Method and apparatus for processing character string, and computer-readable storage medium

A string and processor technology, applied in the field of network security, can solve problems such as security attacks are powerless, performance is prone to bottlenecks, etc.

Active Publication Date: 2018-12-04
SHANGHAI DIANRONG INFORMATION TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing IDS (Intrusion Detection Systems, intrusion detection system), IPS (Intrusion Prevention System, intrusion prevention system), WAF (Web Application Firewall, website application-level intrusion prevention system) products are often established through rule detection or supervised learning However, these methods have the following problems: through coding and other methods, the rules may be bypassed; they are helpless in the face of undisclosed security attacks; in the face of large traffic requests, the performance is easy bottleneck

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for processing character string, and computer-readable storage medium
  • Method and apparatus for processing character string, and computer-readable storage medium
  • Method and apparatus for processing character string, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Various exemplary embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems according to various embodiments of the present disclosure. It should be noted that each block in a flowchart or a block diagram may represent a module, a program segment, or a part of a code, and the module, a program segment, or a part of a code may include one or more An executable instruction for a specified logical function. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for processing a character string. The method comprises: a plurality of first valid character strings are received in a first time interval; for at least two of the plurality of first valid character strings, at least two character string models corresponding to each of the at least two first valid character strings are determined; a string model belonging to a regular character string model in the at least two character string models is determined; and model aggregation is carried out on the string model belonging to the regular character string model in the atleast two character string models to obtain an aggregated character string model set. With the method provided by the invention, the efficiency is improved; and avoidance is prevented and thus an undisclosed attack can be found.

Description

technical field [0001] Embodiments of the present invention relate to network security, and in particular to a method, device and computer-readable storage medium for processing character strings. Background technique [0002] Existing IDS (Intrusion Detection Systems, intrusion detection system), IPS (Intrusion Prevention System, intrusion prevention system), WAF (Web Application Firewall, website application-level intrusion prevention system) products are often established through rule detection or supervised learning However, these methods have the following problems: through coding and other methods, the rules may be bypassed; they are helpless in the face of undisclosed security attacks; in the face of large traffic requests, the performance is easy A bottleneck occurs. Contents of the invention [0003] In view of the above problems and other potential technical problems, one aspect of the embodiments of the present invention provides a method for processing charact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1433H04L63/1441
Inventor 陈越
Owner SHANGHAI DIANRONG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products