Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack interference method and device, gateway and readable storage medium

A gateway, suspicious technology, applied in the field of communication, can solve problems such as network security impact, achieve the effect of maintaining network security and increasing the difficulty of attack

Active Publication Date: 2021-10-22
BEIJING KNOWNSEC INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing network security maintenance methods have no relevant preventive measures for these uncertain threats, which will affect network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack interference method and device, gateway and readable storage medium
  • Attack interference method and device, gateway and readable storage medium
  • Attack interference method and device, gateway and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0028] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art withou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attack interference method and device, a gateway and a readable storage medium, and relates to the technical field of communication. The method is applied to a gateway, and comprises the following steps: when a target request sent by a target client is a suspicious request, generating a first response wherein source station server description information in the first response is different from description information of a target source station server corresponding to the target request, wherein the suspicious request represents a possible attack request; and sending the first response to the target client. Therefore, the description information different from the description information of the actual source station server is returned for the suspicious request, so that uncertain factors are increased, an attacker is confused, the attacker cannot obtain the real characteristics of the source station server, the attack difficulty is increased, and the network safety is maintained.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular, relates to an attack and interference method, device, gateway, and readable storage medium. Background technique [0002] At present, after a network attack occurs, the characteristics are extracted according to the attack, the existing vulnerabilities are analyzed, and then remedies are implemented to maintain network security. Today's network is becoming more and more developed, and there will be an infinite number of unknown attacks that will continue to occur. These undiscovered vulnerabilities, unexploited backdoors, and undetected viruses are all uncertain threats. The existing network security maintenance methods have no relevant preventive measures for these uncertain threats, which will affect network security. Contents of the invention [0003] The embodiment of the present application provides an attack interference method, device, gateway, and re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/66
CPCH04L63/1441H04L12/66
Inventor 段志鹏王小虎宋堂锐王伟
Owner BEIJING KNOWNSEC INFORMATION TECH