Unlock instant, AI-driven research and patent intelligence for your innovation.

A zero-rule attack detection method and device based on semantic context

An attack detection and context technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as attacking service equipment, content server security threats, illegal users, etc., and achieve content acquisition security and high content acquisition efficiency Effect

Active Publication Date: 2022-06-07
GUIZHOU POWER GRID CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of network technology, it has become very common for users to log in to service devices through the interface to obtain corresponding content. However, the development of network technology also affects network security. When users obtain content through the interface, on the one hand, the input content There is no problem in itself, but it may be hijacked by attackers to obtain content and attack service equipment. On the other hand, illegal users directly conduct network attacks, which poses a security threat to content servers. Therefore, how to use user behavior track information To identify the legitimacy of the content it acquires, and after acquisition, it can also find out whether there is a security threat in the server in time, which becomes a technical problem to be solved by the present invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A zero-rule attack detection method and device based on semantic context
  • A zero-rule attack detection method and device based on semantic context

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, rather than for limiting the protection scope of the present invention.

[0031] like figure 1 As shown, the present invention proposes a zero-rule attack detection method based on semantic context, which specifically includes the following steps:

[0032] Step S101. Receive a service query request input by a user.

[0033] In this step, before receiving the service query request input from the user, pre-establishing semantic context matching data based on the user's behavior footprint is included. In the present invention, a semantic-based context matching mode is set, and each time a user accesses the server to obtain a content request, traces and user information will be left, and the legal or illegal ones will be stored locally. A se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a zero-rule attack detection method based on semantic context, including: receiving a service query request input by a user; parsing the content of the query request, and fetching content query conditions and constraint conditions; when the query conditions are met, then Access to the content acquisition channel is allowed; otherwise, the constraint condition is set in the content to enter the content acquisition channel; wherein, the query condition is a preset rule of semantic context; the constraint condition is a zero-rule vulnerability detection rule. The semantic context-based zero-rule attack detection method of the present invention makes content acquisition more secure and more efficient through the detection modes set by various conditions at the server end. In addition, the invention also discloses a semantic context-based zero-rule attack detection device.

Description

technical field [0001] The invention belongs to the technical field of information security detection, and in particular relates to a zero-rule attack detection method and device based on semantic context. Background technique [0002] With the continuous development of network technology, it has become very common for users to log in to service devices through the interface to obtain corresponding content. However, the development of network technology also affects network security. When users obtain content through the interface, on the one hand, the content they input There is no problem in itself, but it may be held hostage by attackers to obtain content and attack service equipment. On the other hand, illegal users directly conduct network attacks, which makes the content server a security threat. Therefore, how to use user behavior trajectory information To identify the legitimacy of the acquired content, and to find out whether there is a security threat in the server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1433
Inventor 龙玉江魏力鹏陈卿袁捷吕嵘晶严彬元刘俊荣舒彧陆岫昶陶佳冶周泽元班秋成周琳妍吴方权易也李然欧阳静
Owner GUIZHOU POWER GRID CO LTD