Network attack processing method and device
A technology of network attack and processing method, applied in the field of network attack processing, can solve the problems of low accuracy of confirmation attack, large accidental damage of data packets, large system resources, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] According to an embodiment of the present invention, a method embodiment of a network attack processing method is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0035] figure 1 is a schematic flowchart of a method for processing a network attack according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0036] Step S102, collecting data packet information in the data stream;
[0037] The data packet information in the data flow collected here may include flow information and packet characteristic information of the data packet, wherein, the flow information may be the percentage of data packe...
Embodiment 2
[0134] Figure 6 is a schematic structural diagram of a network attack processing device according to an embodiment of the present invention, such as Figure 6 As shown, the device includes: an acquisition module 61, an analysis module 62, a judgment module 63, a data update module 64, an abnormality detection module 65, a matching module 66 and an execution module 67, wherein,
[0135] Collecting module 61, is used for collecting the packet information in the data flow;
[0136] Parsing module 62, for parsing data packet information, obtain attack detection dimension data and packet feature dimension data;
[0137] Judgment module 63, used to compare the attack detection dimension data and packet feature dimension data with preset / learning data, and judge whether there is abnormality in the attack detection dimension data and packet feature dimension data;
[0138] The data updating module 64 is used for inputting the attack detection dimension data and the packet feature d...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com