Unlock instant, AI-driven research and patent intelligence for your innovation.

A network attack detection method and device

A network attack and detection method technology, applied in the field of information security, can solve problems such as difficulty in resisting intrusion attacks, heavy workload of website developers, etc., and achieve the effect of improving accuracy

Active Publication Date: 2021-12-14
北京丁牛科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional detection and defense model is mainly based on regular expression pattern matching, but it is difficult to defend against constantly updated intrusion attacks only by relying on sensitive word matching. It is a heavy workload for website developers to constantly replace new detection and defense methods. In terms of time, it is difficult to make timely detection and protection strategies based on emerging attack methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network attack detection method and device
  • A network attack detection method and device
  • A network attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0036] In order to make it easier for those skilled in the art to understand the technical solutions provided by the embodiments of the present application, the technical environment in which the technical solutions are implemented is first described below.

[0037] In the actual network environment, attackers are constantly changing attack methods to break through existing defense mea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a network attack detection method and device. Including: acquiring website requests; using a machine learning model component to determine whether the website request belongs to the first attack type; the machine learning model component using a first number of first website request samples belonging to the first attack type from the first Two numbers of second website request sample sets belonging to the second attack type are acquired through transfer learning. Using the method of the embodiment adopted in the present disclosure, some parameters calculated through the second website request sample set can have a correction effect on the first website request sample set, so as to improve the accuracy of the machine learning model component.

Description

technical field [0001] The present disclosure relates to the technical field of information security, in particular to a network attack detection method and device. Background technique [0002] With the continuous development of the Internet and big data, the network has penetrated into all areas of people's lives and has gradually become an irreplaceable role. Massive, changing, and blowout-growing data can continue to be integrated into people's daily life through the network, bringing great convenience to people's life. But at the same time, driven by interests, some network attackers often use the network for personal gain, causing economic losses to network users, affecting the normal operation of the company, and even causing social management chaos. Therefore, detecting and blocking attackers' malicious requests when users submit requests has become an important measure to protect website security. [0003] The network attack detection method in the related art mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06K9/62
CPCH04L63/1408H04L67/02G06F18/24
Inventor 甘蕊灵王忠儒姜海余伟强
Owner 北京丁牛科技有限公司