Unlock instant, AI-driven research and patent intelligence for your innovation.

Network data analysis method and server

A server and data technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as denial of service by attackers, and achieve the effect of ensuring security

Active Publication Date: 2020-08-04
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the attacker forges that the victim sends a large number of data processing requests to the server, the server will mistakenly believe that the victim (that is, the possible victim) is initiating data processing, so it will send the network response data to the victim Or, this will result in denial of service by the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data analysis method and server
  • Network data analysis method and server
  • Network data analysis method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0028] definition:

[0029] DDoS (Distributed Denial of Service, Distributed Denial of Service), many DOS attack sources attack a certain server together to form a DDOS attack. The attack refers to the use of client / server technology to combine multiple computers as an attack platform to attack one or Multiple targets launch DoS attacks, thereby multiplying the power of denial of service attacks.

[0030] Reflective DDoS attack, also called Amplification Attack, refers to the use o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for monitoring a network server, a network data analysis method, and a server. The network data analysis method comprises the following steps: acquiring an initial network traffic log; and based on a sender network address, a receiver network address, a request type and sending request time in the initial network traffic log, respectively dividing the initial network traffic log in an attack record table and a scanning record table; and acquiring an attacker network address and a victim network address as attack alarm data from the attack record table and the scanning record table. According to the embodiments of the invention, under the condition that network response data of a honeypot server can be recorded, the IP address of an attacker can be accurately located, and thus the security of network data transmission and storage is guaranteed.

Description

technical field [0001] The present application relates to the technical field of Internet data processing, and in particular to a network data storage method and a network server, a network server monitoring method and monitoring system, and a network data analysis method and analysis server. Background technique [0002] At present, as users use the Internet to conduct more and more online transactions such as shopping, more and more users are often attacked by hackers and the like. If the attacker forges that the victim sends a large number of data processing requests to the server, the server will mistakenly believe that the victim (that is, the possible victim) is initiating data processing, so it will send the network response data to the victim Or, this will result in denial of service by the attacker. Contents of the invention [0003] The inventor found in the course of the research that in the prior art, since the attacker forged the IP (Internet Protocol) addres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/0209H04L63/1425H04L63/1441H04L63/1458H04L63/1466H04L63/1483
Inventor 王海东李然宋加生
Owner ALIBABA GRP HLDG LTD