Network attack retrospective analysis method and network security equipment

A technology of network attack and network analysis, applied in the field of network security

Active Publication Date: 2015-12-30
SANGFOR TECH INC
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a network analysis attack backtracking method and networ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack retrospective analysis method and network security equipment
  • Network attack retrospective analysis method and network security equipment
  • Network attack retrospective analysis method and network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] The present invention provides a method for backtracking network analysis attacks, referring to figure 1 , in an embodiment, the network analysis attack backtracking method includes:

[0042] In step S1, the network security device collects multi-dimensional historical network logs.

[0043] In this embodiment, the network security device collects historical network logs, and the collected historical network logs include but are not limited to: logs of business systems (such as IIS (Internet Information Services, Internet Information Services), MYSQL) where the server exists, and various events suffered by the server. Logs generated by attacks, logs of abnormal links initiated by the server, logs generated by intranet terminals accessing illegal links, logs of abnormal links initiated by intranet terminals, et...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack retrospective analysis method and network security equipment. The network attack retrospective analysis method comprises the steps that the network security equipment collects multidimensional historical network logs; when a network attack is detected, the network log is acquired, retrospective analysis is performed according to the network log and the historical network logs, and network attack data are acquired according to the result of retrospective analysis; and the network attack data are compiled as a safety event corresponding to the network attack. The accurate network attack data can be automatically acquired so that analysis difficulty of the network security event can be greatly reduced and great conditions can be provided for network security protection.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network analysis attack backtracking method and network security equipment. Background technique [0002] At present, there are many security detection methods for network security equipment, and there are also many security logs generated on terminals. When faced with these security logs, ordinary users do not know how to analyze them, and do not know which security logs need attention, which servers or user terminals Prevention needs to be strengthened; for users with network security experience, it is necessary to check the security logs of some suspected network attacks by manually searching the time period and IP and other relatively primitive methods, and then analyze through their network security experience to confirm whether the network attack is Existence and network attack process and scope of influence, this method requires users to manually operate, the ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 王本春
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products