Host IP address conversion method and device, computer equipment and storage medium
An IP address and conversion method technology, applied in the field of network security, can solve the problem of unable to locate the source of the attack, unable to obtain the IP information of the attacker, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.
[0034] The method, device, computer equipment, and storage medium for converting a host IP address in the embodiments of the present application are described below with reference to the accompanying drawings.
[0035] Network-based security detection technology is one of the most common security detection technologies. When analyzing security events through the network, some of the most critical basic elements include IP information such as source IP and destination IP, which are the core data for judging attackers and atta...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


