Network security protection method and device
A network security and protective device technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of not fully considering security factors, attacks, and network IP data packets without credible identification, so as to ensure stability and security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0024] see figure 1 , which is a flow chart of the first embodiment of the network security protection method of the present invention, the method includes:
[0025] Step S10: the server records web page access logs. The access log includes the network address of each visit to the server.
[0026] The server will record all webpage access logs in the specified directory, and the access log will at least include the network address (user IP) that has visited the server each time, the webpage that requests access, the time of requesting access, and the browser ID that accesses the server .
[0027] Step S11, acquiring log content within a predetermined period of time in the access log.
[0028] Specifically, the server regularly checks the access log, and randomly extracts log content within a period of time, or extracts log content within a predete...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 