Method and device for recognizing network attack behavior, chip and readable storage medium
A technology for identifying network and network attacks, which is applied in the field of network security and can solve problems such as high service fees and increased operating costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] For ease of understanding, relevant terms involved in this application are firstly described.
[0035] 1. Digital certificate
[0036] A digital certificate is a series of data that marks the identity information of all parties involved in network communication, and its function is similar to that of an ID card in real life. A digital certificate can usually be issued by an authority, and the communicating parties can use it to identify each other on the Internet.
[0037] 2. Public key infrastructure
[0038] Public key infrastructure (PKI) refers to a universal security infrastructure that uses public key concepts and technologies to implement and provide security services. It is a key management platform that follows established standards. It can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications.
[0039] PKI technology is the core of information security t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


