Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack analysis method, device, readable storage medium and computer equipment

A network attack and analysis method technology, which is applied in the field of readable storage media and computer equipment, network attack analysis methods, and devices, can solve the problems of high learning cost and the inability to intuitively see data correlation, etc., and achieve low learning cost, The effect of fast attack range and fast location of attack source

Active Publication Date: 2022-07-22
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, an object of the present invention is to propose a network attack analysis method to solve the problems of high learning cost and inability to intuitively see the relationship behind the data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack analysis method, device, readable storage medium and computer equipment
  • Network attack analysis method, device, readable storage medium and computer equipment
  • Network attack analysis method, device, readable storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0063] see figure 1 , the network attack analysis method proposed by an embodiment of the present invention includes at least steps S101-S105.

[0064] In S101, when a network attack alarm occurs, the first object entity selected by the user is read. When a user observes a suspicious event that needs to be analyzed in the daily op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack analysis method, device, readable storage medium and computer equipment. The network attack analysis method includes: when a network attack alarm occurs, reading a first object entity selected by a user; The analysis query interface analyzes the first object entity to generate first query result data, and the analysis query interface has query logic information; extracts the query result data to generate the second object entity; query through the analysis The interface analyzes the second object entity to generate second query result data; obtains the relationship between the first query result data and the second query result data, and uses the relationship diagram to connect the first object entity Connect with the second object entity, and display the relationship diagram. The present invention can solve the problem of high learning cost and inability to intuitively see the correlation behind the data in the prior art.

Description

technical field [0001] The present invention relates to the technical field of network security, and in particular, to a network attack analysis method, device, readable storage medium and computer equipment. Background technique [0002] In today's network, there are all kinds of hackers with different purposes to carry out network attacks on other individuals or enterprises on the Internet, in order to achieve their goals such as gaining interests, increasing prestige, and political intentions. In the past security incidents, enterprises have problems with the ability to perceive the lost hosts in the network, and often fail to detect attacks in the network at the first time. Hackers conduct long-term lurking within the organization, collecting information, stealing sensitive data, and even destroying them. [0003] In order to strengthen the security awareness of enterprises, more and more enterprises are currently establishing log analysis platforms. However, the curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0631H04L41/069
CPCH04L63/1416H04L41/0631H04L41/069
Inventor 罗家强范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products