Unknown loophole attack detection method, device, equipment and storage medium

A technology for attack detection and unknown vulnerabilities, applied in the field of network security, can solve the problems of slow response time and difficulty in matching, achieve fast response time, delay the time of successful attack, and increase the difficulty of attack

Active Publication Date: 2019-02-01
NEUSOFT CORP
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For traditional security protection technologies, attacks using unknown vulnerabilities are difficult to match
In addition, traditional security protection systems usually block attacks in real time.
[0004] Traditional security protection systems can only protect against known security threats, and cannot identify attacks with unknown attack characteristics, and need to manually develop attack signatures through attack characteristics. The response time is slow, and the attacker will immediately perceive the security protection system after the attack is blocked. The existence of the system, and the security protection system is considered in the follow-up attack actions. In addition, there is no effective defense against the system that has been attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unknown loophole attack detection method, device, equipment and storage medium
  • Unknown loophole attack detection method, device, equipment and storage medium
  • Unknown loophole attack detection method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0027] figure 1 It is a flow chart of the unknown vulnerability attack detection method provided by the embodiment of the present invention. This embodiment provides a method for detecting an unknown vulnerability attack, and the specific steps of the method are as follows:

[0028] S101. Perform attack detection on the traffic to be entered into the main server.

[0029] In this embodiment, the attack detection can adopt the detection methods in the prior ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unknown loophole attack detection method, device, equipment and storage medium. The method comprises the following steps: performing attack detection on traffic readying to enter a main server; acquiring attack source feature information when detection the attack; and then acquiring attacker traffic in the traffic readying to enter the main server according to the attacksource feature information, and distributing the attacker traffic to a honey pot server; monitoring the honey pot server in real time to acquire abnormal behavior information, wherein the abnormal behavior information is used for comparing with the real-time behavior information when the main server is in operation, thereby performing unknown loophole attack detection. Through the method providedby the invention, the attacker cannot or is hard to sense the existence of the safety protection system, the attack difficulty is greatly increased, the attack successful time is delayed, and the attack from unknown loop on the system can be effectively detected, the attacked system can be effectively detected without artificial participation, and the response time is fast.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device, equipment and storage medium for detecting an unknown vulnerability attack. Background technique [0002] With the accelerated pace of global informatization and the in-depth development of information technology, network security is becoming more and more important. It is related to national security and development, and is related to the practical interests of the broad masses of the people. It has a profound impact on politics, economy, culture, society, and military affairs. and other areas of security. [0003] The common feature of traditional security protection technologies is matching detection, which is judged by rules or feature matching, and needs to obtain known attacks or Trojan horse virus samples. For traditional security protection technologies, attacks that exploit unknown vulnerabilities are difficult to match. In addition, traditio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/1491
Inventor 金健
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products