An attack detection method, device, electronic equipment, and storage medium
An attack detection and target detection technology, applied in the computer field, can solve problems such as incomplete rules, reduced rule availability and value, misjudgment, etc., to achieve the effect of improving accuracy, accuracy and usability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.
[0054] The embodiment of the present application discloses an attack detection method, which realizes attack detection across TCP streams, improves the accuracy and usability of rule expression, and further improves the accuracy of attack detection.
[0055] see figure 1 , a flow chart of an attack detection method shown according to an exemplary embodiment, as shown in figure 1 shown, including:
[0056] S101: Determine the detection rule corresponding to each TCP flow in the target atta...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


