Supercharge Your Innovation With Domain-Expert AI Agents!

Method for generating attack characteristic database, method for preventing network attack and device thereof

An attack feature and network attack technology, applied in the Internet field, can solve the problems of occupying too many resources and CPU performance, poor effect, etc., achieve good prevention effect and ensure system performance

Inactive Publication Date: 2008-09-24
HUAWEI TECH CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If it is applied to a high-end router based on a distributed architecture, it will take up too many resources and CPU performance, and the effect will be poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating attack characteristic database, method for preventing network attack and device thereof
  • Method for generating attack characteristic database, method for preventing network attack and device thereof
  • Method for generating attack characteristic database, method for preventing network attack and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0022] refer to figure 1 and figure 2 , figure 1 It is a schematic diagram of the overall structure of the device for preventing network attacks according to the embodiment of the present invention, including a receiving unit 1, a queue unit 2, a detection unit 3, an attack signature database 4, a recording unit 5, and an aging processing unit 6, wherein: the receiving unit 1 is used to receive Packets that need to be sent to the master control CP. The queue unit 2 is configured to store the message received by the receiving unit 1 that needs to be sent to the main control CP. The attack feature library 4 is used to store the attack feature and initial statistical data corresponding to the attack feature and the aging interval, the initial statistical data is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention disclose a method for generating an attack characteristic database, a method for preventing a network from attacking and a device used for preventing the network attacking; wherein, the method for preventing a network attack comprises: according to the attack characteristic database, the message which is required to transmit to a main control CP is judged whether the message comprises the attack characteristics in the attack characteristic database or not; if yes, the message is carried out corresponding anti-attack treatments according to the attack characteristics; if not, the message is transmitted to the main CP and is cached into an array to be analyzed. The invention can be used for extracting the attack characteristics incurred from a large IPS rule database to form the attack characteristic database; thereby implementing effective real time prevention to the subsequent attacks of the same type and being capable of obtaining better prevention effects simultaneously when the system properties are guaranteed.

Description

technical field [0001] The invention relates to the Internet, in particular to a method for generating an attack feature database, a method for preventing network attacks and a device for preventing network attacks. Background technique [0002] When it comes to secure networks, it is generally divided into three levels, namely equipment security, network security, and business security. Among them, device security is the basis for building a secure network. Therefore, how to ensure the security of network devices, especially network devices of important nodes (such as routers and switches) is a problem that the industry needs to focus on solving. [0003] For the protection of key equipment such as servers, it is natural to think of firewalls. Generally, connecting a firewall to the network interface of the equipment can effectively ensure the security of the equipment. However, it is more difficult to protect devices such as routers, because routers, especially high-end r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L29/06
Inventor 李振海
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More