Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alarming method and device for attack on network

A network and alarm information technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of increasing message redundancy, difficulty in extracting alarm information, and extracting effective alarm information

Inactive Publication Date: 2018-03-20
KINGSOFT
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Due to the simple division of threat information in the alarm information, a large number of high-risk alarms appear in the system, and the same high-risk alarm threat message will be repeatedly alarmed, which increases the redundancy of the message, and the administrator cannot extract the effectiveness of the alarm from a large number of high-risk alarm information. information; or after a preset period of time, a large number of general alarms appear in the system, and the same general alarm threat message will be repeatedly alarmed, which increases the redundancy of the message, and the administrator cannot extract the effective information of the alarm from the general alarm. In short, there are a large number of alarm information in the system, and it is difficult for the administrator to extract the alarm information from the threat information in the alarm information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarming method and device for attack on network
  • Alarming method and device for attack on network
  • Alarming method and device for attack on network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0100] Aiming at the problem that a large amount of alarm information appears in the system in the prior art, and it is difficult for the administrator to extract the alarm information from the threat information in the alarm information, the embodiment of the present invention provides an alarm method and device for network attacks. The similarity between the information and the alarmed information, when the similarity between the alarmed information and the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an alarming method and device for an attack on a network. The alarming method for the attack on the network comprises the steps that alarming information needing to conduct alarming on the attack on the network is acquired, wherein the alarming information comprises attack characteristics of the attack on the network; the similarity between the alarming information and alarmed information is determined on the basis of the similarity between the attack characteristics of the alarming information and attack characteristics of the alarmed information; andwhen the similarity between the alarming information and the alarmed information does not meet a preset similarity condition, alarming is conducted with the alarming information.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an alarm method and device for network attacks. Background technique [0002] As an important means of network security protection, the web intrusion detection system is usually deployed on the web server or on the bypass road, and can monitor and analyze the real-time traffic of web access, discover the attack behavior against the web in time, and effectively solve the problems faced by the web. security issues. [0003] If the system discovers an attack, it should respond as soon as possible. Common response methods include alarm, network disconnection, and policy processing. At present, the alarm method is a common response method. The system can report the threat corresponding to the attack behavior to the administrator in a timely manner by alarming the attack behavior of the Web. The administrator can further deal with the threat by processing the alarm ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/26H04L29/06
CPCH04L41/0631H04L43/16H04L63/1416
Inventor 杨文玉车祺丰
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products