Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack event processing method and electronic equipment thereof

A processing method and network attack technology, applied in the field of network security, can solve problems such as lack of rapid linkage, and achieve the effect of reducing capability requirements and improving processing efficiency

Pending Publication Date: 2019-12-27
国网思极网安科技(北京)有限公司 +2
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to propose a method for processing network attack events and its electronic equipment, which can solve the problems of separate management of each security equipment and lack of fast linkage in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack event processing method and electronic equipment thereof
  • Network attack event processing method and electronic equipment thereof
  • Network attack event processing method and electronic equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to specific embodiments and drawings.

[0050] It should be noted that all the expressions using "first" and "second" in the embodiments of the present invention are used to distinguish two entities with the same name but not the same or parameters that are not the same, as shown in "first" and "second" Only for the convenience of presentation, it should not be understood as a limitation to the embodiments of the present invention, and subsequent embodiments will not describe this one by one.

[0051] Based on the foregoing objective, the first aspect of the embodiments of the present invention proposes an embodiment of a method for processing a network attack event. Such as figure 1 As shown, it is a schematic flowchart of an embodiment of a method for processing a network attack event provided ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack event processing method and electronic equipment thereof. Specifically, the processing method comprises the steps of obtaining first alarm data of safety equipment in a to-be-monitored network and storing the first alarm data in a database, the first alarm data being based on a network attack event; when any set condition is met, statistical analysis is conducted on the first alarm data based on the dimension, and a statistical analysis result is obtained; and executing a processing operation according to the statistical analysis result. According to the technical scheme of the invention, the barrier between safety equipment is broken; according to the method, the network attack event can be processed in a targeted manner based on the statistical analysis result without manual communication, so that the requirement on the capability of identifying and analyzing the alarm data by monitoring personnel is reduced, the time for transmitting messagesand communicating is greatly saved, and the processing efficiency of the network attack event is remarkably improved.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to a method for processing a network attack event and its electronic equipment. Background technique [0002] As the Internet continues to popularize and applications continue to deepen, the scope of the Internet's influence on people continues to grow in both breadth and depth. Corresponding network security incidents are also emerging in an endless stream. Distributed denial of service attacks (DDoS attacks), man-in-the-middle attacks, malware, phishing attacks, ransomware and other attack methods will not only cause significant economic losses to people, but also in medical treatment. Sensitive areas such as transportation and transportation will also affect people’s lives and even cause serious damage to the country’s strategic critical infrastructure. [0003] In order to cope with the current situation, a large number of security devices are deployed by enterprises in diffe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L41/142H04L63/1416H04L63/1458
Inventor 刘圣龙李祉岐王利斌尹琴杨阳王秋明李宁刘晓蕾宋洁焦腾霍钰冯磊任磊
Owner 国网思极网安科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products