Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat detection method and device and storage medium

A technology of threat detection and storage medium, applied in the field of network security, can solve the problems of low detection efficiency and low matching efficiency, and achieve the effect of improving security, improving efficiency, effective and rapid determination

Pending Publication Date: 2022-02-08
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In this way, feature matching is used, and the matching efficiency is low, which in turn leads to low detection efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat detection method and device and storage medium
  • Threat detection method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0029] The technical solutions provided by the embodiments of the present application can be applied to various application scenarios that require threat detection, such as: Internet security protection platform, which detects threats to Internet data; another example: enterprise security protection platform, which performs threat detection on enterprise data, etc. .

[0030] Based on various application scenarios, the hardware operating environment corresponding to the technical solution provided by the embodiments of the present application may be a platform for implementing threat detection, such as the aforementioned Internet security protection platform and enterprise security protection platform.

[0031] Among these platforms, some platforms are in the form of servers, some platforms are in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threat detection method and device and a storage medium. The threat detection method comprises the steps of obtaining to-be-detected data; determining encrypted data corresponding to the to-be-detected data; judging whether matched encrypted data of the encrypted data corresponding to the to-be-detected data exists in encrypted data stored in a preset cuckoo filter or not, wherein the stored encrypted data is encrypted data corresponding to preset threat data; and if yes, determining that the to-be-detected data is threat data. The method is used for improving the threat detection efficiency.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a threat detection method and device, and a storage medium. Background technique [0002] With the rapid development of the Internet, network attacks and frauds are increasing, especially in high-speed network environments, network security products need to quickly identify attacks. [0003] Existing threat detection technology stores some threat features, such as ip (Internet Protocol, Internet Protocol) address, url (Uniform Resource Locator, Uniform Resource Locator), etc., into a Bloom filter or a data table, Then compare the currently detected data with the threat features in the Bloom filter or the data table, so as to realize the identification of threat data. [0004] In this way, the feature matching method is adopted, and the matching efficiency is low, which in turn leads to low detection efficiency. Contents of the invention [0005] The purpos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06F21/60
CPCG06F21/50G06F21/602
Inventor 周强范鸿雷
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products