Abnormal traffic detection method, DDoS attack detection method and device and electronic equipment

A technology of abnormal flow and detection method, which is applied in the computer field, can solve the problems of false detection and missed detection, and low accuracy of abnormal flow detection, so as to reduce the missed detection rate and false detection rate, reduce the missed detection rate and false detection, The effect of improving accuracy

Pending Publication Date: 2022-03-08
ALIBABA GRP HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since each user's access habits and services are different, using a common traffic threshold rule for all u

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal traffic detection method, DDoS attack detection method and device and electronic equipment
  • Abnormal traffic detection method, DDoS attack detection method and device and electronic equipment
  • Abnormal traffic detection method, DDoS attack detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0030] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0031] The embodiments of the present application can be applied to abnormal traffic detection scenarios, such as attack traffic detection scenarios under DDoS (Distributed Denial of Service attack), brute force cracking scenarios, malicious mining scenarios, malicious scanni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an abnormal traffic detection method, a DDoS attack detection method, a DDoS attack detection device and electronic equipment. An embodiment of the method comprises the following steps: acquiring traffic component data of real-time traffic; a source user of the real-time traffic is determined, and a traffic component portrait of the source user is acquired, and the traffic component portrait is pre-generated based on historical normal traffic component data of the source user; detecting the similarity between the traffic component data of the real-time traffic and the traffic component portrait; and determining whether the real-time traffic is abnormal traffic based on the similarity. According to the embodiment, the accuracy of an abnormal flow detection result is improved.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular, relate to a method for detecting abnormal traffic, a method for detecting a DDoS attack, a device, and electronic equipment. Background technique [0002] With the development of Internet technology, DDoS (Distributed Denial of Service attack, distributed denial of service attack) and other network malicious attacks are increasing, and Internet service providers, Internet content providers, Internet data centers and other operators are facing security and operational challenges. The challenges continue to mount. In order to ensure network security, it is necessary to detect network traffic to determine whether it is abnormal traffic during malicious network attacks. [0003] In the prior art, a fixed traffic threshold is usually manually set, and when the traffic generated by a certain user in the network exceeds the traffic threshold, it is deter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/1458H04L63/1425H04L63/1416
Inventor 李雨亭
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products