Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack detection method and device, storage medium and computer device

A network attack and detection method technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as attacks, failure to detect network attacks, and inability to process normal requests, so as to improve defense capabilities and improve detection and identification capabilities.

Active Publication Date: 2019-07-30
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, with the development of technology, there are currently incidents of network attacks through multiple different IPs
For example, an attacker who launches a CC attack can modify the IP multiple times, and send a page request (a type of access request) that takes up a lot of processing resources and time to the website server through different IPs to access the URI of the website server, causing the website server to process resources. Waste, the website server CPU is in 100% usage state for a long time, so the CPU has no way to process normal requests from legitimate users
[0005] It can be seen that the attacker can access the attacked URI through multiple different IPs, and the number of visits to the URI by each IP will not exceed the threshold, which makes it impossible for existing network attack detection technologies to detect such attacks. Network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device, storage medium and computer device
  • Network attack detection method and device, storage medium and computer device
  • Network attack detection method and device, storage medium and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0045] The embodiment of the present invention provides a network attack detection method, such as figure 1 As shown, the method may include the following steps:

[0046] S100. Determine the visiting party whose number of URIs visited within a preset time period is lower than the preset number;

[0047] Optionally, technicians can set a preset time period according to actual detection needs. In practical applications, the number ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack detection method and device, a storage medium and a computer device. The method comprises the following steps: determining an access party of which the numberof uniform resource identifiers URIs accessed in a preset time period is lower than a preset number; for each URI of the determined at least one URI accessed by the access party: determining the number of access parties accessing the URI in the preset time period, when the number of the access parties exceeds a first threshold value; and obtaining an access information group carried by each accessrequest accessing the URI in the preset time period, determining the access information group with the highest occurrence frequency in each access request as a high-risk access information group, anddetermining the access request carrying the high-risk access information group and accessing the URI as a network attack. According to the method and the device, the detection and recognition capabilities of network attacks can be effectively improved, and the defense capability of the network attacks is improved.

Description

technical field [0001] The invention relates to the field of network security protection, in particular to a network attack detection method, equipment, storage medium and computer equipment. Background technique [0002] With the development of science and technology, network security has become particularly important, and current website servers are often subject to various illegal attacks. CC (Challenge Collapsar, challenge black hole) attack is one of the common attack behaviors. CC attack is a kind of DDoS (Distributed Denial of Service, Distributed Denial of Service). CC attack continuously sends access requests to the website server through access URI (Uniform Resource Identifier, Uniform Resource Identifier), so that the website server cannot handle legitimate users for normal users. Access to network resources, thereby forming the purpose of denial of service. [0003] Existing network attack detection technologies detect network attacks by counting the number of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1458
Inventor 王巍巍殷昊
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD