Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack source detection method and device

A network attack and detection method technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problem of low efficiency at the source of network attacks, and achieve the effect of protecting network information security

Active Publication Date: 2017-08-29
STATE GRID CORP OF CHINA +2
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for detecting the source of a network attack, to at least solve the technical problem of low efficiency in determining the source of the network attack in the related art when a network attack occurs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack source detection method and device
  • Network attack source detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0021] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack source detection method and a device, wherein the method comprises: acquiring the target data source of a network wherein the target data source comprises the attack source that makes network attacks; performing hierarchical pre-treatment to the data of the target data source; carrying out data digging to the pre-treated data and establishing a data model base wherein the data model base comprises the analyzing result obtained from the analysis of the target data source; and based on the analyzing result, determining the attack source. According to method and the device of the invention, it is possible to solve the technical problem in the prior art that the efficiency to determine the source of network attacks is low when network attacks take place.

Description

technical field [0001] The invention relates to the field of network detection, in particular to a method and device for detecting network attack sources. Background technique [0002] In the information construction of the power grid, multiple business systems are involved, and the scale of the business system is large and complex. With the continuous deepening of the information construction, network security issues are increasingly concerned. At present, in terms of network security, security products such as firewalls and IDS (Intrusion Detection System) are generally deployed, which do not have the ability to conduct comprehensive and in-depth monitoring of a large number of data flows in the network. However, with the continuous improvement of network attack methods, attack methods In constant change, there will be a large amount of attack data in the network. The existing security protection methods cannot effectively determine the source of these attacks, and cannot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/30
CPCG06F16/212G06F16/2465H04L63/1416H04L2463/146
Inventor 王旭马先刘世良苏蔚李生帛邵巍杨莉莉李楠芳王有虎金金李晖佟芳张小博秦浩徐铁军
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products