Flow analysis based protective method and device against network attack
A network attack and network technology, applied in the network field, can solve problems such as increased user learning costs, poor scanning perception, high maintenance costs, etc., to achieve the effects of shortening waiting time, reducing learning costs, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0078] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of a traffic analysis-based network attack protection method of the present application, which may specifically include the following steps:
[0079] Step 101, collecting network traffic passing between a network server and a network routing device.
[0080] When the client or external server accesses the Internet provided by the network provider, the network access request is transmitted to the network server provided by the network provider through the network routing device, and the network server further transmits the information from the network server to the network routing device according to the feedback information ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com