Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack detection method and device based on attack detection model, medium and equipment

An attack detection and model technology, applied in the field of network security, can solve the problems of low attack detection result accuracy and high false positive rate, and achieve the effect of reducing the probability of being attacked, reducing false positive rate, and improving accuracy

Pending Publication Date: 2022-05-27
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, this application provides an attack detection method and device, storage medium, and computer equipment based on an attack detection model. Few, resulting in low accuracy of attack detection results and high false alarm rate technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device based on attack detection model, medium and equipment
  • Attack detection method and device based on attack detection model, medium and equipment
  • Attack detection method and device based on attack detection model, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure will be more thoroughly understood, and will fully convey the scope of the present disclosure to those skilled in the art.

[0060] The embodiments of the present application may acquire and process related data based on artificial intelligence technology. Among them, artificial intelligence (AI) is a theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack detection method and device based on an attack detection model, a medium and equipment, relates to the field of network security, and mainly aims to solve the problems that when an existing machine learning algorithm is used for attack behavior detection, due to the fact that the number of training samples and the number of feature selection are small, the accuracy of an attack detection result is low, and the efficiency is high. And the false alarm rate is high. Comprising the steps of obtaining operation behavior data of a target user; the operation data are classified based on an attack detection model after model training is completed, a classification result is obtained, the attack detection model is constructed based on a support vector machine algorithm, model training is completed based on training samples and script language features, and the classification result is obtained. The training sample is composed of an attack sample collected based on an attack tool and a normal sample generated based on an automatic test attack, and the script language feature is extracted based on the attack sample; and if the classification result is an attack behavior, outputting an attack warning, and intercepting data generated by all operation behaviors of the target user.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to an attack detection method, apparatus, medium and device based on an attack detection model. Background technique [0002] With the rapid development of Internet technology, websites have become more and more popular, and any user with a computer and Internet connection can access web applications. And attacks on web applications and networks are on the rise. XSS attack is one of the most common network attacks, attackers often insert malicious scripts into vulnerable network applications, creating session hijacking, sensitive data leakage, cross-site request forgery attacks, and other security holes. Further, the XSS vulnerability is used to execute malicious code on the server, obtain user or database permissions, etc. [0003] Traditional XSS attack prevention methods include hardware- and software-based web application firewalls (wafs). Most of thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06K9/62G06N20/10
CPCH04L63/1416G06N20/10H04L63/1441H04L63/1408G06F18/2411
Inventor 王忠玉
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products