Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack state identification method, device, equipment and computer-readable storage medium

A network attack and state identification technology, applied in the field of network security, can solve the problems of increasing the number of flow tables of traffic guiding devices, wasting manpower and physics, and increasing the load of security equipment, and achieves the effect of reducing manpower and load.

Active Publication Date: 2021-08-03
金锐同创(北京)科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Over time, historical policies automatically generated by external attacks or manually configured continue to accumulate, resulting in an increase in the number of flow tables on the traffic steering device, which may exceed the maximum limit
And it is possible to treat normal traffic as abnormal traffic, increasing the load on security devices
The existing method is to manually delete invalid drainage strategies based on experience, which wastes manpower and physics. If the strategy is not deleted in time, it will also lead to the interaction of other normal traffic.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack state identification method, device, equipment and computer-readable storage medium
  • Network attack state identification method, device, equipment and computer-readable storage medium
  • Network attack state identification method, device, equipment and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] figure 1 It is a flow chart of the network attack state identification method proposed in the first embodiment.

[0033] In this embodiment, the method for identifying the network attack state can be applied to a computer device. For a computer device that needs to identify a network attack state, the method for network attack state provided by the method of the present invention can be directly integrated on the computer device. The identified function may be run on a computer device in the form of a software development kit (Software Development Kit, SDK).

[0034] Such as figure 1 As shown, the network attack state identification method specifically includes the following steps. According to different requirements, the order of the steps in the flow chart can be changed, and some steps can be omitted.

[0035] In this embodiment, the computer device may be a personal computer, a server, a smart TV, a portable electronic device such as a mobile phone, a tablet compu...

Embodiment 2

[0070] figure 2 It is a structural block diagram of the network attack state identification device 20 provided by the second embodiment of the present invention.

[0071] In this embodiment, the network attack state identification device 20 may be applied to a computer device, and the network attack state identification device 20 may include a plurality of functional modules composed of program code segments. The program codes of each program segment in the network attack state identification device 20 can be stored in the memory of the computer device, and executed by at least one processor of the computer device to realize (see for details figure 1 Description) Network attack status identification function.

[0072] In this embodiment, the network attack state identification device 20 can be divided into multiple functional modules according to the functions it performs. The functional modules may include: a network information analysis module 201 , a user configuration i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack state identification method, device, equipment and computer-readable storage medium. The method includes: analyzing network information of multiple security devices; obtaining security information configured by users; obtaining and screening traffic attack data, and judging Whether the identifier of the attack status exists; according to the judgment result of the identifier of the attack status, identify the current traffic attack status; according to the security information configured by the user and the current traffic attack status, automatically issue or delete the corresponding guiding traffic policy.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network attack state identification method, device, equipment and computer-readable storage medium. Background technique [0002] When the network is under external attack, a traffic steering policy will be generated at the traffic steering device. Over time, historical policies automatically generated by external attacks or manually configured continue to accumulate, resulting in an increase in the number of flow tables on the traffic steering device, which may exceed the maximum limit. And it is possible to treat normal traffic as abnormal traffic, increasing the load on security devices. The existing method is to manually delete invalid drainage strategies based on experience, which wastes manpower and physical resources. If the strategy is not deleted in time, it will also lead to the interaction of other normal traffic. [0003] Therefore, how to quickly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 闫锋张长久何瑞丰
Owner 金锐同创(北京)科技股份有限公司