Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device, memory and processor for determining network attack type

A technology for network attack and determination method, applied in the field of network security, can solve problems such as deviation and lack of training data

Inactive Publication Date: 2021-01-08
STATE GRID ANHUI ELECTRIC POWER CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a method and device for determining the type of network attack, as well as a memory and a processor, so as to solve the problems in the related art that there may be deviations in the identification of the type of network attack manually and the lack of training data for identifying the type of network attack by machine learning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, memory and processor for determining network attack type

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0020] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0021] It should be noted that the terms "first" and "second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method, a device, a memory and a processor for determining a network attack type. The method includes: obtaining a log file uploaded by a user and a label of the log file; classifying; inputting the log file and the label corresponding to the log file as training data into a pre-configured machine learning model for training to obtain an attack corresponding to the attack type the training model; obtain the predetermined log file; respectively input the predetermined log file into multiple training models, and determine the attack type corresponding to the largest probability value as the attack type corresponding to the predetermined log file; the determined attack type Prompt to the uploader of the scheduled log file. This application solves the problems of possible deviations in the related technologies of manually identifying network attack types and the lack of training data for machine learning to identify network attack types, thereby improving the identification effect of network attack types.

Description

technical field [0001] The present application relates to network security, in particular, to a method and device for determining a network attack type, as well as a memory and a processor. Background technique [0002] In the prior art, there are various kinds of network attacks, and effective protection can be carried out only if the types of network attacks can be correctly judged. At present, the judgment of the type of network attack basically relies on manual judgment. This requires every network administrator to have rich experience, which is impossible to some extent. [0003] With the development of machine learning, many machine learning models have been open sourced. There is an important prerequisite for judging the type of network attack through machine learning. This prerequisite is the need for a large amount of training data. The training data of network attacks is generally not easy to obtain as a single administrator. Therefore, the machine learning mode...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06K9/62G06N20/00G06F16/18H04L29/06
CPCG06F21/55G06F16/1815G06N20/00H04L63/1416G06F18/214
Inventor 章昊马金辉汪伟章伟郭兴华
Owner STATE GRID ANHUI ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products