Detection method for network abnormality attacks

A detection method and network anomaly technology, applied in the field of network security, can solve problems such as private protocol attack detection, and achieve the effect of solving attack detection problems, low maintenance costs, and efficient detection

Active Publication Date: 2018-05-04
宝牧科技(天津)有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, it also solves the problem of attack detection of pri...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for network abnormality attacks
  • Detection method for network abnormality attacks
  • Detection method for network abnormality attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0031] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a detection method for network abnormality attacks. Efficient detection on the network abnormality attacks is achieved by cooperatively using the steps of data marking,data mark splitting, normalization processing, data modeling, data abnormality attack judging and the like, the problems that a traditional rule-based detection method is high in maintenance cost andthreshold and needs real-time updating are solved, and meanwhile the private protocol attack detection problem which cannot be solved by existing industrial security manufactures generally is solved.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method for detecting abnormal network attacks. Background technique [0002] Under the existing technical conditions, the traditional network intrusion detection technology intercepts the data accessed by intrusion by manually maintaining the rule set. On the one hand, hard-coded rules are easily bypassed by flexible hackers, and rule sets based on previous knowledge are difficult to deal with 0-day attacks; big. Furthermore, in the industrial network, there are a large number of communication behaviors with fixed modes, such as data collection through the OPC protocol, and industrial process control using the S7 protocol. These behaviors have relatively fixed communication patterns that vary little. At present, the commonly used method in the industry is to use Deep Packet Inspection (Deep Packet Inspection), which can identify various communication behaviors, standardize no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N99/00
CPCG06N20/00H04L63/1416H04L63/1441H04L63/30
Inventor 滕建桓
Owner 宝牧科技(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products