Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device for network beacon tampering detection

A data processing device and tamper detection technology, which is applied in the field of network security, can solve problems such as difficult to judge network beacon tampering in real time, and achieve the effect of improving efficiency

Active Publication Date: 2022-05-06
NO 15 INST OF CHINA ELECTRONICS TECH GRP +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing active tracking and traceability methods based on network beacons usually need to restore the specific implanted beacons at the detection node to determine whether the network beacon has been tampered with, and it is difficult to judge whether the network beacon has been tampered with in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for network beacon tampering detection
  • Data processing method and device for network beacon tampering detection
  • Data processing method and device for network beacon tampering detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] see figure 1 , figure 1 It is a schematic flowchart of a data processing method for network beacon tampering detection disclosed by an embodiment of the present invention. in, figure 1 The described data processing method for network beacon tampering detection is applied to a network security management system, such as a local server or a cloud server for data processing and management of network beacon tampering detection, which is not limited in the embodiments of the present invention. Such as figure 1 As shown, the data processing method for network beacon tampering detection may include the following operations:

[0084] 101. Obtain node beacon information of a beacon detection node.

[0085] 102. The root performs digest value calculation on node beacon information to obtain first digest value information.

[0086] 103. Perform comparative analysis on the first summary value information to obtain comparison result information.

[0087] In the embodiment of t...

Embodiment 2

[0129] see figure 2 , figure 2 It is a schematic flowchart of another data processing method for network beacon tampering detection disclosed in the embodiment of the present invention. in, figure 2 The described data processing method for network beacon tampering detection is applied to a network security management system, such as a local server or a cloud server for data processing and management of network beacon tampering detection, which is not limited in the embodiments of the present invention. Such as figure 2 As shown, the data processing method for network beacon tampering detection may include the following operations:

[0130] 201. Acquire basic network information of a target detection network.

[0131] 202. Determine the beacon implantation node according to the basic network information.

[0132] 203. Obtain implanted beacon information corresponding to the beacon implanted node.

[0133] In the embodiment of the present invention, the above-mentioned...

Embodiment 3

[0159] see image 3 , image 3 It is a schematic structural diagram of a data processing device for network beacon tampering detection disclosed in an embodiment of the present invention. in, image 3 The described device can be applied to a network security management system, such as a local server or a cloud server used for data processing and management of network beacon tampering detection, which is not limited by the embodiments of the present invention. Such as image 3 As shown, the device may include:

[0160] The first acquiring module 301 is configured to acquire node beacon information of a beacon detection node;

[0161] Calculation module 302, configured to perform summary value calculation on node beacon information to obtain first summary value information;

[0162] The comparison and analysis module 303 is configured to perform comparison and analysis on the first summary value information to obtain comparison result information; the comparison result info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and device for network beacon tampering detection. The method comprises the following steps: acquiring node beacon information of a beacon detection node; performing digest value calculation on the node beacon information to obtain first digest value information; comparing and analyzing the first abstract value information to obtain comparison result information; the comparison result information is used for indicating and judging the tampering condition of the network beacon. It can be seen that the comparison result information used for indicating and judging the tampering condition of the network beacon can be obtained by conducting digest value calculation and comparative analysis on the node beacon information, it is beneficial for efficiently judging whether the network beacon is tampered or not in real time, and then the efficiency of finding that the network beacon is tampered is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data processing method and device for network beacon tampering detection. Background technique [0002] With the development of Internet technology, network attackers pose a huge threat to key business networks such as provincial networks and telecommunication networks. In order to hide the traffic information and identity, the attacker avoids the traceability of the attack path through multi-level springboard forwarding and other methods, which increases the difficulty of traceability. Existing active tracking and traceability methods based on network beacons usually need to restore the specific implanted beacons at the detection node to determine whether the network beacon has been tampered with, and it is difficult to judge whether the network beacon has been tampered with in real time. Therefore, it is particularly important to provide a data processing method and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1416H04L63/1441H04L63/1425
Inventor 任传伦俞赛赛刘晓影任秋洁张先国谭震乌吉斯古愣孟祥頔王明琛
Owner NO 15 INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products