Intruding message flow processing method and device

A processing method and packet flow technology, applied in the field of communication, can solve the problem of low protection efficiency of intrusion packets, and achieve the effect of solving the low protection efficiency

Inactive Publication Date: 2017-02-08
HANGZHOU DPTECH TECH
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a method and device for processing intrusion message streams to solve the problem of low effic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intruding message flow processing method and device
  • Intruding message flow processing method and device
  • Intruding message flow processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0036] The terminology used in the present invention is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein and in the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intruding message flow processing method and device, and the method comprises the steps: determining an intruding message flow from received intruding message flows based on a preset intrusion prevention strategy; performing quantity statistics on hit logs of the intruding message flow based on a preset period; when a statistical result exceeding a preset quantity threshold value, promoting an intruding level of the intruding message flow based on the statistical result; and performing prevention processing on the intruding message flow based on the intruding level of the intruding message flow. According to the invention, the intrusion prevention strategy can be automatically updated according to the quantity of the intruding message flow hit logs in the preset period, and a problem that prevention efficiency for the intruding message flow is low caused by manually updating the intrusion prevention strategy in relevant technologies can be solved.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a method and device for processing intrusion message streams. Background technique [0002] With the rapid development of computer network, the network brings various security problems while bringing great convenience to people. IPS (Intrusion Prevention System) is a computer network security technology that can monitor the network data transmission behavior of network or network equipment. It can interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors, thereby To achieve the effect of blocking network intrusion. Intrusion prevention policies can be preset on the IPS device. IPS devices can identify and process intrusion behaviors based on intrusion prevention policies. [0003] In related technologies, relevant workers need to perform statistics and analysis on hit logs of intrusion behaviors, and manually configure and update preset i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/1425
Inventor 翟世兴张宁
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products