Detection method and device for network attack
A network attack and detection method technology, applied in the field of network security, can solve the problems of inability to support upper-layer protocols such as HTTP or FTP, inability to define session flow status, poor correlation of attack rules, etc. Maintenance, good reusability, effect of improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] The present invention proposes context detection based on session state. When multiple data packets in a session match the states of all features in a rule, the rule is considered to be matched, thereby further reducing the false positive rate of attack detection. .
[0057] like figure 2 As shown, it is a schematic flowchart of the first embodiment of the network attack detection method of the present invention. This embodiment includes the following steps:
[0058] Step 10: Receive the data message of the session flow, and compare the current data message with the features in the preset feature library one by one;
[0059] Step 20: When the current data message matches the feature, query the attack rule referencing the matching feature in the preset rule base, and the attack rule includes one or more features, the state corresponding to the feature, and the defined operations;
[0060] Step 30, determine whether the attack rule has been recorded in the session st...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 