Supercharge Your Innovation With Domain-Expert AI Agents!

A network attack detection method and device

A network attack and detection method technology, applied in the Internet field, can solve problems such as user loss, misappropriation of various user account rights, misappropriation of enterprise data, etc., and achieve high efficiency and accuracy

Active Publication Date: 2020-10-02
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, the Internet has penetrated into all aspects of people's work and life more and more, and network security issues have also received more and more attention from people; in the prior art, network security issues include attacks on databases, And cross-site scripting attacks, the former may cause database risks: brushing, dragging, and crashing databases; the risks caused by the latter include misappropriating the account rights of various users, or misappropriating corporate data, etc.; both of them will Bring huge losses to users, so it is very necessary to provide a method to detect network attacks
[0003] The inventor found in the research that the network attack detection technology in the prior art can only detect a single network attack, and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network attack detection method and device
  • A network attack detection method and device
  • A network attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack detection method and device. The method comprises the steps of receiving a website access request input by a user, wherein the website access request comprisesa uniform resource locator comprising a to-be-accessed page; carrying out data preprocessing on the uniform resource locator, thereby converting the uniform resource locator into a word vector; and calling a pre-established and trained neural network model, determining whether the website access request is a network attack or not and determining a type of the network attack according to the word vector and the neural network model. According to the embodiment of the invention, through utilization of the neural network model, more than one network attack can be detected.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a network attack detection method and device. Background technique [0002] With the development of Internet technology, the Internet has penetrated into all aspects of people's work and life more and more, and network security issues have also received more and more attention from people; in the prior art, network security issues include attacks on databases, And cross-site scripting attacks, the former may cause database risks: brushing, dragging, and crashing databases; the risks caused by the latter include misappropriating the account rights of various users, or misappropriating corporate data, etc.; both of them will It brings huge losses to users, so it is very necessary to provide a method to detect network attacks. [0003] The inventor found in the research that the network attack detection technology in the prior art can only detect a single network attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/56G06F16/955
CPCG06F16/9566G06F21/566H04L63/10H04L63/1416H04L63/1466
Inventor 李祺苏冠宇孙博文郭燕慧王方
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More