Network attack tracing method and system, storage medium and electronic equipment

A network attack and attacker technology, applied in the field of network security, can solve the problems of complex time-consuming and labor-intensive processes, dependencies, and no solutions, and achieve the effect of improving the accuracy and efficiency of identification

Active Publication Date: 2021-03-19
CHINA CITIC BANK
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method relies on the acquired IP address of the attacker and the local threat intelligence database. There are three problems. First, the current attackers launch attacks through proxies, and the acquired IP addresses of the attackers are basically proxies. IP address; second, the local threat intelligence database relies on external sources, and the validity and authenticity of the data has not been verified, and the data is not necessarily complete. Eve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack tracing method and system, storage medium and electronic equipment
  • Network attack tracing method and system, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0021] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack tracing method and system, a storage medium and electronic equipment. The method comprises the following steps: receiving an access data flow message of a network attack sent by a server; extracting feature identification information according to the access data flow message; comparing and querying the feature identification information and the informationstored in the user information database according to a preset priority sequence to determine the identity information of the network attack, so that the technical problem of how to accurately and efficiently find the information of the network attacker in related technologies is solved, and the technical effect of improving the identification accuracy and efficiency is achieved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network attack source tracing method and system, a storage medium, and electronic equipment. Background technique [0002] In recent years, with the continuous popularization of the network, the attack techniques and attack methods used by network attackers have also developed new trends. Network security issues also require constant attention from network users and effective security measures. [0003] The existing technology finds the source of the internal attack through the existing alarm information and historical alarm information. After finding the internal source, it judges the external device connected to the internal source, and then obtains the identification IP address of the external device, that is, the IP address of the attacker. address, and then query the local threat intelligence database to obtain relevant information about the attacker base...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L2463/146
Inventor 谭杰
Owner CHINA CITIC BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products