Intrusion detection method for vulnerability attack and related equipment

An intrusion detection and vulnerability technology, applied in the field of network security, can solve the problems of inability to provide vulnerability attack intrusion detection, inability to give risk tips to users who have been intruded, and achieve the effect of reducing the use of manpower and improving the network security environment.

Inactive Publication Date: 2019-02-15
HANGZHOU DPTECH TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, this application provides an intrusion detection method and related equipment for vulnerability attacks, so as to solve the problem that the intrusion detection of vulnerability attacks in the prior art cannot be given corresponding risk reminders to users who have been invaded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method for vulnerability attack and related equipment
  • Intrusion detection method for vulnerability attack and related equipment
  • Intrusion detection method for vulnerability attack and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0039] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide an intrusion detection method for vulnerability attacks and related devices. The method comprises the following steps: extracting intrusion detection information of an intrusion detection object; Matching the extracted intrusion detection information with a pre-established intrusion trace feature library; If the match is successful, promoting the intrusion detection object to have been invaded by a vulnerability attack. According to an embodiment of the present application, it is possible to solve as far as possible the problem in the prior art that a corresponding risk alert cannot be given to an invaded user due to an intrusion detection failure to provide a vulnerability attack.

Description

technical field [0001] This application relates to the field of network security, in particular to an intrusion detection method for vulnerability attacks and related equipment. Background technique [0002] Today, with the increasing popularity of the Internet, it not only brings a lot of convenience, but also brings a lot of security risks. Many criminals use system defects to carry out information theft, destruction and other activities. In this environment, network security products are applied. These products protect system security from the perspectives of discovering system vulnerabilities and preventing malicious attacks, and solve most of the common problems of vulnerability attacks. [0003] In order to prevent vulnerability attacks, it is necessary to conduct vulnerability scanning and repair vulnerabilities in time after they are discovered. There are usually two vulnerability scanning methods: the first one is manual intervention scanning, that is, manually usi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 马登耀
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products