Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal access detection method and device, electronic equipment and readable storage medium

A detection method and abnormal technology, applied in the Internet field, can solve the problems of server or other terminal security risks, low accuracy, low identification efficiency, etc., and achieve the effect of high accuracy, accurate and intelligent identification, and improved security.

Pending Publication Date: 2022-01-18
ZHONGYUNWANGAN TECHNOLOGY (BEIJING) CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of Internet technology, more and more users access servers or other terminals in the Internet through Web applications, but there are many attacks in the access, such as SQL injection, high-risk persistent threat attacks (Advanced Persistent Threat, APT ) and so on, which pose a great security risk to servers or other terminals connected to the Internet
In the existing technology, the interception of abnormal access is usually based on the IP of the abnormal access, or by setting some simple interception rules to intercept according to the characteristics of the access, but these methods are very easy to be circumvented, especially for attackers who do not have access Attacked by unfixed vulnerabilities (0-day vulnerabilities) in the system, the existing methods have low identification efficiency and low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access detection method and device, electronic equipment and readable storage medium
  • Abnormal access detection method and device, electronic equipment and readable storage medium
  • Abnormal access detection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0044] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0045] In the process of accessing the Internet through web applications, people often encounter attacks, such as advanced persistent threat attacks, referred to as APT, also known...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormal access detection method and apparatus, an electronic equipment and a readable storage medium. The method comprises the steps of obtaining training data traffic of a target application; performing feature extraction on the data traffic for training to obtain flow data features; based on combination of supervised learning and unsupervised learning, performing feature conversion on the flow data features to learn underlying logic, access logic and service logic of the target application, and obtaining a safety protection model of the target application; and recognizing abnormal access of a target application based on the safety protection model. On the basis of an artificial intelligence method, the attack behaviors, especially the attack behaviors of 0-day vulnerabilities, can be intelligently recognized efficiently and accurately; the safety of an internet application system is remarkably improved, the applicability is wide, and the accuracy is high.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a detection method, device, electronic equipment and readable storage medium for abnormal access. Background technique [0002] With the rapid development of Internet technology, more and more users access servers or other terminals in the Internet through web applications, but there are many attacks in the access, such as SQL injection, high-risk persistent threat attack (Advanced Persistent Threat, APT ) etc., which cause a great security risk to servers or other terminals connected to the Internet. In the existing technology, the interception of abnormal access is usually based on the IP of the abnormal access, or by setting some simple interception rules to intercept according to the characteristics of the access, but these methods are very easy to be circumvented, especially for attackers who do not have access Attacked by system unrepaired vulnerabilities (0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1425H04L63/1441H04L63/1433
Inventor 王秀贤
Owner ZHONGYUNWANGAN TECHNOLOGY (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products