Intrusion detection method and device
A technology of intrusion detection and configuration files, which is applied in the field of network security and can solve the problems of lack of defense capabilities against network attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to solve the problem that the existing service grid lacks defense capabilities against network intrusions, the embodiments of the present application provide an intrusion detection method and device.
[0049] The preferred embodiments of the application will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the application, and are not used to limit the application, and in the absence of conflict, the application The embodiments and the features in the embodiments can be combined with each other.
[0050] In order to facilitate understanding of the application, in the technical terms involved in the application:
[0051] Container (Container), a technology that packages software into standardized units for development, delivery, and deployment.
[0052] Container orchestration tool, a tool for organizing and scheduling containers. The c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com