Attack detection method and device, electronic equipment and storage medium

An attack detection and storage device technology, applied in the field of network security, can solve the problems of wide attack range and low attack threshold in the terminal configuration structure function solution, and achieve the effect of reducing system resource overhead

Active Publication Date: 2022-03-11
TCL COMM TECH (CHENGDU) LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, using the terminal configuration structure function solution provided by the chip manufacturer, its code and tools are relatively easy to obtain, not only the attack threshold is low, but also the attack surface of the terminal configuration structure function solution with the application processor plus baseband architecture is wide

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device, electronic equipment and storage medium
  • Attack detection method and device, electronic equipment and storage medium
  • Attack detection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0067] Embodiments of the present application provide an attack detection method, device, electronic equipment, and storage medium.

[0068] Wherein, the attack detection device may specifically be integrated in an electronic device, and the electronic device may be a terminal, a server, or other equipment. Wherein, the terminal can be a mobile phone, a tablet computer, a smart bluetooth device, a notebook computer, or a personal computer (Personal Computer, PC) and other devices; the server ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an attack detection method and device, electronic equipment and a storage medium, and the method comprises the steps: determining an operation log in a storage equipment partition of a terminal and the modification content, relative to the storage equipment partition, in a honeypot partition of a honeypot system when the terminal is started; generating a cracking log according to the operation log or the modified content; receiving a first write-in request or a second write-in request sent by the client; when it is detected that the first write-in request corresponds to the honeypot partition or the second write-in request corresponds to a function configuration structural body in the honeypot system, a client access log is recorded; and carrying out attack detection on the cracking log and the client access log so as to obtain an attack behavior of the client on the corresponding function configuration of the terminal. According to the method, the corresponding function configuration architecture of the easily attacked terminal can be simulated, the process monitoring on the corresponding function configuration attack behavior of the terminal can be dynamically triggered, and the system resource overhead can be reduced to the maximum extent.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an attack detection method, device, electronic equipment and storage medium. Background technique [0002] At present, terminal multimedia functions are becoming more and more abundant, and the terminal platform architecture has gradually developed to an application processor (AP, Application Processor) plus baseband (modem) architecture. Because the corresponding configuration structure and functions of the terminal are also extremely vulnerable to attacks by hackers and other attackers , most original equipment manufacturers will directly use or slightly modify the terminal configuration structure and function solutions provided by chip manufacturers. [0003] However, using the terminal configuration structure function solution provided by the chip manufacturer, its code and tools are relatively easy to obtain, not only the attack threshold is low, but also ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/552G06F21/577
Inventor 徐泓磊
Owner TCL COMM TECH (CHENGDU) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products