Network abnormal data detection method and device, computer equipment and storage medium

A network anomaly and data technology, applied in the computer field, can solve problems such as low processing efficiency, missed reports of network attacks, false positives, etc.

Active Publication Date: 2018-07-06
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned detection methods have low processing efficiency, and it is easy f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network abnormal data detection method and device, computer equipment and storage medium
  • Network abnormal data detection method and device, computer equipment and storage medium
  • Network abnormal data detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0053] The network abnormal data detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the server communicates with the client through the network. The client initiates a network access request to the server, the server receives the access request data sent by the client, and the server searches for the corresponding user's historical access request data according to the user session identifier in the received access request data. The server performs word segmentation processing on the header strin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application relates to a network abnormal data detection method and system, computer equipment and a storage medium. The method comprises the following steps: receiving access request data sent bya client; searching for historical access request data corresponding to a user session identifier in the access request data; acquiring a header string of the access request data; performing word segmentation processing on the header string according to a preset step length to obtain a participle set; acquiring a participle weight matrix according to the historical access request data and the participle set; inputting the participle weight matrix into an abnormal data detection model to obtain data abnormal probability; and judging whether abnormal data exist in the header string or not according to the data abnormal probability. Through adoption of the method, the problems of missing and false reporting of network attacks in a website attack detection process can be avoided.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device, computer equipment and storage medium for detecting abnormal network data. Background technique [0002] While the rapid development of the Internet has brought great convenience to people's lives, it has also brought new network security challenges. Websites will inevitably suffer malicious intrusions or attacks, and people's property and information security will be threatened. Today's network Safety issues have attracted people's attention. Most of the current website attack threat analysis and detection methods and systems are based on network log analysis, and the log data is converted into structured data for storage, and character matching is performed based on specific rules. However, the above-mentioned detection methods have low processing efficiency, and it is easy for attackers to find matching rules, resulting in missed and false positives of net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F17/27G06F21/55
CPCH04L63/1425H04L67/146G06F21/55G06F40/216G06F40/289G06F16/90344H04L69/40H04L69/22H04L67/535H04L67/01
Inventor 周圣龙
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products