Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack processing method, device and electronic equipment

A technology of network attack and processing method, applied in the field of network attack processing method, device and electronic equipment, can solve the problem of high false alarm rate, and achieve the effect of improving work efficiency, improving efficiency and avoiding effectiveness

Active Publication Date: 2022-04-29
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the first purpose of this application is to propose a network attack processing method to solve the technical problem of high false positive rate when detecting network attacks through network traffic and network logs in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack processing method, device and electronic equipment
  • Network attack processing method, device and electronic equipment
  • Network attack processing method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0044] Aiming at the technical problem of generating a large number of false positives when alarming network attacks based on network traffic and system log methods in the prior art, the embodiment of the present application proposes a network attack processing method. By monitoring network attacks on the network end, In order to obtain the network attack information; wherein, the network attack information includes the response content of the network terminal to the network attack, and also includes the response status retur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application proposes a network attack processing method and device, wherein the method includes: obtaining network attack information by monitoring network attacks on the network end; wherein, the network attack information includes the response content of the network end to the network attack, and the response status returns value and the number of times of initiation; determine the attack success probability according to whether the response content is abnormal, the response status return value of the network terminal to the network attack and the number of network attack initiations; determine whether to deal with the network attack according to the attack success probability. Thus, the network attack information is obtained through the monitoring of the network side, and then the attack success probability is determined, and whether the network attack is effective is determined according to the attack success probability, which solves the problem of the high false alarm rate in the prior art when detecting network attacks through network traffic and network logs technical problems, improving the efficiency of network attack reporting.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a network attack processing method, device and electronic equipment. Background technique [0002] With the rapid development of Internet technology, Web services have taken up an increasingly large proportion of Internet services, so the damage of network attacks against Web services is also increasing. At present, when using network traffic and system logs to identify some common web vulnerabilities, the identified vulnerability results can be shown to security management personnel, or some alarm mechanisms can be used to remind relevant personnel. [0003] However, the web vulnerability alarm scheme based on network traffic and system logs will generate a large number of false positives, causing security managers to waste a lot of time checking whether these false positives have produced real attack effects or whether such vulnerabilities really exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1425H04L63/1441H04L63/1433
Inventor 张乐
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD