Method for generating attack characteristic database, method for preventing network attack and device thereof
An attack feature and network attack technology, applied in the Internet field, can solve the problems of occupying too many resources and CPU performance, poor effect, etc., achieve good prevention effect and ensure system performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0022] refer to figure 1 and figure 2 , figure 1 It is a schematic diagram of the overall structure of the device for preventing network attacks according to the embodiment of the present invention, including a receiving unit 1, a queue unit 2, a detection unit 3, an attack signature database 4, a recording unit 5, and an aging processing unit 6, wherein: the receiving unit 1 is used to receive Packets that need to be sent to the master control CP. The queue unit 2 is configured to store the message received by the receiving unit 1 that needs to be sent to the main control CP. The attack feature library 4 is used to store the attack feature and initial statistical data corresponding to the attack feature and the aging interval, the initial statistical data is ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com