Network attack identification method and device as well as computer readable storage medium

A network attack and identification method technology, which is applied in the field of computer-readable storage media, network attack identification methods and devices, and can solve problems such as unrecognizable messages

Inactive Publication Date: 2017-12-15
HANGZHOU DPTECH TECH
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present application provides a network attack identification method and device, and a computer-readable storage medium, which can solve the problem that messages transmitted through covert channels, encrypted channels, etc. and belonging to network attacks cannot be identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack identification method and device as well as computer readable storage medium
  • Network attack identification method and device as well as computer readable storage medium
  • Network attack identification method and device as well as computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0023] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a network attack identification method and device as well as a computer readable storage medium. The method may include the following steps: acquiring a preset type of attribute information in a target data stream; inputting the acquired attribute information into a preconfigured machine learning model for calculation, wherein the machine learning model is obtained by training sample data through a supervised learning algorithm; and identifying whether the target data stream belongs to network attacks according to a calculation result. According to the technical scheme provided by the application, the data stream that belongs to the network attacks can be effectively identified; and meanwhile, the network attacks can be identified without extracting attack features, and messages that are transmitted through covert channels, encrypted channels and other modes and belong to the network attacks can be identified.

Description

technical field [0001] The present application relates to the technical field of computer communication, and in particular to a network attack identification method and device, and a computer-readable storage medium. Background technique [0002] With the development of computer communication technology, the Internet has spread all over the world, providing users with a variety of network information services. However, while using computers to share network resources, the accompanying network security problems are becoming more and more serious. [0003] In related technologies, an IPS (Intrusion Prevention System, intrusion prevention system) is deployed to protect against network attacks. The IPS extracts other fields in the data stream that are different from legal fields as attack signatures, and matches them in the attack signature database to identify packets belonging to network attacks. [0004] However, when data streams are transmitted through covert channels, en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1408
Inventor 叶倩
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products