Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack defense method and device and electronic bidding and tendering transaction platform

A network attack and trading platform technology, applied in electrical components, transmission systems, etc., can solve the problem of network firewalls that are difficult to adapt to rapidly changing assault penetration attacks.

Pending Publication Date: 2021-04-23
国家能源集团国际工程咨询有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present invention provides a network attack defense method, device, and electronic bidding transaction platform, which solves the problem that the existing network firewalls are difficult to adapt to rapidly changing surprise penetration attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack defense method and device and electronic bidding and tendering transaction platform
  • Network attack defense method and device and electronic bidding and tendering transaction platform
  • Network attack defense method and device and electronic bidding and tendering transaction platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1 Shown is a schematic flowchart of a network attack defense method provided by an embodiment of the present invention.

[0054] refer to figure 1 , this embodiment provides a network attack defense method, the network attack defense method comprising:

[0055] Step S01: Collect and analyze network access logs. Collect the original access log text of the network, and parse the access log. The parsed access log has structured data grouped by user IP.

[0056] Step S02: Input the analysis results into the behavior evaluation model, and obtain the first behavior characteristic probabilities of different behavior characteristics of each user based on the analysis results. Wherein, before inputting the analysis results into the behavior evaluation model, the behavior evaluation model needs to be established. Optionally, the method for establishing the behavior evaluation model includes: summarizing the first behavior characteristic probabilities of all the target u...

Embodiment 2

[0071] figure 2 Shown is a schematic structural diagram of a network attack defense device provided by an embodiment of the present invention.

[0072] refer to figure 2 In one embodiment of the present invention, a network attack defense device 100 is provided, and the network attack defense device 100 includes: a collection and analysis module 10 , a behavior determination module 20 and a defense module 30 . Wherein, the function of collection and analysis module 10 is to collect and analyze the network access log; the function of behavior determination module 20 is to input the analysis results into the behavior evaluation model, and obtain the first behavior characteristics of different behavior characteristics of each user based on the analysis results respectively. Probability; obtain the second behavior characteristic probability of the user based on all the first behavior characteristic probabilities of the same user; identify the target user based on the second beh...

Embodiment 3

[0077] This embodiment provides an electronic bidding and bidding transaction platform, and the electronic bidding and bidding trading platform adopts the network attack defense method described in one of the above embodiments to defend against network attacks. Specifically, the steps are as follows:

[0078] Step 1: collecting and analyzing the access logs of the electronic bidding trading platform;

[0079] Step 2: Input the analysis results into the behavior evaluation model, and obtain the first behavior characteristic probabilities of different behavior characteristics of each user based on the analysis results;

[0080] Step 3: Obtain the second behavior characteristic probability of the user based on all the first behavior characteristic probabilities of the same user;

[0081] Step 4: Identify the target user based on the probability of the second behavior characteristic, and prohibit the target user from accessing the electronic bidding trading platform.

[0082] Wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack defense method, a network attack defense device and an electronic bid inviting and tendering transaction platform, and solves the problem that the existing network firewall is difficult to adapt to rapidly changing assault penetration type attacks. The network attack defense method comprises the following steps: acquiring and analyzing a network access log; inputting an analysis result into a behavior evaluation model, and obtaining a first behavior characteristic probability of different behavior characteristics of each user based on the analysis result; obtaining a second behavior characteristic probability of the user based on all the first behavior characteristic probabilities of the same user; identifying a target user based on the second behavior characteristic probability, and prohibiting the target user from accessing the network.

Description

technical field [0001] The invention relates to the technical field of network defense, in particular to a network attack defense method, device and electronic bidding transaction platform. Background technique [0002] Most of the existing network defense methods extract feature rules from information representations, and then use rules to filter requests for defense. Although they can play a certain role in security protection, they are only defense against conventional attack methods. Due to the high cost of rules and the long rule update cycle, it is difficult to adapt to the rapidly changing surprise and penetration attacks. Contents of the invention [0003] In view of this, the present invention provides a network attack defense method, device and electronic bidding trading platform, which solves the problem that existing network firewalls are difficult to adapt to rapidly changing surprise penetration attacks. [0004] A network attack defense method provided by a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/1425Y04S40/20
Inventor 严蕾江静陈建
Owner 国家能源集团国际工程咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products