Network attack state identification method, device, equipment and computer-readable storage medium
A network attack and state identification technology, applied in the field of network security, can solve the problems of increasing the number of flow tables of traffic guiding devices, wasting manpower and physics, and increasing the load of security equipment, and achieves the effect of reducing manpower and load.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] figure 1 It is a flow chart of the network attack state identification method proposed in the first embodiment.
[0033] In this embodiment, the method for identifying the network attack state can be applied to a computer device. For a computer device that needs to identify a network attack state, the method for network attack state provided by the method of the present invention can be directly integrated on the computer device. The identified function may be run on a computer device in the form of a software development kit (Software Development Kit, SDK).
[0034] Such as figure 1 As shown, the network attack state identification method specifically includes the following steps. According to different requirements, the order of the steps in the flow chart can be changed, and some steps can be omitted.
[0035] In this embodiment, the computer device may be a personal computer, a server, a smart TV, a portable electronic device such as a mobile phone, a tablet compu...
Embodiment 2
[0070] figure 2 It is a structural block diagram of the network attack state identification device 20 provided by the second embodiment of the present invention.
[0071] In this embodiment, the network attack state identification device 20 may be applied to a computer device, and the network attack state identification device 20 may include a plurality of functional modules composed of program code segments. The program codes of each program segment in the network attack state identification device 20 can be stored in the memory of the computer device, and executed by at least one processor of the computer device to realize (see for details figure 1 Description) Network attack status identification function.
[0072] In this embodiment, the network attack state identification device 20 can be divided into multiple functional modules according to the functions it performs. The functional modules may include: a network information analysis module 201 , a user configuration i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


