Hacker attack behavior detection method, system and related device

A hacker attack and detection method technology, applied in the field of network security, can solve the problems of low recognition rate, non-universal applicability of association rules, and high false positive rate

Active Publication Date: 2020-02-14
SANGFOR TECH INC
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the process of hacking behavior does not necessarily follow the defined association rules and the association rules do not have universal applicability, the schemes in the prior art that detect hacking behavior through association rules have high false positive rate and low recognition rate And other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hacker attack behavior detection method, system and related device
  • Hacker attack behavior detection method, system and related device
  • Hacker attack behavior detection method, system and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0059] see below figure 1 , figure 1 It is a flowchart of a method for detecting a hacker attack behavior provided by the embodiment of the present application.

[0060] Specific steps can include:

[0061] S101: Use a detection algorithm to detect suspicious behaviors in host traffic, and adjust the threat level of the host according to the danger...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hacker attack behavior detection method, and the method comprises the steps: detecting a suspicious behavior in the flow of a host through a detection algorithm, and adjusting the threat degree of the host according to the danger level of the detection algorithm which detects the suspicious behavior, wherein the danger level is set according to the characteristic intensity of the detection algorithm, and the higher the characteristic intensity is, the higher the danger level corresponding to the detection algorithm is; judging whether the threat degree is greater thana preset value; and if so, generating security alarm information about the detected hacker attack behavior. The method can improve the recognition rate of hacker attack behavior detection and reducethe false alarm rate of hacker attack behavior detection. The invention further discloses a hacker attack behavior detection system, a computer readable storage medium and a hacker attack behavior detection device, which have the above beneficial effects.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a hacker attack detection method and system, a computer-readable storage medium and a hacker attack detection device. Background technique [0002] With the continuous development of information technology, people pay more and more attention to the issue of network security. How to detect hacker attack behavior is an important topic of network security, hacker attack behavior can include: scanning behavior, blasting attack behavior and loophole exploitation behavior, etc. Among them, the scanning behavior refers to a series of investigation behaviors carried out by hackers in order to find the attack target, such as detecting the server version, detecting open ports, etc.; the blasting attack behavior refers to the hackers using a large number of user names and passwords to log in in order to obtain legal login permissions. Behavior; Vulnerability exploitation behavior ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1433
Inventor 张斌
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products