Method and apparatus for processing network attack
A network attack and processing method technology, which is applied in the field of network attack processing methods and processing devices, can solve the problems of large-scale abnormality of protocol traffic, failure to find attack operators, and inability to provide network attack topology, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Please refer to Table Item 1 for the data structure of the text section of the frequency overrun event:
[0017] Destination IP
[0018] table entry 1
[0019] In table item 1, the packet sending frequency indicates the speed of sending data packets, and the cumulative number indicates the accumulated number of data packets of this type within the aging time.
[0020] See Table Item 2 for the connection exhaustion event body segment data structure:
[0021] Destination IP
[0022] table item 2
[0023] In table item 2, the connection frequency indicates the connection speed between a certain host and the target host, and the accumulated number indicates the accumulated number of connections within the aging time. The communication state described by the connection exhaustion event mainly refers to a host forming a large number of connections to a target host in a short period of time, exceeding the threshold of connection frequency and cumulative n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 