Data processing method, device and equipment

A data processing and data technology, applied in the Internet field, can solve problems such as inability to analyze data, determine data, and prevent botnet attacks, and achieve the effect of solving detection and defense problems.

Active Publication Date: 2019-12-17
ALIBABA GRP HLDG LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the data is encrypted by SSL (Secure Sockets Layer, Secure Sockets Layer) / TLS (Transport Layer Security, Transport Layer Security Protocol), the application layer content of the data cannot be analyzed, and it is impossible to determine whether the data is data between the CC server and the puppet host , unable to defend against botnet attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and equipment
  • Data processing method, device and equipment
  • Data processing method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The terminology used in this application is for the purpose of describing specific embodiments only, not to limit the application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0023] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be called first information. Dependin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method, device and equipment. The method comprises the steps of obtaining key information from a honeypot host; decrypting the data between the honeypot host and the server by using the key information; if the decrypted data is illegal data, determining illegal feature information by utilizing the decrypted data; and intercepting data communication betweenthe server and the puppet host by using the illegal feature information. Through the technical scheme of the invention, the problems of detection and defense of encrypted data can be solved, the encrypted data on the public cloud can be detected and defended in real time, and the purposes of real-time detection and defense are achieved.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a data processing method, device and equipment. Background technique [0002] Botnet (botnet) refers to the use of one or more means of transmission (such as active vulnerability attacks, email viruses, malicious website scripts, instant messaging software, Trojan horses, etc.) to infect a large number of hosts with Bot programs (bot programs), so that A one-to-many control network is formed between the CC (Control Command, control and command) server (that is, the attacker) and the puppet host (that is, the infected host). Among them, Botnet is a malicious Internet behavior, which can carry out DDoS (Distributed Denial of Service, Distributed Denial of Service) attack on the target website and send a large amount of spam, so it is necessary to defend against the attack of Botnet. [0003] In order to defend against botnet attacks, the application layer conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/145H04L63/1466
Inventor 李亮
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products