Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device, computing equipment and medium

A data processing and attacker technology, which is applied in the field of network security, can solve problems such as the difficulty of finding the same attacker, the inability to analyze the attacker, and the inability to form a comprehensive understanding of the attacker or the attacker group.

Active Publication Date: 2019-05-07
BEIJING QIANXIN TECH
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology has little knowledge of the attackers of network attacks, and cannot form a more comprehensive understanding of specific attackers or attacker groups, mainly relying on manual data collection for analysis
The difficulty in analyzing attackers is that the attackers are often only known with fragments of information, and it is difficult to find the behavior records of the same attacker from a large amount of data, and it is impossible to further analyze the attackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, computing equipment and medium
  • Data processing method and device, computing equipment and medium
  • Data processing method and device, computing equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0032] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method and device, computing equipment and a medium, the data processing method is used for analyzing a network attacker, and the method comprises the following steps: obtaining attack alarm information; Obtaining associated information of an attacker corresponding to the attack alarm information based on the attack alarm information; Acquiring feature information of the associated information of the attacker; And obtaining the portrait of the attacker based on the feature information of the associated information of the attacker.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and more specifically, to a data processing method, device, computing device and medium. Background technique [0002] Network attack refers to the attack on the hardware, software and data in the network system by using the loopholes and security flaws in the network. [0003] The existing technology has little knowledge of the attackers of network attacks, and cannot form a more comprehensive understanding of specific attackers or groups of attackers, and mainly relies on manual data collection for analysis. The difficulty in analyzing attackers is that the attackers are often only known in fragments of some information, and it is difficult to find the behavior records of the same attacker from a large amount of data, and it is impossible to further analyze the attackers. Contents of the invention [0004] In view of this, the present disclosure provides a data processing m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
Inventor 林子翔叶盛
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products