A method and device for determining the success of an attack by anti-connection
A successful, attacked technique used in cybersecurity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] see figure 1 , figure 1 This embodiment of the present application provides a schematic flowchart of a method for determining the success of an attack by anti-connection. Among them, the method for determining the success of the attack by anti-connection includes:
[0039] S101. Obtain attack traffic to be detected.
[0040] In the embodiment of the present application, the method is applied in a network security scenario, and is specifically applied in a scenario in which it is determined whether the attack is successful after the host is attacked.
[0041] S102. Identify the address of the attacked host from the attack traffic according to a preset feature detection algorithm, and extract the attack load in the attack traffic.
[0042] In the embodiment of the present application, when detecting the attack traffic and identifying the address of the attacked host, firstly detect the specific attack feature in the attack traffic, then extract the attacked host addres...
Embodiment 2
[0092] see figure 2 , figure 2 This is a schematic structural diagram of an apparatus for determining successful attack by anti-connection provided by an embodiment of the present application. like figure 2 As shown, the device for determining the success of the attack by anti-connection includes:
[0093] an obtaining unit 210, configured to obtain the attack traffic to be detected;
[0094] The attacked address extraction unit 220 is used to extract the attack load in the attack traffic and the attacked host address corresponding to the attack traffic;
[0095] In the embodiment of the present application, when detecting the attack traffic to identify the address of the attacked host, firstly detect the specific attack feature in the attack traffic, then identify the address of the attacked host according to the attack feature, and cache the address of the attacked host.
[0096] In this embodiment of the present application, the attacked host address may specifically...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com