Unlock instant, AI-driven research and patent intelligence for your innovation.

Targeted attack detection method and device and computer readable storage medium

An attack detection and targeted technology, applied in the field of network security, can solve problems such as low network security assurance, and achieve the effect of ensuring network security

Active Publication Date: 2020-10-09
SANGFOR TECH INC
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a targeted attack detection method and its device and computer-readable storage medium, aiming to solve the problem of low network security protection of equipment question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Targeted attack detection method and device and computer readable storage medium
  • Targeted attack detection method and device and computer readable storage medium
  • Targeted attack detection method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0070] refer to figure 2 , figure 2 It is the first embodiment of the targeted attack detection method of the present invention, and the targeted attack detection method includes:

[0071] Step S10, obtaining the attacked information corresponding to the device;

[0072] In this embodiment, the execution subject is a targeted attack detection device. The targeted attack detection device is in communication connection with the cloud, or the targeted attack detection device is the cloud. The device is equipped with multiple security software, which can be firewall, Internet behavior management, terminal security, database security and other applications. The device can be registered on the cloud, so that the security software in the device can upload the security data to the cloud, and classify each security data as the security data corresponding to the device. Specifically, when the security software detects that the device is attacked, it generates security data and sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a targeted attack detection method. The targeted attack detection method comprises the following steps: acquiring attacked information corresponding to equipment; determining afirst attack parameter corresponding to the attacked information with the same source IP address; and according to the first attack parameter and a reference parameter, determining a target source IPaddress for performing targeted attack on the equipment from respective source IP addresses. The invention further provides a targeted attack detection device and a computer readable storage medium.According to the invention, the network security of equipment is ensured.

Description

technical field [0001] The invention relates to the field of network security, in particular to a targeted attack detection method, its device, and a computer-readable storage medium. Background technique [0002] With the development of Internet + and informatization, cyber attacks are becoming more and more common, and the threats they pose are becoming more and more serious. In order to reduce losses, enterprises have also begun to pay attention to and invest heavily in safety construction. Enterprises purchase a variety of security software with different functions according to different needs, such as firewalls, online behavior management, terminal security, database security, and so on. These softwares face a serious problem: a large number of alarm logs are generated locally, and it is difficult for security operation and maintenance personnel to deal with them one by one, and they will leave them alone as time goes by. [0003] Some security software, such as SIEM ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/709H04L45/243
CPCH04L63/1416H04L63/1466H04L63/126H04L45/245
Inventor 刘伯仲王远
Owner SANGFOR TECH INC