A ttp-based network security threat hunting method and network equipment
A network security and network attack technology, which is applied in the field of network security, can solve problems such as poor compatibility, non-universal terminal equipment, and high dependence on physical file programs, and achieve the effect of reducing dependence and good compatibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] In order to facilitate understanding of the technical solutions provided by the embodiments of the present application, the technical solutions provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
[0075] The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of approaches consistent with aspects of the application as recited in the appended claims.
[0076] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


