Data processing method and device

An illegal and characteristic parameter technology, applied in the field of data processing, can solve problems such as reducing communication efficiency, increasing client uplink traffic, and increasing information redundancy

Active Publication Date: 2019-05-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of computer technology, communication through computer network has become the most mainstream communication method. However, in the process of communication, the security of communication information is also greatly threatened. Therefore, the communication system Security protection capabilities put forward higher requirements
[0003] In the prior art, if you want to filter the communication information, you need to modify the code of the client so that the information sent by the client carries a specific watermark field, and then combine the protection end to intercept the bad information carrying the illegal watermark field to achieve The purpose of protecting the communication system, but the technology based on the watermark field will increase the redundancy of the information sent by the client, which will increase the upstream traffic of the client and reduce the communication efficiency; and because the client needs to be modified, it can have Protection effect, so it also increases the limitation of the protection range

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] See figure 1 , figure 1 It is a schematic diagram of the deployment of a protection system provided by the embodiment of the present invention. like figure 1 As shown, the architecture includes attack detection system, control system, protection system, core router, core network management, server and Internet network. Wherein, the Internet network may be provided by an Internet provider. The steps for performing network protection through the various sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method and device, and the method comprises the steps: obtaining all sessions between a target protection object and a plurality of communication objects when detecting that the target protection object is in an attacked state; obtaining a message set associated with all sessions, and determining session characteristic parameters of eachsession according to the message set; inputting the session characteristic parameters of each session into an identification model, and determining a session type of each session based on the identification model; determining a communication object type of each communication object in the plurality of communication objects according to the session type of each session; and determining the communication object of the illegal type as an illegal communication object, adding the illegal communication object to the blacklist, and discarding the session corresponding to the illegal communication object. By adopting the embodiment of the invention, the security of the communication information can be improved, so that the stability of a communication system is ensured, and meanwhile, the type range of the protected client can be expanded.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a data processing method and device. Background technique [0002] With the continuous development of computer technology, communication through computer network has become the most mainstream communication method. However, in the process of communication, the security of communication information is also greatly threatened. Therefore, the communication system The security protection capability puts forward higher requirements. [0003] In the prior art, if you want to filter the communication information, you need to modify the code of the client so that the information sent by the client carries a specific watermark field, and then combine the protection end to intercept the bad information carrying the illegal watermark field to achieve The purpose of protecting the communication system, but the technology based on the watermark field will increase the redunda...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/08G06N3/04
Inventor 陈国
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products