Network attack detection method, device and computer-readable storage medium

A network attack and detection method technology, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve the problems of service availability blocking, destruction, system resource consumption, etc., and achieve the effect of improving detection accuracy and efficiency

Active Publication Date: 2022-08-02
CHINA TELECOM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The DDoS attack launched by the botnet will cause serious network bandwidth congestion, consume a large amount of system resources, and interrupt service availability, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method, device and computer-readable storage medium
  • Network attack detection method, device and computer-readable storage medium
  • Network attack detection method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangement of the components and steps, the numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0030] Meanwhile, it should be understood that, for the convenience of description, the dimensions of various parts shown in the accompanying drawings are not drawn in an actual proportional relationship.

[0031] The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application or uses in any way.

[0032] Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, techniques, methods, and apparatus should be considered...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to a network attack detection method, device and computer-readable storage medium, and relates to the technical field of network integrity. The method includes: determining the relevant information of the network attacker according to the network attack detection result and the network flow information related to the network attack; determining the relevant information of the attack controller according to the relevant network flow information of the network attacker; Related information and information about the attack controller, screen out the active network attackers and active attack controllers in the blacklist to update the blacklist; perform network attack detection according to the updated blacklist.

Description

technical field [0001] The present disclosure relates to the technical field of network integrity, and in particular, to a network attack detection method, a network attack detection device, and a computer-readable storage medium. Background technique [0002] DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks and botnet black production are increasingly prevalent, and the black production model is mature. The black market can already provide DDoS services with fine-grained pricing by traffic. However, the communication of botnets is hidden, and it is difficult to find control nodes, making it difficult to effectively attack. [0003] DDoS attacks and botnets seriously threaten network and information security. DDoS attacks launched by botnets will cause serious network bandwidth congestion, massive system resource consumption, and service availability blocking. [0004] In the related art, according to a fixed blacklist, the attack detection of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1458H04L63/101
Inventor 李诗旸汪来富王帅史国水刘东鑫邓博仁张昊迪吴国威王渭清金华敏
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products