Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack processing method and device, computer equipment and storage medium

A technology of network attack and processing method, applied in the field of network attack processing method, computer equipment and storage medium, and device, to achieve the effect of being beneficial to network security maintenance

Active Publication Date: 2020-08-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF13 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this process, only some data actively provided by the intruder can be obtained, such as the intruder’s network address, intrusion method, and software used during the intrusion, etc., which are easily modified by the intruder

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack processing method and device, computer equipment and storage medium
  • Network attack processing method and device, computer equipment and storage medium
  • Network attack processing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052]In order to make the purpose, technical solutions and advantages of the application clearer, the following will further describe the implementation of the application in detail with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0053] In this application, the terms "first" and "second" are used to distinguish the same or similar items with basically the same function and function. It should be understood that "first", "second" and "nth" There are no logical or timing dependencies, nor are there restrictions on quantity or order of execution.

[0054] Cloud technology (Cloud technology) is a general term for network technology, information technology, integration technology, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack processing method and device, computer equipment and a storage medium, and belongs to the technical field of computers. According to the method, a first virtual machine and a second virtual machine are operated, and when it is detected that the first terminal performs network attack on the virtual service system operated in the first virtual machine, the second virtual machine establishes connection with the first terminal so as to control the first terminal subsequently; the method comprises the following steps: acquiring network attack behavior data of a first terminal through a first virtual machine and a second virtual machine, and determining the target danger level of the network attack and a target data acquisition category corresponding to the target danger level based on the network attack behavior data; and actively obtaining the data corresponding to the target data acquisition category from the first terminal by applying the connection established between the second virtual machine and the first terminal, so that the information of the intruder is comprehensively and accurately acquired, the network attack can be defended and counterattack based on the information, and the network security maintenance is facilitated.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a network attack processing method, device, computer equipment and storage medium. Background technique [0002] Various network services are key services for social operations and business operations, and the systems behind them carry a large amount of key business and sensitive data. These key services and data are often coveted by various intruders, and attacks emerge in endlessly. Cyber ​​attacks will lead to the leakage of sensitive information and the destruction of key businesses, which in turn will affect social operations and business operations. [0003] At present, when dealing with network attacks, honeypot technology can be used to simulate the business logic of real applications, that is, a virtual business system can be simulated, and false information can be set in this virtual business system to trick intruders into initiating network attacks on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1441H04L63/1491
Inventor 杨韬
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products