Method, device and system for quantifying defense results

A flow and change value technology, applied in the network field, can solve the problems of incomplete data flow, inaccurate results, incomplete parameter indicators, etc., and achieve the effect of improving accuracy and integrity.

Active Publication Date: 2019-06-28
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, due to the incomplete methods used in the evaluation of defense results, incomplete parameter indicators, and incomplete data flow, the results of evaluating defense results are inaccurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for quantifying defense results
  • Method, device and system for quantifying defense results
  • Method, device and system for quantifying defense results

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0095] The root cause of the incomplete evaluation angles and evaluation indicators in the process of quantifying defense results in the prior art is that the data traffic of the business end, the defense end, and the target end cannot be unified and centralized. The reason why the data traffic of the three cannot be unified is that the data traffic of the attack end comes from outside the network, the data traffic of the defense end is generally at the border or exit of the network,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a method and system for quantifying defense results, wherein the method includes: obtaining a set of suspicious data flows, the set of suspicious data flows being each of the set of suspicious IP addresses contained in the original data flow located at the defense end of the cloud platform The data traffic corresponding to the suspicious IP address is composed; the normal data traffic is obtained, and the normal data traffic is the remaining data traffic after the defense end cleans the suspicious data traffic set according to the preset defense strategy; the performance parameters of the authorized host, the host The performance parameter is a set of parameters extracted on the target end after the defense end sends the normal data traffic to the target end; the defense result is quantified based on the target parameter set; the target parameter set at least includes: Collection of suspicious data traffic, normal data traffic, and host performance parameters. Since the evaluation angles and indicators for calculating the defense results in this application are more comprehensive, the defense results are more accurate.

Description

technical field [0001] The present application relates to the field of network technologies, and in particular to methods, devices and systems for quantifying defense results. Background technique [0002] With the continuous advancement of network technology, there are more and more network attacks in the network field. At present, among many network attacks, Distributed Denial of Service (DDoS) has become a relatively serious attack means. For this reason, a defensive end is added to the original system architecture to block DDoS attacks. [0003] Such as figure 1 As shown in FIG. 2 , it is a schematic diagram of an existing network system architecture. As can be seen from the figure, the system architecture includes the business end, routing equipment, defense end and target end. Among them, the business end includes normal business end and attack end. The attack end sends various forms of attack data traffic, and the defense end blocks attack data traffic according ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/1425H04L63/20H04L9/40H04L47/2425H04L69/163
Inventor 马乐乐祝建跃朱家睿
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products