Attack detection method and device, computer equipment and storage medium

A technology of attack detection and calculation results, applied in the field of network security, can solve the problem of low attack detection accuracy and achieve high attack detection accuracy

Active Publication Date: 2019-08-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide an attack detection method, device, computer equipment and storage medium for the above-mentioned problem of low attack detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device, computer equipment and storage medium
  • Attack detection method and device, computer equipment and storage medium
  • Attack detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] It can be understood that the terms "first", "second" and the like used in the present application may be used to describe various elements herein, but unless otherwise specified, these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first ordering could be termed a second ordering, and, similarly, a second ordering could be termed a first ordering, without departing from the scope of the present application.

[0028] figure 1 It is an application environment diagram of the attack detection method provided i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attack detection method and device, computer equipment and a storage medium. The method comprises the steps of obtaining current flow information corresponding to current time; determining a target refining time period corresponding to the current time in a current flow period, wherein the current flow period is divided into a plurality of refining time periods according to a preset time granularity; obtaining target reference flow information corresponding to the target refining time period, wherein the target reference flow information is obtained through calculation according to target historical flow information of a plurality of target historical flow periods in the target refining time period, and dividing the target historical flow period is divided intoa plurality of refining time periods according to the preset time granularity; and performing attack detection according to the target reference flow information and the current flow information. Themethod is high in attack detection accuracy.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack detection method, device, computer equipment and storage medium. Background technique [0002] With the rapid development and wide application of network technology, people use the Internet to obtain information in daily life and production activities. Devices on the Internet are often subjected to network attacks, such as distributed denial of service (Distributed Denial of Service, DDOS) attacks, DDOS attacks use multiple distributed attack sources to send a large number of data packets to the target object, to consume a large amount of network resources, resulting in the failure of the device Network services are paralyzed. Traditional attack detection generally determines a fixed traffic threshold. When the access traffic exceeds the set traffic threshold, an alarm is issued. However, the access traffic is not fixed, resulting in low accuracy of attack det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 曾凡李家昌关塞聂利权陈洁远万志颖阮华于洋王伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products