Abnormal operation detection method and device and electronic equipment
A detection method and abnormal technology, applied in the field of network security, can solve problems such as poor accuracy of detection methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] According to an embodiment of the present invention, an embodiment of a method for detecting abnormal operations is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0049] figure 1 is a flow chart of a method for detecting abnormal operations according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0050] Step S102, acquiring the network data flow and the protocol rule signature, wherein the protocol rule signature carries the information of the protocol to be detected and the abnormal function code corresponding to the protocol to be detected;
[0051]In the embodiment of the present inventi...
Embodiment 2
[0091] The embodiment of the present invention also provides a detection device for abnormal operation. The detection device for abnormal operation is mainly used to implement the detection method for abnormal operation provided in Embodiment 1 of the present invention. The following describes the abnormal operation provided in the embodiment of the present invention The detection device is introduced in detail.
[0092] Figure 4 is a schematic diagram of an abnormal operation detection device according to an embodiment of the present invention, such as Figure 4As shown, the device mainly includes: a first acquisition unit 10, a second acquisition unit 20, an analysis and matching unit 30 and a determination unit 40, wherein:
[0093] The first acquisition unit is used to acquire network data streams and protocol rule signatures, where the protocol rule signatures carry information about the protocol to be detected and an abnormal function code corresponding to the protocol...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com