Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack analysis method and device, readable storage medium and computer equipment

A network attack and analysis method technology, which is applied in the field of readable storage media and computer equipment, network attack analysis methods, and devices, can solve the problems of high learning cost and the inability to intuitively see data correlation, etc., and achieve low learning cost, The effect of fast attack range and fast location of attack source

Active Publication Date: 2021-02-09
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, an object of the present invention is to propose a network attack analysis method to solve the problems of high learning cost and inability to intuitively see the relationship behind the data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack analysis method and device, readable storage medium and computer equipment
  • Network attack analysis method and device, readable storage medium and computer equipment
  • Network attack analysis method and device, readable storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0063] see figure 1 The network attack analysis method proposed by an embodiment of the present invention includes at least steps S101-S105.

[0064] In S101, when a network attack alarm occurs, read the first object entity selected by the user. When a user observes a suspicious event that needs to be analyzed in daily operation and mainten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack analysis method and device, a readable storage medium and computer equipment, and the method comprises the steps: reading a first object entity selected by a user when a network attack alarm occurs; analyzing the first object entity through a preset analysis query interface to generate first query result data, the analysis query interface having query logicinformation; extracting the query result data to generate a second object entity; analyzing the second object entity through the analysis query interface to generate second query result data; and obtaining a relationship between the first query result data and the second query result data, connecting the first object entity and the second object entity through a relationship graph, and displayingthe relationship graph. According to the method, the problems of high learning cost and incapability of visually seeing the association relationship behind the data in the prior art can be solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network attack analysis method, device, readable storage medium and computer equipment. Background technique [0002] In today's network, there are all kinds of hackers with different purposes to carry out network attacks on other individuals or enterprises on the Internet, in order to achieve their purposes of gaining benefits, improving reputation, political intentions and so on. However, in previous security incidents, enterprises had problems with the perception of compromised hosts in the network, and were often unable to detect attacks in the network in the first place. Hackers lurk within the organization for a long time, collecting information, stealing sensitive data or even destroying it. [0003] In order to enhance the security awareness of enterprises, more and more enterprises have established log analysis platforms. However, the current log analysis pl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L41/0631H04L41/069
Inventor 罗家强范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products