Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for identifying network attack

A technology for identifying network and attacking data, which is applied in the field of communication, and can solve problems such as network security products and methods are difficult to deal with, difficult to operate and maintain, and huge business traffic

Active Publication Date: 2015-04-01
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the huge business traffic of Internet companies, conventional network security products and methods are difficult to deal with, and higher costs (such as hardware resources) need to be invested to support the business needs of discovering network attacks
In this regard, some companies turn to self-developed network security equipment and solutions, but they lack stability, professionalism, and are even difficult to operate and maintain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying network attack
  • Method and system for identifying network attack
  • Method and system for identifying network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0022] figure 1 is a flowchart of a method for identifying a network attack according to an embodiment of the present invention. see figure 1 , the method includes:

[0023] S100: Locate the duration of abnormal flow at the exit of the equipment room.

[0024] Among them, such as figure 2 As shown, in the implementation manner of the present invention, step S100 can be realized through the following steps:

[0025] S110: Judging whether the time interval between the current time and the end time of the reference time period (abnormal time period closest to the current time in the time dimension) of the exit of the computer room is greater than a predetermined time interval (such as 10 minutes, certainly not limited thereto, according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for identifying network attack. The method comprises the following steps: positioning duration time of abnormal flow of an outlet of a computer room; extracting original flow data in the positioned duration time of the abnormal flow of the outlet of the computer room; judging whether the extracted original flow data is attack data, and identifying that the network attack exists if the extracted original flow data is the attack data. By adopting the method and the system for identifying the network attack, the low cost can be retained; meanwhile, the stability and the specialty of identifying the network attack can be ensured.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to a method and system for identifying network attacks. Background technique [0002] As the business scale of Internet companies grows, more and more users use and access the company's applications and services. However, the large traffic impact caused by unknown network attacks will affect the normal use of services, and will also push up traffic to affect the company's broadband cost billing. Timely detection of cyber attacks not only buys time for taking countermeasures, but also provides data support for subsequent cost negotiations with operators. [0003] However, due to the huge business traffic of Internet companies, conventional network security products and methods are difficult to deal with, and higher costs (such as hardware resources) need to be invested to support the business needs of discovering network attacks. In this regard, some companies have turned...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/126H04L63/1425
Inventor 陈云飞李向辉胡晓赟熊亚军
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More