Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack event filtering method and system

A technology of attack event and filtering method, which is applied in the field of attack event filtering method and system, which can solve the problems of high occurrence frequency, single display interface display effect, and inability to display attack events, etc., to achieve the effect of increasing richness

Active Publication Date: 2019-11-29
CEC CYBERSPACE GREAT WALL
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Real-time attack messages include attack events corresponding to various destination IPs and source IPs. During the display of real-time attack messages, some real-time attack events corresponding to the same destination IP and source IP often appear in a relatively high proportion and occur frequently. , the effect of displaying attack events is too concentrated, and due to the performance bottleneck of the display interface, more attack events cannot be displayed within a certain period of time, for example, only 10 attack events can be displayed per second
[0003] Therefore, if a single method of displaying 10 attack events per second is used, the display interface often displays repeated attack messages and high-frequency attack messages, resulting in a single display effect on the display interface, which is not conducive to displaying rich attack content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack event filtering method and system
  • Attack event filtering method and system
  • Attack event filtering method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the technical solution of the present invention, the attack event filtering method and system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0050] figure 1 It is a schematic flowchart of an attack event filtering method provided in Embodiment 1 of the present invention, as shown in figure 1 As shown, the method includes:

[0051] Step S11, receiving an attack event, where the attack event includes event information.

[0052] Step S12. Judging that the reference count corresponding to the event information of the received attack event is less than or equal to the set number, and the attack event with the same event information corresponds to a reference count. If it is less than, execute step S13; if equal, execute step S14 .

[0053] Step S13, adding 1 to the reference count corresponding to the event information of the received attack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack event filtering method and system. The attack event filtering method comprises: receiving an attack event, including event information; judging whether a corresponding reference count of the event information of the received attack event is smaller than or equal to a preset number, wherein attack events with the same event information correspond to one reference count; if judging that the corresponding reference count of the event information of the received attack event is smaller than the preset number, adding 1 to the corresponding reference count of the event information of the received attack event, and storing the received attack event; and if judging that the corresponding reference count of the event information of the received attack event is equal to the preset number, canceling one attack event having the same event information with the received attack event, and storing the received attack event. The attack event filtering method and system improve richness of a display content of a display interface.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to an attack event filtering method and system. Background technique [0002] Real-time attack messages include attack events corresponding to various destination IPs and source IPs. During the display of real-time attack messages, some real-time attack events corresponding to the same destination IP and source IP often appear in a relatively high proportion and occur frequently. , the effect of displaying attack events is too concentrated, and due to the performance bottleneck of the display interface, more attack events cannot be displayed within a certain period of time, for example, only 10 attack events can be displayed per second. [0003] Therefore, if a single method of displaying 10 attack events per second is used, the display interface often displays repeated attack messages and high-frequency attack messages, resulting in a single display effect on the display ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 张权廖飞鸣刘鹏荆华娟朱建铭
Owner CEC CYBERSPACE GREAT WALL