Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for recognizing network attack behavior, chip and readable storage medium

A technology for identifying network and network attacks, which is applied in the field of network security and can solve problems such as high service fees and increased operating costs

Active Publication Date: 2022-01-11
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, when using digital certificate technology to resist network attacks, both communication parties need to pay high service fees for obtaining digital certificates, which increases operating costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing network attack behavior, chip and readable storage medium
  • Method and device for recognizing network attack behavior, chip and readable storage medium
  • Method and device for recognizing network attack behavior, chip and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] For ease of understanding, relevant terms involved in this application are firstly described.

[0035] 1. Digital certificate

[0036] A digital certificate is a series of data that marks the identity information of all parties involved in network communication, and its function is similar to that of an ID card in real life. A digital certificate can usually be issued by an authority, and the communicating parties can use it to identify each other on the Internet.

[0037] 2. Public key infrastructure

[0038] Public key infrastructure (PKI) refers to a universal security infrastructure that uses public key concepts and technologies to implement and provide security services. It is a key management platform that follows established standards. It can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications.

[0039] PKI technology is the core of information security t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for recognizing a network attack behavior, a chip and a readable storage medium. In the technical scheme provided by the invention, if first public key information and second public key information are the same in a network, the network attack behavior is recognized; however, a first communication device indicated by first communication device recognition information corresponding to the first public key information is different from a second communication device indicated by second communication device recognition information corresponding to the second public key information. Therefore, the existence of the network attack behavior in the communication between the first communication equipment and the second communication equipment can be determined. According to the technical scheme, the network attack behavior can be recognized without a digital certificate, so that the network communication safety can be improved.

Description

technical field [0001] The present application relates to the field of network security, and, more specifically, to a method, device, chip and readable storage medium for identifying network attack behavior. Background technique [0002] As the scale of the Internet and the number of users increase year by year, various network methods emerge in an endless stream, constantly changing people's lifestyles. However, due to the openness and anonymity of the network, network security issues are becoming increasingly prominent. Therefore, before the existing communication parties communicate through the network, in order to ensure the security of the transmitted information, the communication parties will first determine the public key used to encrypt the transmitted information. [0003] At present, a commonly used method for the communication parties to determine the public key is the Diffie Hellman (also called Diffie Hellman) algorithm. Specifically, communication terminal A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/122
CPCH04W12/122
Inventor 刘思聪冯毅
Owner CHINA UNITED NETWORK COMM GRP CO LTD