Network attack detection method and apparatus, terminal device and computer storage medium

A network attack and detection method technology, applied in the field of network security, can solve problems such as low compatibility, and achieve the effect of improving compatibility and facilitating the judgment process

Active Publication Date: 2018-02-02
北京长亭未来科技有限公司
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the prior art, the attack defense methods are usually only aimed at a specific type of vulnerability attack, therefore, the existing attack defense methods often have the problem of low compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and apparatus, terminal device and computer storage medium
  • Network attack detection method and apparatus, terminal device and computer storage medium
  • Network attack detection method and apparatus, terminal device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0156] figure 1 It is a flow chart of the method for detecting a network attack according to Embodiment 1 of the method of the present invention. see figure 1 , in this embodiment, the method includes:

[0157] S1: Determine the target language from the request data according to the type of the target language.

[0158] S2: Perform lexical analysis on the target language.

[0159] S3: Perform grammatical analysis on the target language.

[0160] S4: Perform semantic analysis on the target language.

[0161] S5: Determine the risk level of the requested data according to the results of the lexical analysis, syntax analysis, and semantic analysis.

[0162] Aiming at the problems in the prior art, the present invention proposes a detection method applicable to different types of network attacks (such as SQL injection attacks, XSS attacks and PHP (Hypertext Preprocessor, a general open source scripting language) code injection attacks, etc.).

[0163] Among them, SQL injecti...

Embodiment approach 2

[0174] The method provided in this embodiment includes all the content in method embodiment 1, and details are not repeated here. In this implementation manner, the method further includes: extracting the payload data (payload) from the request data. Specifically, a specified header parameter or request body is parsed from the request data; and the header parameter or request body is decoded to obtain the payload data.

[0175] Wherein, the header parameters include a combination of one or more of the following: Request URL parameters, Referer parameters, cookie parameters and User-Agent parameters.

[0176] Taking the HTTP (HyperText Transfer Protocol, hypertext transfer protocol) protocol as an example, the HTTP header usually includes a general header, a request header, a response header, and an entity header. Each header consists of three parts: domain name, colon (:) and domain value. Among these headers, some header parameters may contain malicious attack information e...

Embodiment approach 3

[0187] The method provided in this implementation manner includes all the content in the method implementation manner 1 or the method implementation manner 2, and details are not repeated here. Such as figure 2 As shown, in this embodiment, processing S2 is realized in the following manner:

[0188] S21: Determine the lexical elements in the target language.

[0189] S22: Analyze the lexical elements by using a finite state automaton to obtain a token sequence of clauses in the target language.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network attack detection method and apparatus, a terminal device and a computer storage medium, and relates to the technical field of network security. The network attack detection method comprises the following steps: determining a target language from request data according to the type of the target language; performing morphological analysis, grammatical analysis and semantic analysis on the target language; and determining a risk level of the request data based on the results of the morphological analysis, grammatical analysis and semantic analysis. In the technical scheme provided by the invention, the target language is determined from the request data according to the type of the target language, so that the extraction operations of different types of target languages can be compatible to adapt to different detection targets, and thus the compatibility of network attack detection is improved.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically, to a network attack detection method and device, a terminal device, and a computer storage medium. Background technique [0002] In recent years, the vulnerability attack technologies for Web (network) applications have developed rapidly, with various types and patterns. Therefore, it will be a severe challenge to form effective defenses against different vulnerability attacks. [0003] Common vulnerability attacks include, for example, SQL (Structured Query Language, Structured Query Language) injection attacks, and XSS (Cross Site Scripting, cross-site scripting) attacks, etc. [0004] Among them, the SQL injection attack refers to inserting SQL commands (maliciously) into Web forms or page requests, and finally achieves the purpose of deceiving the server to execute malicious SQL commands. [0005] XSS attack refers to malicious attackers inserting mali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/27
CPCG06F40/284G06F40/30H04L63/1433H04L63/1441H04L63/1466G06F16/00G06F21/56
Inventor 刘超朱文雷李昌志吴雷
Owner 北京长亭未来科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products