Method and device for monitoring network attack

A technology for monitoring network and attack characteristics, applied in the field of network security, can solve the problems of low accuracy of WEB penetration attacks, achieve the effect of improving timeliness, improving accuracy, and reducing management costs

Inactive Publication Date: 2019-09-10
北京微步在线科技有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method for monitoring network attacks, a device for monitoring network attacks; to solve the problem of low accuracy in detecting WEB penetration attacks by analyzing WEB access logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring network attack
  • Method and device for monitoring network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Below, specific embodiments of the present application will be described in detail in conjunction with the accompanying drawings, but it is not intended as a limitation of the present application.

[0041] It should be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0042] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0043] These and other characteristics of the present application will become apparent from the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for monitoring a network attack. The method comprises the following steps: acquiring HTTP access request information according to network flow mirror imageinformation; and analyzing the HTTP access request information based on the attack feature information, and obtaining operation information of the HTTP access request information according to an analysis result. Firstly, the HTTP application information extracted from the network flow mirror image information is very complete, more detectable contents can be detected, and the detection accuracy is improved. Secondly, the timeliness of detection is improved, and real-time detection can be carried out when WEB attacks occur. Thirdly, the system can judge whether the WEB attack is successful ornot according to the response content of the server, timely block and early warn the WEB attack, and prevent the situation from deteriorating. And meanwhile, the management cost is reduced.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method for monitoring network attacks and a device for monitoring network attacks. Background technique [0002] WEB penetration attacks refer to attacks by hackers targeting WEB services. At present, the main methods are: sql injection, exploiting xss vulnerabilities, exploiting csrf vulnerabilities, exploiting file upload vulnerabilities, exploiting sensitive file download vulnerabilities, and exploiting various third-party component vulnerabilities. [0003] The current way to detect WEB penetration attacks is mainly to analyze WEB access logs. First of all, the accuracy is low. The information in the WEB access log is simplified text information with a small amount of information. Some WEB penetration attacks cannot be judged only from the log. Secondly, the management cost is high. Generally, large and medium-sized enterprises have many web servers. For example,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 刘斐然
Owner 北京微步在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products