Attack detection method and device

An attack detection and attacker technology, applied in the field of network security, can solve problems such as high misjudgment rate, low sensitivity, and user inability to operate, and achieve the effect of reducing misjudgment rate, improving accuracy, and improving accuracy

Active Publication Date: 2017-05-31
阿里巴巴华南技术有限公司
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, in the existing technology, there are problems of single detection dimension, inaccurate detection results, low sensitivity and high misjudgment rate, which makes the user unable to operate after being misjudged, and the overall user satisfaction is low. This is a very annoying process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device
  • Attack detection method and device
  • Attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The principle and spirit of the present application will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present application, rather than to limit the scope of the present application in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0086] Those skilled in the art know that the embodiments of the present application may be realized as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0087] According to the embodiments of the present application, an attack detection m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of invention provides an attack detection method and device. The method comprises the steps of after obtaining a user identification and URL in an access request, determining a preset URL group and URL group identification to which the URL belongs; constructing a piece of description information of the access behavior containing the user identification and the group identification; if the amount of the description information of the access behavior of the user identification and the group identification included in a preset period is larger than the preset value, then it is determined that the attack occurs. The method is equal to abstract the access behavior to user behavior description information which is constructed based on the user identification and the access URL identification, compared with the prior art of using IP addresses for the detection, the method can enhance the accuracy of the detection results.

Description

technical field [0001] The embodiments of the present application relate to the field of network security, and more specifically, the embodiments of the present application relate to an attack detection method and device. Background technique [0002] This section is intended to provide a background or context to the implementations of the application that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] At present, as the network can provide users with more and more content, and the number of users continues to increase, how to improve network security has become an in-depth problem in the industry. [0004] Specifically, in order to maintain network security, it is necessary to detect malicious user attacks. In related technologies, the number of access requests sent by the same user within a certain period of time is usually counted. Specifically, count the same IP (InternetProtocol, protocol int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 王远涛喻立久
Owner 阿里巴巴华南技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products