A host-based network attack springboard detection method and device
A technology of network attack and detection method, applied in the direction of data exchange network, digital transmission system, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] Embodiment 1: A springboard detection method for host-based network attacks includes:
[0079] Step 1: The data packet capture module captures the data packets of the host, uniquely identifies each data packet, outputs the data packets after classification, and performs step 2; the data packets are divided into remote login protocol data packets and unidentified application layer protocol packet;
[0080] Step 2: the data flow identification and analysis module receives the data packet captured by the data packet capture module, identifies the qualified remote login protocol data packet, and classifies it into the data flow waiting for the springboard detection module to detect, and establishes a classified data flow queue, Carry out classified storage, perform step 3; discard unqualified TCP data packets;
[0081] Step 3: The springboard detection module detects whether the data flow group meets the detection requirements, and if the detection requirements are met, th...
Embodiment 2
[0083] Embodiment two: on the basis of embodiment one, in step 1, carrying out unique identification of each TCP data packet is to carry out unique identification by the quadruple information of TCP data packet, and concrete steps are: extract the source IP address of TCP data packet, destination IP Address, source port and destination port four-tuple information, the four-tuple information is used as the unique identifier of the TCP data packet.
Embodiment 3
[0084] Embodiment three: on the basis of embodiment one or two, the specific steps of said step 2 are:
[0085] Step 21: the data flow identification and analysis module judges that the data packet captured by the capture module is received, and judges whether it is a TCP data packet, if it is a TCP data packet, then perform step 2; otherwise, discard this TCP data packet;
[0086] Step 22: determine whether the TCP data packet belongs to the data flow of the classified data flow queue, if the storage queue is not established, then the storage queue will be established for this TCP data packet, and this TCP data packet will be added in the storage queue; otherwise, the This time, the TCP data packet is added to the corresponding data stream storage queue, and step 23 is performed;
[0087] Step 23: judge whether this TCP data packet belongs to the remote login data packet, if it belongs to the remote login data packet, then directly add this TCP data packet in the correspondin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


