Network attack retrospective analysis method and network security equipment
A technology of network attack and network analysis, applied in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0041] The present invention provides a method for backtracking network analysis attacks, referring to figure 1 , in an embodiment, the network analysis attack backtracking method includes:
[0042] In step S1, the network security device collects multi-dimensional historical network logs.
[0043] In this embodiment, the network security device collects historical network logs, and the collected historical network logs include but are not limited to: logs of business systems (such as IIS (Internet Information Services, Internet Information Services), MYSQL) where the server exists, and various events suffered by the server. Logs generated by attacks, logs of abnormal links initiated by the server, logs generated by intranet terminals accessing illegal links, logs of abnormal links initiated by intranet terminals, et...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com