A method and device for detecting network attacks based on threat intelligence
A network attack and intelligence technology, applied in the field of network security, can solve the problems of high performance consumption of network security equipment and large data volume of threat intelligence offline database, and achieve the effect of small size, less bandwidth occupation, and reduced matching pressure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] In order to solve the problem of excessive consumption of network security equipment performance due to the large amount of data in the threat intelligence offline library in the existing detection methods, this application provides a method and device for detecting network attacks based on threat intelligence.
[0063] see figure 1 , figure 1 A work flow diagram of a method for detecting network attacks based on threat intelligence provided by the embodiment of the present application. The embodiment of the present application is applied to network security devices, and includes the following steps:
[0064] Step 101 , obtaining a threat intelligence collision library delivered from the cloud, the threat intelligence collision library is a collection of first mapping results obtained after the threat intelligence keyword information in the threat intelligence is calculated by a first mapping algorithm.
[0065] In the embodiment of this application, the network securi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


