Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious attack detection method, system and device based on cloud WAF and medium

A malicious attack and detection method technology, applied in the field of network security, can solve the problems of high maintenance cost, high false negative rate, high false negative rate and high false negative rate, achieve good feasibility, reduce false positive rate and false negative rate, The effect of high accuracy

Pending Publication Date: 2020-08-11
UCLOUD TECH CO LTD
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both of these methods apply technical measures such as rule protection and signature codes, and there are problems such as high false negative rate, high false positive rate, and high maintenance cost.
The above methods not only do not have a retraining mechanism, which leads to a decline in model accuracy over time, but also require constant update and maintenance of the rule base, resulting in low performance and high false negative rates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious attack detection method, system and device based on cloud WAF and medium
  • Malicious attack detection method, system and device based on cloud WAF and medium
  • Malicious attack detection method, system and device based on cloud WAF and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the purpose and technical solutions of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the described embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0072] According to an embodiment of the present invention, an embodiment of a cloud WAF-based malicious attack detection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network security, in particular to a malicious attack detection method, system and device based on cloud WAF and a medium. The malicious attack detection method based on the cloud WAF comprises the steps: after an access request for a service line source station is received, performing parameter extraction on the access request; judging whether the access request is abnormal or not based on an HMM model; if the access request is abnormal, judging whether the access request is an attack based on an SVM classifier; if so, intercepting the access request. According to the invention, the HMM model is suitable for processing continuous dynamic signals, and the excellent time sequence modeling capability of the HMM model is organically combined with the extremely strong dichotomy capability of the SVM classifier under the condition of small samples; a re-training mechanism is added, so that model attenuation is effectively slowed down, the robustness isgood, the behavior of bypassing detection can be effectively prevented, the high accuracy is ensured, and the method has the advantages of lower missing report rate and false alarm rate and cost saving.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a cloud WAF-based malicious attack detection method, system, device and medium. Background technique [0002] With the rapid development of Internet technology, the Web has been widely used in enterprise informatization, e-commerce, and e-government affairs. While the Internet brings us convenience and efficiency, network security issues have become increasingly prominent; Attacks and damages continue to grow. According to statistics from Goldman Sachs, 75% of attacks are aimed at Web applications; however, many companies have not fully understood and prepared for this, and many developers have no experience. This gives hackers Once these attacks are successful, they will cause great harm to individuals or enterprises, such as information leakage, illegal transfer, server paralysis, etc. Therefore, how to quickly and accurately detect potential malicious Web attacks has be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416G06F18/2411G06F18/2415
Inventor 刘庭辉
Owner UCLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products