Supercharge Your Innovation With Domain-Expert AI Agents!

Network attack detection method and device

A network attack and attack detection technology, applied in the field of network security, can solve the problems of low detection accuracy of firewall attacks, and achieve the effect of high attack detection accuracy and comprehensive information

Active Publication Date: 2019-06-28
优赛恒创科技发展(北京)有限公司 +1
View PDF8 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The access request of the terminal is detected by some form of application firewall above, but the attack detection accuracy of the above application firewall is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device
  • Network attack detection method and device
  • Network attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In order to facilitate the understanding of the technical solutions of the present invention, the following concepts are firstly introduced.

[0022] Web Application Firewall (WAF for short): Web Application Firewall is a system that provides protection for Web applications by implementing a series of security policies for HTTP / HTTPS. It is used to control access to Web applications and intercept all HTTP data or just requests that satisfy certain rules...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack detection method and device. The method comprises the following steps: acquiring a plurality of target access requests which belong to the same session and aresent to a target server by a target terminal; determining a detection feature item, and determining an access feature value of the detection feature item according to the plurality of target access requests; obtaining a target detection rule corresponding to the detection feature item; judging the access characteristic value by using a target detection rule to obtain a first attack detection result; wherein the first attack detection result is used for representing whether a network attack behavior on the same session exists or not. The multiple target access requests of the same session are detected as one group to extract the access characteristic values, and the information carried by the extracted access characteristic values is more comprehensive, so that the attack detection accuracyis higher.

Description

technical field [0001] The present invention relates to the technical field of network security, more specifically, a network attack detection method and device. Background technique [0002] On the Internet, the process of interaction between a terminal and a server may be attacked by malicious programs such as hackers. In order to ensure the security of network access, an application firewall is usually deployed on the access path between the terminal and the server, and based on the protection rules of the application firewall, attack detection and attack processing are performed on the access process. [0003] At present, there are two main forms of application firewalls: one is to use the hardware server as the main body of the firewall, which is connected to the network topology in the form of an independent device; the other is to use the cloud application firewall to modify the DNS resolution method of access requests Integrate Cloud Application Firewall into networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘铁铮
Owner 优赛恒创科技发展(北京)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More