Regular matching-based network attack detection method and apparatus

A network attack and detection method technology, applied in the field of network security, can solve problems such as ineffective detection and blocking, victimization, and evil

Inactive Publication Date: 2016-09-21
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security incidents such as Web intrusions leading to sensitive data leakage, webpage tampering causing bad influence on public opinion, and webpage hanging horses causing users to suffer frequently occur
[0003] At present, netwo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Regular matching-based network attack detection method and apparatus
  • Regular matching-based network attack detection method and apparatus
  • Regular matching-based network attack detection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure, and to fully convey the scope of the present disclosure to those skilled in the art.

[0042] In order to make the advantages of the technical solutions of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and embodiments.

[0043] The embodiment of the present invention provides a network attack detection method based on regular matching, such as figure 1 As shown, the method includes:

[0044] 101. Receive a net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a regular matching-based network attack detection method and apparatus, relating to the technical field of network security, and solving the problem that Web attack data cannot be effectively detected and blocked. The main technical solution of the present invention includes steps of receiving a network access request sent by a user; determining whether the network access request includes attack data according to a regular expression in a preset rule repository, wherein the regular expression includes a preset attack character string; and if the network access request includes the attack data, determining that the network access request sent by the user is a network attack behavior. The method is mainly applied to detecting the network attack behavior.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting a network attack based on regular matching. Background technique [0002] With the rapid development of information technology, the Internet has brought convenience to people's lives and also brought new security challenges. Today's network security issues cannot be ignored. Most of the early networks were C / S structure, providing users with information services. Today, most of the B / S structure has been implemented. Users can open a webpage to shop, and open a website to buy stocks, lottery tickets and even donate to Project Hope. As web applications become more and more abundant, web servers have gradually become the main targets of attacks with their high-value data and greater influence. Security incidents such as the leakage of sensitive data caused by Web intrusion, web page tampering into a bad influence of public opinion, and user v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1408
Inventor 傅涛薛敏孙文静俞正兵
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products