Network attack handling method and network attack handling device

A network attack and processing method technology, which is applied in the field of network attack processing methods and devices, can solve problems such as easy misjudgment of network attacks, and achieve the effects of ensuring normal progress, improving user experience, and enhancing the ability to identify misjudgments

Active Publication Date: 2016-02-24
SANGFOR TECH INC
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a method and device for processing network attacks, aiming to solve the technical problem of easy misjudgment when detecting network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack handling method and network attack handling device
  • Network attack handling method and network attack handling device
  • Network attack handling method and network attack handling device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] The present invention provides a kind of processing method of network attack, refer to figure 1 , in one embodiment, the processing method of the network attack includes:

[0053] Step S101, acquiring attack feature information and a first data packet matching the attack feature information;

[0054] SQL (StructuredQueryLanguage, Structured Query Language) injection is an attack that inserts or adds SQL code into the input parameters of the application, and then passes these parameters to the SQL server in the background for parsing and execution. In this embodiment, it mainly targets SQL injection This type of cyber attack, of course, can also be other cyber attacks.

[0055] In this embodiment, when performing attack detection on network data, the attack feature information stored in the cloud server is obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack handling method and a network attack handling device. The network attack handling method comprises the following steps of: acquiring attack feature information and a first data packet matched with the attack feature information; acquiring grammar information of a preset programming language and context grammar information of the programming language; judging whether the first data packet is an attack data packet or not according to the grammar information and the context grammar information, and acquiring a judgment result; and executing corresponding operations according to the judgment result. The method and the device provided by the invention cover the shortage of an attack detection mode based on the attack feature information, enhance misjudgment identification ability, can discover misjudgment situation of the network attack in time, and can guarantee normal operation of services.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for processing network attacks. Background technique [0002] At present, most of the products that perform security checks on network data are based on signature identification, that is, if the attack characteristics of the data packet match the signature, it can detect that the data packet is offensive. In the case of a network attack, the device sends Users report current network anomalies. Due to the limitations of the existing technology, the network attack detection method based on the signature code is easy to cause misjudgment, and a normal data packet is judged as an attack data packet conforming to the signature code: for the misjudgment generated, there is still no good one. The solution is generally to remedy the misjudgment after it occurs. For example, rely on manual analysis to analyze the attack logs one by one to see which are networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 刘余
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products