Network attack event processing method and electronic equipment thereof
A processing method and network attack technology, applied in the field of network security, can solve problems such as lack of rapid linkage, and achieve the effect of reducing capability requirements and improving processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to specific embodiments and drawings.
[0050] It should be noted that all the expressions using "first" and "second" in the embodiments of the present invention are used to distinguish two entities with the same name but not the same or parameters that are not the same, as shown in "first" and "second" Only for the convenience of presentation, it should not be understood as a limitation to the embodiments of the present invention, and subsequent embodiments will not describe this one by one.
[0051] Based on the foregoing objective, the first aspect of the embodiments of the present invention proposes an embodiment of a method for processing a network attack event. Such as figure 1 As shown, it is a schematic flowchart of an embodiment of a method for processing a network attack event provided ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com