Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack behavior detection method and device

A network attack and detection method technology, applied in the field of network security, can solve the problems of difficult detection, low efficiency and low accuracy of detection methods, and achieve the effect of accurate detection

Inactive Publication Date: 2017-05-10
神州网云(北京)信息技术有限公司
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, various network security problems emerge in an endless stream, such as Trojan horses, phishing websites, phishing emails, DDoS (DDoS: Distributed Denial of Service, distributed denial of service attack) against domain name servers, and DDoS against specific types of networks. Attacks, large-scale DNS (Domain Name System, Domain Name System) spoofing attacks, botnets and other network attacks seriously threaten the information and data security of network users. Because the above-mentioned network attacks are often highly deceptive and disguised, conventional The detection method of capturing and analyzing all data has low efficiency and low accuracy, making it difficult to detect effectively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack behavior detection method and device
  • Network attack behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, so they are only examples, and should not be used to limit the protection scope of the present invention.

[0078] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in the present application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0079] The invention provides a network attack behavior detection method, a network attack behavior detection device and a network attack behavior detection system. Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0080] figure 1 A flow chart of a network attack behavior detection method provided by the first e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack behavior detection method. The method comprises the following steps: firstly, acquiring domain name system resolution data; secondly, performing data mining on the domain name system resolution data by a preset data mining algorithm to obtain a data mining result; and lastly, detecting network attack behaviors according to the data mining result. Compared with the conventional way of detecting the network attack behaviors by packet capturing analysis, the method has the advantages that the domain name system resolution data are taken as a processing object, and data mining is performed on the domain name system resolution data, so that the network attack behaviors can be detected more efficiently and accurately according to the mining result.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network attack behavior detection method and device. Background technique [0002] With the development of Internet technology, various network security problems emerge in an endless stream, such as Trojan horses, phishing websites, phishing emails, DDoS (DDoS: Distributed Denial of Service, distributed denial of service attack) against domain name servers, and DDoS against specific types of networks. Attacks, large-scale DNS (Domain Name System, Domain Name System) spoofing attacks, botnets and other network attacks seriously threaten the information and data security of network users. Because the above-mentioned network attacks are often highly deceptive and disguised, conventional The detection method of capturing and analyzing all data has low efficiency and low accuracy, making it difficult to effectively detect it. Contents of the invention [0003] Aiming at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L63/1483
Inventor 宋超杨洪国
Owner 神州网云(北京)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products