Abnormal data processing method, cloud server, gateway, and terminal

A cloud server, abnormal data technology, applied in the Internet field, can solve problems such as low security, and achieve the effect of improving security and high accuracy

Inactive Publication Date: 2018-01-26
SANGFOR TECH INC
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to propose a method and device for generating a terminal control script, aiming at solving the technical problem of low security in Internet data interaction in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal data processing method, cloud server, gateway, and terminal
  • Abnormal data processing method, cloud server, gateway, and terminal
  • Abnormal data processing method, cloud server, gateway, and terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 4 example

[0085] refer to Figure 4 , Figure 4 It is the fourth embodiment of the abnormal data processing method of the present invention. In this embodiment, the abnormal data processing method includes steps:

[0086]Step S70, when the user traffic is detected, the gateway compares the user traffic with the features in the pre-stored first feature library;

[0087] In this embodiment, when the gateway detects user traffic, it directly extracts the user traffic and compares it with the features in the pre-stored first feature library. The first feature library may include a blacklist and / or a whitelist to determine the first Features in the feature database that do not match user traffic. When the user traffic contains file data, the file data can be directly uploaded to the cloud server as abnormal data.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal data processing method. The method comprises the following steps: when receiving abnormal data uploaded by a terminal and / or a gateway, performing security detection on the abnormal data by a cloud server, wherein the abnormal data are data not matched with a first feature library pre-stored by the terminal and / or the gateway; when the abnormal data are dangerous data, acquiring a processing strategy of the abnormal data by the cloud server; and transmitting the processing strategy to the terminal and / or the gateway by the cloud server, so that the terminaland / or the gateway performs a corresponding processing operation according to the processing strategy. The invention further discloses the cloud server, the gateway and the terminal. According to theabnormal data processing method provided by the invention, when the first feature library is not timely updated, the gateway and the terminal are ensured not to miss the data not matched with the pre-stored first feature library, so that the accuracy of processing the dangerous data by the gateway and the terminal is higher, so as to improve the security of Internet data interaction.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for processing abnormal data, a cloud server, a gateway and a terminal. Background technique [0002] With the development of network technology, many security problems have been brought about, such as various high-risk vulnerabilities being continuously exposed from the operating system to the application program, or malware running on the terminal, which can steal user For sensitive information, such as game accounts, online banking accounts, company confidential information, etc., malicious software can implant backdoors in users' computers to control users' computers to do illegal things. The attack methods of hackers are becoming more and more industrialized. The exploitation of vulnerabilities can be completed in an instant, and large-scale scanning, penetration and control are carried out. The attack methods are becoming more and more automated and intelligen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李凯
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products