Network attack tracking method and device, electronic device and readable storage medium

A network attack and pre-storage technology, applied in the field of network communication, can solve problems such as incomplete analysis and poor effect

Active Publication Date: 2020-02-21
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present application is to provide a network attack tracking method, device, electronic equipment and readable storage medium, which is used to improve the existing technology that the data used for network attack analysis is less and the analysis is not comprehensive and the effect is not good. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack tracking method and device, electronic device and readable storage medium
  • Network attack tracking method and device, electronic device and readable storage medium
  • Network attack tracking method and device, electronic device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of the present application.

[0045]The embodim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack tracking method and device, an electronic device and a readable storage medium, and relates to the field of network communication. The method comprises the following steps of receiving a tracking request of a user, wherein the tracking request comprises a tracking parameter; searching a network attack event related to the tracking parameter in the pre-storednetwork data according to the tracking parameter; and performing cross analysis on the network attack event and the support data to obtain the description information of the network attack, wherein the support data is the analysis data related to the network attack except the network data. According to the scheme, the network attack event related to the tracking parameter is firstly retrieved byusing the network data, and then the cross data is performed with other support data related to the network attack, so that the data sources participating in the network attack analysis are more, andmore comprehensive analysis of the network attack can be realized.

Description

technical field [0001] The present application relates to the field of network communication, in particular, to a network attack tracking method, device, electronic equipment and readable storage medium. Background technique [0002] In recent years, with the rapid development of the Internet network, the information based on the Internet has also increased in a blowout state, and a lot of illegal information has also been mixed in it and continues to grow. [0003] In order to track these illegal information, the current method is to analyze directly based on the original traffic data, but in this case, it can only analyze which data in the original traffic data is abnormal data, and the analysis of network attacks is not comprehensive, and the analysis effect not good. Contents of the invention [0004] The purpose of the embodiments of the present application is to provide a network attack tracking method, device, electronic equipment and readable storage medium, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441
Inventor 姚善杨圣峰
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products