Zero rule attack detection method and device based on semantic context
An attack detection and context technology, applied in the field of information security detection, can solve the problems of content server security threats, attacking service equipment, illegal users, etc., to achieve the effect of high content acquisition efficiency and content acquisition security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.
[0031] Such as figure 1 As shown, the present invention proposes a zero-rule attack detection method based on semantic context, which specifically includes the following steps:
[0032] Step S101. Receive a service query request input by a user.
[0033] In this step, before receiving the service query request input from the user, it includes pre-establishing semantic context matching data based on user behavior footprints. In the present invention, a semantic context-based matching mode is set. Every time a user accesses the server to obtain a content request, traces and user information will be left, and legal or illegal information will be stored locally, thereby ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

