Network attack identification method and device, computer equipment and storage medium

A network attack and identification method technology, which is applied in the field of network attack identification methods, devices, computer equipment and storage media, can solve the problems of single, inherent, and inability to track and trace network attack events, such as judging features and dimensions, and achieve the goal of improving accuracy Effect

Active Publication Date: 2020-08-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional method of determining the family of network attacks cannot accurately trace the source of network attack events due to the relatively single and inherent characteristics and dimensions of the determination

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack identification method and device, computer equipment and storage medium
  • Network attack identification method and device, computer equipment and storage medium
  • Network attack identification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0038] The network attack identification method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 110 communicates with the server 120 through the network. The network attack identification method provided by each embodiment of the present application may be executed independently by the terminal 110 or the server 120 , and may also be executed jointly by the terminal 110 and the server 120 . Among them, the server can be an independent physical server, or a server cluster or distributed system com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network attack identification method and device, computer equipment and a storage medium. The method comprises the following steps: acquiring network communication related data to be processed; screening network attack data related to a network attack event from the network communication related data, wherein the network attack data comprises attack behavior data corresponding to at least one network attack behavior occurring in the network attack event; determining network attack features corresponding to the corresponding network attack events according to the network attack data; performing classification processing on the network attack features, and outputting organization information corresponding to the network attack event, wherein the organization information is used for tracking and tracing the network attack event. By adopting the method, the identification accuracy of the organization to which the network attack belongs can be improved, and network security is guaranteed.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network attack identification method, device, computer equipment and storage medium. Background technique [0002] With the development of network technology, network security technology has emerged. Network security technology is mainly to maintain the security of computer communication networks, including the normal operation of network hardware and software, and the security of data and information exchange. In practical applications, the frequent occurrence of network attacks often poses hidden dangers to the network security of the system. In order to ensure system security, it is particularly important to identify network attacks and determine the family to which the initiator of the network attack belongs. [0003] In traditional schemes, the determination method for identifying the family of network attack behaviors usually compares the code characte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L2463/146G06F18/24
Inventor 邓真林智鑫向琦
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products