Supercharge Your Innovation With Domain-Expert AI Agents!

Attack source alarm method and system

An attack source and offensive technology, applied in the field of network security, can solve problems such as single solution capability, inability to realize group defense and group governance, and limited specific applications, so as to achieve the effect of group defense and group governance

Inactive Publication Date: 2019-12-24
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In general, the capabilities of existing solutions are relatively single, or limited to specific applications, and cannot achieve group prevention and group governance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack source alarm method and system
  • Attack source alarm method and system
  • Attack source alarm method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and therefore are only examples, rather than limiting the protection scope of the present invention.

[0035] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0036] like figure 1 As shown in FIG. 1 , it is a flow chart of the method for alerting an attack source according to Embodiment 1 of the present application. from figure 1 As can be seen from the figure, the method for alerting an attack source in this embodiment may include the following steps:

[0037] S101: Obtain a matching rule from the terminal management platform, where th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack source alarm method and a system, and the method comprises the steps: obtaining a matching rule from a terminal management platform, and the matching rule is used forthe recognition of an abnormal protocol message; identifying the current protocol message, matching the identified content with the matching rule, and judging whether the current protocol message isan abnormal protocol message; in response to the fact that the current protocol message is an abnormal protocol message, defining a sender of the abnormal protocol message as an attack source; and when the protocol message of the attack source is received again, sending warning information to the attack source, and resetting the communication connection with the intranet service. According to theattack source alarm method and the system, the matching rule is issued to the user side through the side management platform, synchronization of the matching rule of the attack source by the user sideis achieved, and then mass prevention and mass treatment of the attack source are achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack source alarm method and system. Background technique [0002] In recent years, cyber security incidents such as hacker attacks, cyber crimes, and cyber terrorism have occurred frequently, and state-level, organized, and large-scale cyber attacks are also common. Hacker attacks are developing from individuals to organizations and countries. They have strong purpose, obvious motives, and often have clear business, economic interests, or political demands. Attack methods have changed from traditional random viruses, Trojan horse infections, and network attacks to advanced How to effectively identify the source of attacks and respond in a timely manner has become a problem that cannot be ignored. The traditional intrusion detection system is based on its own rules for feature recognition, that is, it cannot be recognized beyond the coverage of the rules. At the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 杨鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More