A method and device for tracing the source of a network attack
A network attack, attacker technology, applied in the field of network security, can solve the problem of low tracking accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] Please see figure 1 , figure 1 A schematic flowchart of a method for tracing the source of a network attack is provided for the embodiment of the present application. Among them, the network attack traceability method includes:
[0055] S101. Obtain an access log of a target network service, and detect a first malicious file in the target network service.
[0056] In the embodiment of the present application, the target network service may specifically be a WEB service, etc., which is not limited in the embodiment of the present application.
[0057] In the embodiment of this application, this method can be applied to the network attack traceability system, such as image 3 As shown, the traceability system includes three parts: malicious file detection, log analysis, and traceability. The malicious file detection system can detect the first malicious file in the target network service.
[0058] In the embodiment of the present application, the traceability system may...
Embodiment 2
[0111] Please see figure 2 , figure 2 It is a schematic structural diagram of a network attack traceability system provided in the embodiment of this application. like figure 2 As shown, the network attack traceability system includes:
[0112] An acquisition unit 210, configured to acquire an access log of a target network service in the target terminal;
[0113] A detection unit 220, configured to detect a first malicious file in the target network service;
[0114] An extracting unit 230, configured to extract attacker information of the target attacker according to the access log and the first malicious file;
[0115] The determining unit 240 is configured to determine other files accessed by the target attacker according to the access log and the attacker information, as the file to be detected;
[0116] The portrait construction unit 250 is used to construct the attacker portrait of the target attacker according to the file to be detected, the access log, the fir...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


