Unlock instant, AI-driven research and patent intelligence for your innovation.

A network security processing method and device

A network security and processing method technology, applied in the field of network security processing methods and devices, can solve the problems of server paralysis, network data leakage, low efficiency, etc., and achieve the effect of improving efficiency

Active Publication Date: 2021-08-31
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As the network security situation becomes more and more complex, malicious activities, abnormal attacks and other threats to network security occur from time to time. After the network is attacked, it is easy to cause problems such as network data leakage and server paralysis. Therefore, timely monitoring of network security events It is necessary to deal with
[0003] The current method of network security processing is mainly through security experts. For example, security experts detect network security incidents in the network and give corresponding solutions according to the network security incidents. This method of network security processing is efficient very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security processing method and device
  • A network security processing method and device
  • A network security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Please refer to the pattern, where the same component symbol represents the same components, the principle of this application is to illustrate in an appropriate operational environment. The following description is based on the specific embodiments of the present application exemplified, and it is not to be considered as limiting other specific embodiments that are not described herein.

[0030] In the following description, the specific embodiments of the present application will refer to the steps and symbols performed by one or more computers, unless otherwise specifically. Thus, these steps and operations will be described several times to execute by the computer, and the computer referred to herein includes an operation including a computer processing unit that represents an electronic signal representative of data in a structured type. This operation converts the data or maintains it in a location in the memory system of the computer, which can be reconfigured or in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a network security processing method and device; the method detects the network security state of the target network, and obtains the execution probability of executing a preset network security response in the network security state based on the network security mapping relationship, and the network security The mapping relationship includes the mapping relationship between the network security state and the probability of executing the preset network security response. Based on the execution probability, the state reward corresponding to the network security state is obtained, and based on the obtained state reward, the current state reward corresponding to the network security state is calculated. is the target probability of the maximum value, the network security mapping relationship is updated based on the target probability, and the updated network security mapping relationship is obtained. The solution can improve the efficiency of network security processing.

Description

Technical field [0001] The present application relates to the field of computer technology, and more particularly to a network security treatment method and apparatus. Background technique [0002] Since the network security situation has become more complex, malicious activity, abnormal attacks, etc. occurs, after the network is attacked, it is easy to cause network data disclosure, server paralysis, etc., therefore, timely network security events It is necessary to handle it. [0003] The method currently processed by network security is mainly through security experts, such as security experts to detect network security events in the network, and give corresponding solutions according to network security events, this network security process method efficiency Low. Inventive content [0004] The present application provides a network security processing method and apparatus to improve the efficiency of network security processing. [0005] The present application provides a ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 毛婷伟梁玉洪春华
Owner TENCENT TECH (SHENZHEN) CO LTD