Security detection method and device

A technology of security detection and detection, which is applied in the field of information security, can solve the problems of low efficiency of terminal security detection and a lot of time spent on manual analysis of logs, so as to improve flexibility and scope of application, improve security detection efficiency, and save operating costs Effect

Inactive Publication Date: 2017-09-01
BEIJING QIANXIN TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the embodiments of the present invention, the inventors found that the relevant technologies have at least the following problems: manual analysis of logs takes a lot of time, resulting in low terminal security detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and device
  • Security detection method and device
  • Security detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] The embodiment of the present invention provides a security detection method, which can determine the abnormal behavior of the terminal corresponding to the marked log according to the abnormal identification corresponding to the abnormal behavior in the marked log, and then determine the terminal according to the abnormal behavior of the terminal corresponding to the marked log Finally, according to the security parameter va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security detection method and device. The method specifically comprises the steps of determining abnormal behaviors of terminals corresponding to marked logs according to abnormal identifiers corresponding to the abnormal behaviors in the marked logs; determining security parameter values of the terminals according to the abnormal behaviors of the terminals corresponding to the marked logs; and determining security detection results of the terminals according to the security parameter values. According to the embodiment of the invention, the operation costs for artificially analyzing the logs can be reduced, the terminal security detection efficiency can be improved, and the terminal security detection flexibility and application range can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security detection method and device. Background technique [0002] With the continuous development of Internet technology, a large number of logs will be generated in the process of users surfing the Internet through the terminal, and according to the large number of generated logs, manual analysis can determine whether the terminal is under network attack or has security problems. [0003] In related technologies, a terminal can obtain logs for a period of time and send the logs to a server, and the server can receive logs sent by multiple terminals and manually analyze the received logs to detect abnormal behaviors recorded in the logs, for example , the abnormal behavior may be a behavior of performing a network attack on the terminal, etc., further identifying the attacked terminal among the plurality of terminals according to the detected abnormal behavior, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 佘三华张翀斌赵晋龙袁桢唤
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products