Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack information processing method and device, electronic equipment and storage medium

An information processing method and a network attack technology, applied in the field of network attack information processing, can solve the problems of incompatibility of attack traffic and attack targets, low attack information processing efficiency, etc., and achieve the effect of saving costs, realizing large-scale deployment, and reducing the number of servers

Active Publication Date: 2020-08-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF14 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the deployment process of the traditional honeypot system, it not only needs to deploy a large number of servers and configure a large number of IP addresses, but also the attack traffic does not match the attack target, resulting in a low processing efficiency of the honeypot system for attack information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack information processing method and device, electronic equipment and storage medium
  • Network attack information processing method and device, electronic equipment and storage medium
  • Network attack information processing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings, and the described embodiments should not be considered as limiting the present invention, and those of ordinary skill in the art do not make any All other embodiments obtained under the premise of creative labor belong to the protection scope of the present invention.

[0078] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0079] Before further describing the embodiments of the present invention in detail, the nouns and terms involved in the embodiments of the present invention are described, and the nouns and terms involved in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network attack information processing method. The network attack information processing method comprises the following steps: acquiring attack traffic for attacking a target system; in response to the acquired attack traffic, triggering a port multiplexing process to monitor the attack traffic forwarded by the target port; triggering an attack information classification model, and identifying the category of the attack traffic; triggering a port forwarding process based on an identification result of the attack information classification model, and forwarding the attack traffic. The invention further provides a network attack information processing device, electronic equipment and a storage medium. According to the invention, the attack traffic can be forwarded tothe corresponding honeypot systems of different types, the network attack information processing efficiency of the honeypot systems is improved, the number of deployed servers is reduced, the cost ofa user is saved, and the large-scale deployment of the honeypot systems is realized.

Description

technical field [0001] The invention relates to network attack information processing technology, in particular to a network attack information processing method, device, system, equipment and storage medium. Background technique [0002] In related technologies, the honeypot technology is an active security technology for deceiving attackers (also called hackers). In honeypot technology, technicians can deploy a fake system that simulates a real working system as a bait, and lure attackers to attack the fake system, wherein the fake system can usually be called a honeypot system. When the attacker is lured to attack the honeypot system, the honeypot system can capture the attack data of the attacker. By analyzing the captured attack data, it can provide a basis for identifying attack behaviors in actual production work and subsequent security defense measures. During the deployment process of the traditional honeypot system, not only need to deploy a large number of serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1491
Inventor 贺家成董志强李滨张壮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products