A network attack source tracing method, device and system
A network attack and network connection technology, applied in the field of network attack traceability, can solve the problem that the server is difficult to implement the network attack traceability plan, and achieve the effect of ensuring smooth execution
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0070] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0071] refer to Figure 1-2 , the embodiment of the present application provides a network attack source tracing method applied to a server, including:
[0072] S1. According to the preset server pressure detection method, detect the current server pressure on the server in real time, and judge whether the current server pressure is greater than the preset pressure threshold;
[0073] S2. If the current server pressure is greater than the preset pressure threshold, the preset first network attack source tracing strategy is adopted in real time to perform the first attack s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


