Network attack detection method, device and equipment and storage medium

A network attack and detection method technology, applied in the network field, can solve problems such as poor accuracy of network attacks

Inactive Publication Date: 2019-06-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a network attack detection method, device, equipment and st

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method, device and equipment and storage medium
  • Network attack detection method, device and equipment and storage medium
  • Network attack detection method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0070] The terminology of this application is briefly introduced as follows:

[0071] Distributed Denial of Service (full name: Distributed Denial of Service, abbreviation: DDoS) attack is a network attack method used to paralyze the server. The essence of a DDoS attack is to use a distributed client to initiate a large number of seemingly legitimate requests to the server, thereby consuming or occupying a large amount of resources of the server for a long time, so that the server refuses to provide services to legitimate users. There are many types of DDoS attacks, which can be mainly divided into two types: resource consumption type and bandwidth congestion type. Resource-consuming DDoS attacks refer to using reasonable service requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack detection method, device and equipment and a storage medium, and belongs to the technical field of networks. The invention provides a scheme for detecting a network attack based on multi-dimensional features. An integrated learning mode is adopted. Through the multiple classification models, whether the data flow is abnormal or not is judged according to the features of the multiple dimensions, then the classification results of the multiple dimensions are summarized to comprehensively judge whether the network attack occurs or not, the considered features are more diversified, the method can adapt to diversified service forms of an existing network, and the accuracy of detecting the network attack is improved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a network attack detection method, device, equipment and storage medium. Background technique [0002] With the development of network technology, incidents of network attacks on the Internet are becoming more and more frequent. Network attacks cause problems such as slow access and connection interruptions on the server, resulting in the failure of the server to provide services normally. Therefore, it is necessary to detect network attacks in time to deal with them. and defend against cyber attacks. [0003] At present, the process of network attack detection is usually: manually setting the traffic threshold based on experience, and pre-store the traffic threshold in the computer device. During the operation of the current network, the computer equipment will obtain the data flow sent to the server, count the flow of the data flow, and compare the flow with the flow threshol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06K9/62
Inventor 邓之珺陈虎
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products