Network attack identification method, system and device, terminal equipment and storage medium
A technology of attacking terminals and network attacks, which is applied in the field of network security, can solve problems such as high cost, low accuracy, and low efficiency, and achieve the effect of solving intelligent identification problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0066] The main solution of the embodiment of the present invention is: by acquiring the attack data of each attack terminal; performing dynamic behavior correlation analysis on the attack data of each attack terminal to obtain the dynamic behavior correlation analysis result of each attack terminal; Perform relational logic operations on the dynamic behavior correlation analysis results of each attacking terminal to obtain the dynamic behavior correlation degree of each attacking terminal; perform static attribute correlation analysis on the attack data of each attacking terminal to obtain the static attributes of each attacking terminal Correlation degree, using the dynamic behavior correlation degree and static attribute correlation degree as the correlation analysis result of each attacking terminal; inputting the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com