Hacker attack grading detection method and device

A hacker attack and detection method technology, applied in electrical components, transmission systems, etc., can solve the problems of high labor cost, undetectable attack form, and inability to judge the classification of hacker attacks, and achieve the effect of reducing manual workload.

Active Publication Date: 2019-11-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The labor cost is high, and professionals need to use existing rules to judge and extract keywords for analysis
[0005] (2) Lack of grading, unable to judge hacker attack grading
[0006] (3) New attack forms cannot be detected, and the rules are written based on existing attack forms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hacker attack grading detection method and device
  • Hacker attack grading detection method and device
  • Hacker attack grading detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hacker attack grading detection method and device. The method comprises the steps of obtaining log information; extracting related fields from the log information according to an aggregation model, and obtaining the aggregation model by fitting the corresponding relation between all the fields in the log information and hacker behaviors and obtaining the related fields having a pointing effect on hacker behavior judgment; obtaining a corresponding attribute value of the related field; performing aggregation calculation on the corresponding attribute values of the related fields to obtain scores corresponding to the log information; and according to the score and a preset hacker behavior grading judgment rule, carrying out grading judgment on a behavior corresponding to the log information. According to the method, the manual workload can be reduced, hierarchical pre-judgment of hacker attack levels can be realized, and new hacker attack skills can be detectedin a fuzzy manner, so that security personnel can further position and analyze the attack skills conveniently, and the purpose of feeding back other strategy protection is achieved.

Description

technical field [0001] The invention relates to the field of hacker detection, in particular to a hacker attack classification detection method and device. Background technique [0002] Hacking is an act of using security loopholes to destroy and harm users' interests, including but not limited to exploiting loopholes to steal user privacy and virtual property, invading business systems, stealing user data, affecting normal business operations, and maliciously spreading loopholes. Feature portrait refers to a tagged user model abstracted based on user behavior information such as hacking behavior, methods, and means. Tags are highly refined feature identifications obtained through the analysis of hacker behavior. Through tagging, some highly generalized and easy-to-understand features can be used to identify hackers, and it is easier to identify hackers' attack behaviors, achieving the purpose of quick abnormal alarm and post-event source analysis. [0003] Such as figure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441H04L63/20H04L63/1433
Inventor 陈剑胡珀郭冕牛保龙洪旭升李相垚易楠周雨阳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products