Network attack alarm threshold value configuration method and device, medium and computing device

A network attack and threshold technology, applied in the information field, can solve the problems of poor attack alarm accuracy, high cost, protocol feature matching and adjustment, etc., so as to reduce the impact of pressure, accurately adapt and guarantee, and reduce the false alarm rate and the false alarm rate. Effect

Active Publication Date: 2019-01-11
NETEASE INFORMATION TECH(BEIJING) CO LTD
View PDF12 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the number of IPs or the type of IP deployment increases, more groups need to be divided to configure fixed thresholds, which cannot be automatically matched and adjusted in real time according to business traffic fluctuations, protocol characteristics, etc.
The cost of manual operation and maintenance is high, and the accuracy of attack alarms is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack alarm threshold value configuration method and device, medium and computing device
  • Network attack alarm threshold value configuration method and device, medium and computing device
  • Network attack alarm threshold value configuration method and device, medium and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0023] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0024] According to an embodiment of the present invention, a method, medium, device and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a network attack alarm threshold value configuration method. The method comprises the steps of: recording flow information of a target node according to a set period toobtain flow historical data of the target node; and obtaining an alarm threshold value of the target node according to the flow historical data of the target node and bandwidth configuration information of the target node, wherein the alarm threshold value is configured to the target node. The method matches the alarm threshold value according to the business flow so as to reduce the manual maintenance cost, better accurately fit and guarantee fluctuation of the business flow, reduce the protection response time, reduce the pressure influence at the attack moment and effectively reduce the false alarm rate and the missing report rate of the attack alarm. Besides, the embodiment of the invention provides a network attack alarm threshold value configuration device, a medium and a computing device.

Description

technical field [0001] The present invention relates to the field of information technology, and more specifically, the present invention relates to a network attack warning threshold configuration method, medium, device and computing equipment. Background technique [0002] The threats to the security of the network information system come from many aspects. These threats can be divided into man-made threats and natural threats. Among them, man-made threats are man-made attacks on network information systems. By finding the weaknesses of the system, they can achieve the purpose of destroying, deceiving and stealing data information in an unauthorized way. There are many types and large numbers of well-designed artificial attacks. For example, Distributed Denial of Service attack (Distributed Denial of Service, referred to as DDoS) with the help of client / server technology, the combination of multiple computers as an attack platform, a congestion attack on one or more ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0803H04L41/0893H04L63/1441H04L63/1458
Inventor 邢博武
Owner NETEASE INFORMATION TECH(BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products