basic division based on flow registration:
a. ranking grades according to the click rate of the user works and the related flow;
b. secondly, performing basic division according to the related field of the user main click flow works;
c. and finally, judging whether the user account is related to or possibly related to illegal operation according to the user work.
3. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and B, directionally classifying according to the flow source crowd:
a. analyzing the main source qualitative user category of the flow according to the flow generated by the user works;
b. performing special directional classification management one by one according to the user video and the written works;
c. and carrying out comprehensive directional classification management according to the user videos and the written works.
4. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and C, according to the video flow qualitative user type:
a. carrying out user type qualification according to the main convergence time period of the video flow;
b. analyzing and qualifying the user type according to the video with higher user issued flow;
c. the method comprises the following main fields of integrating a plurality of video flow analysis qualitative users.
5. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and the step D is to actively judge the safety of the video characters according to the released video:
a. in the early stage, the safety is judged by manually analyzing, quantifying, classifying and judging according to videos or characters issued by users;
b. in the middle period, the safety is judged by combining the priority active judgment of the system and manual work to carry out rapid quantitative qualitative classification;
c. and the later-stage integrated data completely depends on the system to make active judgment, and the user complaints are subjected to secondary judgment by manpower and optimizes related data.
6. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: and E, comprehensively judging the safety according to the statistical data:
a. comprehensively checking related technical data according to different related fields;
b. checking whether videos and characters issued by a client with a large flow rate are in compliance;
c. and comprehensively judging the safety of the client user by combining the client flow and the field related to the client and further the content.
7. The network security operation and maintenance method based on the traffic analysis and policy visualization technology as claimed in claim 1, wherein the specific operation identification processing step comprises: the step F gives the user safety certification, and irregularly detects abnormal users:
a. the safety of the user account of the client is ensured, and the issued video and characters accord with relevant regulations and are given to the user safety certification;
b. irregular spot check of user accounts which lack authentication videos or have high text flow rate abnormally;
c. the user who has been given the relevant security authentication is checked regularly and accompanied by a corresponding notification of improper modification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210153219.XA CN114554254A (en) | 2022-02-18 | 2022-02-18 | Network security operation and maintenance method based on flow analysis and strategy visualization technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210153219.XA CN114554254A (en) | 2022-02-18 | 2022-02-18 | Network security operation and maintenance method based on flow analysis and strategy visualization technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114554254A true CN114554254A (en) | 2022-05-27 |
Family
ID=81674925
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210153219.XA Pending CN114554254A (en) | 2022-02-18 | 2022-02-18 | Network security operation and maintenance method based on flow analysis and strategy visualization technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114554254A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733937A (en) * | 2017-12-01 | 2018-02-23 | 广东奥飞数据科技股份有限公司 | A kind of Abnormal network traffic detection method |
CN108173697A (en) * | 2018-01-17 | 2018-06-15 | 北京科来神州科技有限公司 | A kind of video private network security O&M early warning managing and control system |
US20200021885A1 (en) * | 2018-07-13 | 2020-01-16 | Avago Technologies International Sales Pte. Limited | Secure monitoring of system-on-chip applications |
CN112579903A (en) * | 2020-12-24 | 2021-03-30 | 北京百度网讯科技有限公司 | User account processing method, device, equipment and storage medium |
US20210204152A1 (en) * | 2019-12-31 | 2021-07-01 | Hughes Network Systems, Llc | Traffic flow classification using machine learning |
CN113225359A (en) * | 2021-07-12 | 2021-08-06 | 深圳市永达电子信息股份有限公司 | Safety flow analysis system based on brain-like calculation |
-
2022
- 2022-02-18 CN CN202210153219.XA patent/CN114554254A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733937A (en) * | 2017-12-01 | 2018-02-23 | 广东奥飞数据科技股份有限公司 | A kind of Abnormal network traffic detection method |
CN108173697A (en) * | 2018-01-17 | 2018-06-15 | 北京科来神州科技有限公司 | A kind of video private network security O&M early warning managing and control system |
US20200021885A1 (en) * | 2018-07-13 | 2020-01-16 | Avago Technologies International Sales Pte. Limited | Secure monitoring of system-on-chip applications |
US20210204152A1 (en) * | 2019-12-31 | 2021-07-01 | Hughes Network Systems, Llc | Traffic flow classification using machine learning |
CN112579903A (en) * | 2020-12-24 | 2021-03-30 | 北京百度网讯科技有限公司 | User account processing method, device, equipment and storage medium |
CN113225359A (en) * | 2021-07-12 | 2021-08-06 | 深圳市永达电子信息股份有限公司 | Safety flow analysis system based on brain-like calculation |
Non-Patent Citations (3)
Title |
---|
***;李洪敏;贾军;卢敏;: "一种基于流量与日志的专网用户行为分析方法", 信息安全研究, no. 09 * |
罗军舟;杨明;凌振;吴文甲;顾晓丹;: "网络空间安全体系与关键技术", 中国科学:信息科学, no. 08 * |
董升来;肖锋;张月;易晓峰;苏永强;吕金芝;: "有线电视网络安全通报预警机制技术平台和管理保障研究", 广播与电视技术, no. 09 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3306512B1 (en) | Account theft risk identification method, identification apparatus, and prevention and control system | |
WO2021017614A1 (en) | Threat intelligence data collection and processing method and system, apparatus, and storage medium | |
JP4808703B2 (en) | Method and system for identifying related network security threats using improved intrusion detection audit and comparison of intelligent security analysis | |
CN110716932B (en) | Data processing method, system, device and storage medium | |
CN111598574A (en) | Intelligent service transaction oriented supervision method and supervision interface | |
CN110727922A (en) | Anti-fraud decision model construction method based on multi-dimensional data flow | |
CN111092910B (en) | Database security access method, device, equipment, system and readable storage medium | |
CN112953971A (en) | Network security traffic intrusion detection method and system | |
CN115982012A (en) | Evaluation model and method for interface management capability maturity | |
US20170270602A1 (en) | Object manager | |
CN114117264A (en) | Illegal website identification method, device, equipment and storage medium based on block chain | |
CN110365634B (en) | Abnormal data monitoring method, device, medium and electronic equipment | |
CN114554254A (en) | Network security operation and maintenance method based on flow analysis and strategy visualization technology | |
CN115174193B (en) | Data security intrusion detection method, device and equipment based on GA algorithm | |
CN115221509A (en) | Authentication behavior portrait method based on 5W1H account | |
CN115379456A (en) | Power 5G network risk assessment method and device, electronic equipment and storage medium | |
CN112437070B (en) | Operation-based spanning tree state machine integrity verification calculation method and system | |
CN113922977A (en) | Anti-cheating method and system based on mobile terminal | |
CN111209171B (en) | Closed loop handling method and device for security risk and storage medium | |
CN112507304A (en) | Information management system for retired soldiers | |
CN111447211A (en) | Network fraud prevention system | |
CN111625855A (en) | Multi-mechanism information sharing system and method based on block chain | |
KR101809671B1 (en) | Apparatus and method for detecting anomaly authentication | |
CN110995692A (en) | Network security intrusion detection method based on factor analysis and subspace collaborative representation | |
CN113364693B (en) | Block chain data distribution method and system based on type attribute information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |