Supercharge Your Innovation With Domain-Expert AI Agents!

Network attack detection method and device

A network attack and detection method technology, applied in the field of network security, can solve the problem of low accuracy of firewall attack detection and achieve the effect of high attack detection accuracy and comprehensive information

Active Publication Date: 2021-10-26
优赛恒创科技发展(北京)有限公司 +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The access request of the terminal is detected by some form of application firewall above, but the attack detection accuracy of the above application firewall is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device
  • Network attack detection method and device
  • Network attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In order to facilitate the understanding of the technical solutions of the present invention, the following concepts are firstly introduced.

[0022] Web Application Firewall (WAF for short): Web Application Firewall is a system that provides protection for Web applications by implementing a series of security policies for HTTP / HTTPS. It is used to control access to Web applications and intercept all HTTP data or just requests that satisfy certain rules...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network attack detection method and device, the method comprising: acquiring multiple target access requests belonging to the same session sent by a target terminal to a target server; determining detection feature items, and determining detection features according to multiple target access requests The access feature value of the item; obtain the target detection rule corresponding to the detection feature item; use the target detection rule to judge the access feature value, and obtain the first attack detection result; the first attack detection result is used to indicate whether there is a network for the same session aggressive behavior. The present invention detects and extracts access feature values ​​by taking multiple target access requests of the same session as a group, and the information carried by the extracted access feature values ​​is more comprehensive, so that the accuracy of attack detection is higher.

Description

technical field [0001] The present invention relates to the technical field of network security, more specifically, a network attack detection method and device. Background technique [0002] On the Internet, the process of interaction between a terminal and a server may be attacked by malicious programs such as hackers. In order to ensure the security of network access, an application firewall is usually deployed on the access path between the terminal and the server, and based on the protection rules of the application firewall, attack detection and attack processing are performed on the access process. [0003] At present, there are two main forms of application firewalls: one is to use the hardware server as the main body of the firewall, which is connected to the network topology in the form of an independent device; the other is to use the cloud application firewall to modify the DNS resolution method of access requests Integrate Cloud Application Firewall into networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘铁铮
Owner 优赛恒创科技发展(北京)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More