Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network threat detection method, device and system, electronic equipment and storage medium

A threat detection and network technology, applied in the field of network security, can solve problems such as failure to successfully detect network threats, network vulnerabilities, affecting network security, etc.

Active Publication Date: 2021-04-30
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in actual situations, if the network traffic with network threats is dynamic traffic or there are variant viruses, the network threats cannot be successfully detected through the existing static detection methods, which will lead to network vulnerabilities and affect network security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat detection method, device and system, electronic equipment and storage medium
  • Network threat detection method, device and system, electronic equipment and storage medium
  • Network threat detection method, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0051] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, relative terms such as "first", "second", etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Moreover, the term "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements but also other elements not expressly liste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network threat detection method, device and system, electronic equipment and a storage medium, and belongs to the field of network security. The method comprises the steps that when an original message is detected, the original message is restored into a transmission file, then a virtual running environment is started to run the transmission file, running information including intermediate behaviors triggered in the running process of the transmission file is obtained, and then by comparing the running information with a network threat blacklist library, whether the transmission file corresponding to the original message has the intermediate behavior causing the network threat in the operation process or not is determined, and whether the original message has the network threat or not is determined, so that the network threat caused by the fact that the dynamic flow cannot be detected or the flow of variant viruses exists in traditional static detection is avoided.

Description

technical field [0001] The present application belongs to the field of network security, and in particular relates to a network threat detection method, device, system, electronic equipment and storage medium. Background technique [0002] With the rapid development of network technology, people pay more and more attention to network security. [0003] In the prior art, there are a variety of methods for detecting network threats, which can detect the security of most network traffic, thereby preventing network attacks from threatening network security. [0004] Specifically, the network threat detection method in the prior art is generally a static detection method, which mainly establishes a message feature blacklist library through the message features included in the messages known to have network threats, and then needs to perform network threat detection. The message features included in the detected message are matched with the message feature blacklist library. If t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1441H04L67/06
Inventor 刘勇
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products