Targeted attack detection method and device and computer readable storage medium
An attack detection and targeted technology, applied in the field of network security, can solve problems such as low network security assurance, and achieve the effect of ensuring network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0070] refer to figure 2 , figure 2 It is the first embodiment of the targeted attack detection method of the present invention, and the targeted attack detection method includes:
[0071] Step S10, obtaining the attacked information corresponding to the device;
[0072] In this embodiment, the execution subject is a targeted attack detection device. The targeted attack detection device is in communication connection with the cloud, or the targeted attack detection device is the cloud. The device is equipped with multiple security software, which can be firewall, Internet behavior management, terminal security, database security and other applications. The device can be registered on the cloud, so that the security software in the device can upload the security data to the cloud, and classify each security data as the security data corresponding to the device. Specifically, when the security software detects that the device is attacked, it generates security data and sen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


