Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protection method and device based on artificial intelligence, and electronic equipment

A technology of network security and artificial intelligence, applied in the direction of data exchange network, electrical components, digital transmission system, etc., can solve the problems of content detection technology loss, great harm, and low attack cost

Active Publication Date: 2020-05-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Hypertext Transfer Protocol (HTTP, Hypertext Transfer Protocol) in the related technology uses clear text to transmit information, which has the risk of being eavesdropped and tampered with. The HTTP (HTTPS, Hyper TextTransfer Protocol over SecureSocket Layer) based on the secure socket layer is developed based on HTTP. Encrypted information interaction using the secure socket layer provides identity verification, information confidentiality and integrity verification functions. With the enhancement of user security requirements and some policy mandatory requirements, more and more networks The service actively or passively switches its own service from HTTP to HTTPS to bring higher security to data transmission, and at the same time, it also gives hackers an opportunity. The HTTPS protocol transmits encrypted messages on the network. Due to the huge resource consumption of processing HTTPS connections, the attack cost is relatively low, but the damage is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and device based on artificial intelligence, and electronic equipment
  • Network security protection method and device based on artificial intelligence, and electronic equipment
  • Network security protection method and device based on artificial intelligence, and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings, and the described embodiments should not be considered as limiting the present invention, and those of ordinary skill in the art do not make any All other embodiments obtained under the premise of creative labor belong to the protection scope of the present invention.

[0081] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0082] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security protection method and device based on artificial intelligence, electronic equipment and a computer readable storage medium. The method comprises the steps ofobtaining to-be-protected access traffic for a target network address; for a plurality of sessions included in the to-be-protected access traffic, extracting a data statistical feature of each session; extracting hidden layer features from the data statistical features of each session through a neural network model, so as to carry out normal or abnormal classification processing on each session based on the hidden layer features; identifying the session classified as abnormal in the to-be-protected access traffic as attack access traffic; and shielding the attack access traffic for the targetnetwork address based on the source address of the attack access traffic. Through adoption of the method and the device, the encrypted attack traffic and the unencrypted attack traffic can be identified and cleaned.

Description

technical field [0001] The present invention relates to artificial intelligence and network technology, in particular to an artificial intelligence-based network security protection method, device, electronic equipment and computer-readable storage medium. Background technique [0002] Artificial Intelligence (AI) is a theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the best results. [0003] The Hypertext Transfer Protocol (HTTP, Hypertext Transfer Protocol) in the related technology uses clear text to transmit information, which has the risk of being eavesdropped and tampered with. The HTTP (HTTPS, Hyper TextTransfer Protocol over SecureSocket Layer) based on the secure socket layer is developed based on HTTP. Using the secure socket layer for encrypted information interaction pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/851G06N20/00
CPCH04L63/1416H04L63/1425G06N20/00H04L47/2441H04L47/2483G06N3/08H04L49/208H04L45/08H04L45/72G06N3/047G06N3/045
Inventor 彭晨晨陈国
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products