Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting network attack by traffic

A network attack and traffic detection technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as complex attack technology, unrecognizable immediately, national infrastructure network facilities and important information system security threats, etc. The method is simple, reliable and fast Identify the effect of the network

Inactive Publication Date: 2018-06-05
HUBEI GENSTON INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These new-stage network security threats have the characteristics of continuous attack process, complex attack techniques, sophisticated attack methods, concealed attack behavior, huge attack resources, and precise attack targets, which pose a serious threat to the security of national infrastructure network facilities and important information systems.
[0003] The current method of identifying network attacks is mainly based on previous experience, that is, the information code that was originally confirmed to be a network attack can only be confirmed after it appears repeatedly, and the new attack information code cannot be confirmed immediately.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The features and technical effects of the technical solution of the present invention are described in detail below. The present invention proposes an advanced network attack detection and analysis method and system based on inducement analysis to perform network attack behavior step and purpose analysis.

[0010] A method for detecting and analyzing network attacks includes the following steps:

[0011] A method for detecting network attacks through traffic, including the following steps:

[0012] Deploy a network traffic analyzer in series on the Internet link of the protected network. The traffic analyzer monitors the size of all network packet traffic and obtains the original network traffic data; the same traffic network packet appears ten times in less than 5 seconds The above is confirmed as a network attack.

[0013] Furthermore, for the confirmation of the network attack, the traffic analyzer issues an instruction to disconnect the network and the host for 1 second, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting a network attack by traffic, which comprises the following steps of: deploying network traffic analyzers in series on an internet connection link of a protected network, monitoring sizes of traffic of all network messages by the traffic analyzers, and obtaining original network traffic data; and when the same traffic network message appears by more than ten times in less than 5 seconds, determining the traffic network as the network attack. The method has the advantage that the network attack can be rapidly identified.

Description

Technical field [0001] The invention relates to a method for detecting network attacks through flow. Background technique [0002] With the popularization of the Internet, network information security has become more and more important, and network information security has also become an important research field that has attracted much attention. Due to the flaws in the design of the Internet itself and its openness, it is extremely vulnerable to attacks. With the emergence of "Stuxnet", "DUQU", "Flame" and other super cyber weapon viruses, cyberspace security has entered a higher-level cybersecurity technology confrontation stage. These new-stage cyber security threats have the characteristics of continuous attack process, complex attack techniques, sophisticated attack methods, concealed attack behaviors, huge attack resources, and precise attack targets. They pose a serious threat to the security of national infrastructure network facilities and important information system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408
Inventor 云峰
Owner HUBEI GENSTON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products