Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web attack report generation method, device and equipment and computer medium

A report generation and reporting technology, applied in the field of network security, can solve problems such as low efficiency, poor accuracy, and inapplicability to application scenarios, and achieve high efficiency, accuracy, and good applicability

Pending Publication Date: 2020-11-24
杭州安恒信息安全技术有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, manual generation of web attack reports is time-consuming, inefficient and inaccurate, and cannot be applied to specific application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web attack report generation method, device and equipment and computer medium
  • Web attack report generation method, device and equipment and computer medium
  • Web attack report generation method, device and equipment and computer medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] see figure 1 , figure 1 It is a flow chart of a method for generating a web attack report provided by the embodiment of the present application.

[0052] A method for generating a web attack report provided in an embodiment of the present application may include the following steps:

[0053] Step S101: Obtain web alarm log data.

[0054] In practical applications, the web alarm log data may be obtained first, which is the corresponding alarm log data generated in the web a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Web attack report generation method, device and equipment and a medium. The method comprises the steps of obtaining Web alarm log data; based on the word frequency number inthe Web alarm log data, identifying similar target Web alarm logs in the Web alarm log data; and generating a target Web attack report based on the target Web alarm log. In the invention, the similartarget Web alarm logs are identified based on the word frequency number in the Web alarm log data; since the similar target Web alarm logs reflect Web attack characteristics, when the target Web attack report is generated based on the target Web alarm logs, the Web attack characteristics can be reflected by means of the target Web attack report, and compared with manual generation of the Web attack report, the efficiency and accuracy are high, and the applicability is good. According to the Web attack report generation device and equipment and the computer readable storage medium provided by the invention, the corresponding technical problems are also solved.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, relates to a method, device, equipment and computer medium for generating a Web attack report. Background technique [0002] With the development of Web (World Wide Web, World Wide Web) technology, more and more applications are built based on the Web platform, and Web security has become another hot spot after operating system and business software security. In the application process of Web technology, in order to obtain information about Web attacks, it is necessary to generate Web attack reports, such as manually obtaining Web alarm log data, analyzing and comparing the Web alarm log data, and generating corresponding Web attack reports. [0003] However, manual generation of web attack reports is time-consuming, inefficient and inaccurate, and cannot be applied to specific application scenarios. [0004] To sum up, how to improve the applicability o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F40/166G06F40/216G06F40/289
CPCG06F40/166G06F40/216G06F40/289
Inventor 罗琪徐丽丽
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products