Unlock instant, AI-driven research and patent intelligence for your innovation.

Zero rule attack detection method and device based on semantic context

An attack detection and context technology, applied in the field of information security detection, can solve the problems of content server security threats, attacking service equipment, illegal users, etc., to achieve the effect of high content acquisition efficiency and content acquisition security

Active Publication Date: 2021-10-08
GUIZHOU POWER GRID CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of network technology, it has become very common for users to log in to service devices through the interface to obtain corresponding content. However, the development of network technology also affects network security. When users obtain content through the interface, on the one hand, the input content There is no problem in itself, but it may be hijacked by attackers to obtain content and attack service equipment. On the other hand, illegal users directly conduct network attacks, which poses a security threat to content servers. Therefore, how to use user behavior track information To identify the legitimacy of the content it acquires, and after acquisition, it can also find out whether there is a security threat in the server in time, which becomes a technical problem to be solved by the present invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero rule attack detection method and device based on semantic context
  • Zero rule attack detection method and device based on semantic context

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0031] Such as figure 1 As shown, the present invention proposes a zero-rule attack detection method based on semantic context, which specifically includes the following steps:

[0032] Step S101. Receive a service query request input by a user.

[0033] In this step, before receiving the service query request input from the user, it includes pre-establishing semantic context matching data based on user behavior footprints. In the present invention, a semantic context-based matching mode is set. Every time a user accesses the server to obtain a content request, traces and user information will be left, and legal or illegal information will be stored locally, thereby ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a zero rule attack detection method based on semantic context. The method comprises the following steps: receiving a service query request input by a user; analyzing the content of the query request, and calling a content query condition and a constraint condition; when the query condition is met, allowing to enter a content acquisition channel; otherwise, setting a constraint condition in the content so as to enter a content acquisition channel, wherein the query condition is a preset rule of a semantic context, and the constraint condition is a zero rule vulnerability detection rule. According to the zero rule attack detection method based on the semantic context, the content acquisition is safer and the content acquisition efficiency is higher through a detection mode set by multiple conditions at the server side. In addition, the invention also discloses a zero rule attack detection device based on the semantic context.

Description

technical field [0001] The invention belongs to the technical field of information security detection, and in particular relates to a semantic context-based zero-rule attack detection method and device. Background technique [0002] With the continuous development of network technology, it has become very common for users to log in to service devices through the interface to obtain corresponding content. However, the development of network technology also affects network security. When users obtain content through the interface, on the one hand, the input content There is no problem in itself, but it may be hijacked by attackers to obtain content and attack service equipment. On the other hand, illegal users directly conduct network attacks, which poses a security threat to content servers. Therefore, how to use user behavior track information To identify the legitimacy of the acquired content, and to find out whether there is a security threat in the server in time after ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433
Inventor 龙玉江魏力鹏陈卿袁捷吕嵘晶严彬元刘俊荣舒彧陆岫昶陶佳冶周泽元班秋成周琳妍吴方权易也李然欧阳静
Owner GUIZHOU POWER GRID CO LTD