Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack analysis method, network attack analysis device, computing equipment and medium

A network attack and analysis method technology, which is applied in the field of network attack analysis method and network attack analysis device, and can solve problems such as system hazards

Active Publication Date: 2020-05-15
BEIJING QIANXIN TECH +1
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the disclosed concept, the inventor found that there are at least the following problems in related technologies: the related webshell detection technology can detect that the webshell file is uploaded, if the attacker does not take further actions to trigger the malicious code in the webshell file, then The malicious code will always be stored in the victim's device as a normal file code
Therefore, when the attacker will trigger the webshell file and cause real harm to the attacked system is still unknown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack analysis method, network attack analysis device, computing equipment and medium
  • Network attack analysis method, network attack analysis device, computing equipment and medium
  • Network attack analysis method, network attack analysis device, computing equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0035] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack analysis method, a network attack analysis device, computing equipment and a medium. The method comprises the following steps: detecting a first network data flow in response to the received first network data flow to determine whether the first network data flow has a network attack file or not; if it is determined that the network attack file exists in thefirst network data stream, obtaining path information of the network attack file; and in response to receiving the request, performing attack analysis on the request to determine whether the electronic device corresponding to the path information is being attacked by the network, the request including the path information of the network attack file and the request belonging to the second networkdata flow, and the receiving time of the second network data flow being later than the receiving time of the first network data flow.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and more specifically, to a network attack analysis method, a network attack analysis device, computing equipment and a medium. Background technique [0002] With the rapid development of communication and computer technology, Internet information security has become the focus of people's increasing attention. webshell is a script attack tool for network (web) intrusion. To put it simply, webshell is a Trojan horse backdoor. After hackers invade a website, they often place these Trojan horse backdoor files in the web directory of the website server and mix them with normal web page files. Then hackers can use the web to control the website server through the Trojan horse backdoor, including uploading and downloading files, viewing databases, and executing arbitrary program commands. [0003] In the process of realizing the disclosed concept, the inventor found that there a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145
Inventor 向祖庭刘洪亮索海东谈文彬
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products