Attack detection model training method and attack detection method and system
A technology of attack detection and model, applied in the field of communication, can solve the problem that the target system cannot provide normal services
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] Embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.
[0036] see figure 1 , is a flow chart of a method for training a DDoS attack detection model provided in an embodiment of the present application.
[0037] As shown, the process includes:
[0038] S101: Obtain characteristic information of network traffic within a specified time period.
[0039] Specifically, if a DDoS attack occurs during a certain period of time, the time period including the occurrence of the DDoS attack is selected as the specified time period, and the characteristic information of the network traffic of the destination IP address of the DDoS attack within the specified time period is obtained, that is, the acquired network The traffic includes DDoS attack traffic and normal traffic. For example, there were multiple DDoS attacks from 10:00 am to 10:00 pm on Wednesday of the previous week. You can select the specified time perio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com