Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack detection method and device, electronic equipment and readable storage medium

A network attack and detection method technology, applied in the field of network security, can solve the problems of low protection rate, poor network security performance, protection and other problems, and achieve the effect of improving detection accuracy, preventing network attacks, and improving network security performance

Pending Publication Date: 2022-02-01
杭州安恒信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method judges the user's XSS attack attributes by comparing the input data with the static XSS attack signature database. It needs to maintain the static XSS attack signature database, and cannot protect against other attack methods such as SQL injection, CSRF, etc., which also leads to protection. low rate
From the above discussion, it can be seen that because the related technologies are limited by attack characteristics and attack types, the protection rate is low, the dynamics are poor, and network attacks cannot be effectively prevented, and the network security performance is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device, electronic equipment and readable storage medium
  • Network attack detection method and device, electronic equipment and readable storage medium
  • Network attack detection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make those skilled in the art better understand the solution of the present invention, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] After introducing the technical solutions of the embodiments of the present invention, various non-limiting implementations of the present application are described in detail below.

[0050] see first figure 1 , figure 1 It is a schematic flowchart of a network attack detection method provided by an embodiment of the present invention, and this embodiment of the present invention may include the following contents:

[0051...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack detection method and device, electronic equipment and a readable storage medium. The method comprises the following steps: training blacklist user data and white list user data obtained from a cloud end in advance to obtain network attack parameters of a to-be-detected network system; extracting target function item data from the operation log data of the target user as standardized operation information of the target user; respectively calculating a similar distance value between the standardized operation information of the target user and the standardized operation information of each user in the blacklist; and if the similar distance value is smaller than the network attack parameter, determining that the target user is an attack user, thereby improving the network attack detection accuracy, effectively preventing network attacks, and improving the network security performance.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network attack detection method, device, electronic equipment and readable storage medium. Background technique [0002] With the rapid development of computer technology, more and more user data is stored in the network. In order to improve network data security, it is imperative to predict and identify attacking users in real time or in advance, and block network attacks in time. However, it is difficult to identify and judge whether the current user is an attacking user from a large amount of network traffic data in a short period of time. Therefore, in the case of limited energy of security audit practitioners, using advanced computer information security technology to review and filter attack users in advance has become an urgent problem to be solved. [0003] In the process of performing network attack detection, related technologies usually detect bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425H04L63/1441
Inventor 李深圳张隆胜
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products