A data monitoring method and device

A data monitoring method and data anomaly technology, applied in the field of data processing, can solve the problems of inaccurate judgment results and inability to judge the type of attack, and achieve the effect of accurate detection results

Active Publication Date: 2021-06-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present application provides a data monitoring method, device and server, which are used to solve the problems that the existing single flow factor judgment method has inaccurate judgment results and cannot judge the attack type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data monitoring method and device
  • A data monitoring method and device
  • A data monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0032] The embodiment of the present application provides a data monitoring method to solve the problems of inaccurate judgment results and inability to judge attack types in the existing single traffic factor judgment method.

[0033] see figure 1 , figure 1 It is a flow chart of a data monitoring method disclosed in the embodiment of this application.

[0034] Such as figure 1 As shown, the monitoring method includes:

[0035] Step S100, determining the type of data anomaly to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a data monitoring method, device and server, wherein the method includes: determining the type of data anomaly to be detected, and sending the acquired server to the user IP address according to the preset decision tree corresponding to the data anomaly type Analyze the data traffic, obtain the traffic factor corresponding to the data anomaly type, and judge the traffic factor according to the preset decision tree corresponding to the data anomaly type, and determine whether the current data traffic is an abnormal attack of the data anomaly type. Among them, the pre-established decision tree stipulates the flow factor combination corresponding to the abnormal data type, the abnormal judgment threshold of each flow factor in the combination, and the sequence of judging the threshold of each flow factor. The method of the present application comprehensively considers multiple traffic factors associated with the data anomaly type to be detected, so that the final detection result is more accurate, and the specific type of abnormal attack can be finally determined.

Description

technical field [0001] The present application relates to the technical field of data processing, and more specifically, to a data monitoring method and device. Background technique [0002] DDOS (Distribution Denial Of Service) is also known as distributed denial of service. Attackers consume server bandwidth or CPU resources by sending malicious traffic or requests, making the server unable to provide normal services. [0003] The existing protection method against distributed denial of service is to judge the threshold value of a flow factor representing the traffic attribute in the communication data flow, and when it is judged to exceed the preset threshold value, it is considered that abnormal flow has occurred. However, there are many kinds of flow factors that characterize flow attributes, and it is too simple to simply use a certain flow factor as a judgment condition, which will affect the accuracy of abnormal judgment results. Furthermore, distributed denial of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 陈曦白惊涛
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products