Key message infrastructure network risk management and control system based on artificial intelligence

Key message infrastructure network risk management and control system based on artificial intelligence

  • CN 108,418,840 A
  • Filed: 05/18/2018
  • Published: 08/17/2018
  • Est. Priority Date: 05/18/2018
  • Status: Active Application
First Claim
Patent Images

1. the key message infrastructure network risk management and control system based on artificial intelligence, characterized in that including information collection mouldBlock, network risks detection module, risk intelligence management and control module;

  • Information acquisition module is for acquiring key message infrastructure networkRisk information, which includes the behavioural information of each host, network traffic information;

    Network risks detection module includes Network worm detection submodule, Network Traffic Monitoring submodule, Network worm detectionModule is used to carry out periodic Network worm detection according to the behavioural information of host, when detecting network worm to risk intelligenceIt can the corresponding Network worm detection result of management and control module transmission;

    Network Traffic Monitoring submodule is believed for auditing at a fixed time network flowBreath, to risk intelligence management and control module output abnormality flow processing strategy;

    Risk intelligence management and control module include network worm management and control submodule, traffic management and control submodule, Malware killing submodule,Hole Detection repairs submodule;

    Wherein network worm management and control submodule is connect with Network worm detection submodule, for according to netNetwork worm detecting result automatically generates corresponding threat inhibition/dispelling tactics, and using the threat inhibition/dispelling tactics pair generatedRespective host is handled;

    Traffic management and control submodule is connect with Network Traffic Monitoring submodule, for executing abnormal flow processingStrategy realizes the management and control to network flow;

    Malware killing submodule is for quickly sweeping key message infrastructureIt retouches, feature identification, remove resident trojan horse;

    Hole Detection repairs submodule for the loophole to key message infrastructurePatch and reparation are scanned, detect, alarm and downloaded with hidden danger.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×