CN110245491B - 网络攻击类型的确定方法、装置以及存储器和处理器 - Google Patents
网络攻击类型的确定方法、装置以及存储器和处理器 Download PDFInfo
- Publication number
- CN110245491B CN110245491B CN201910502393.9A CN201910502393A CN110245491B CN 110245491 B CN110245491 B CN 110245491B CN 201910502393 A CN201910502393 A CN 201910502393A CN 110245491 B CN110245491 B CN 110245491B
- Authority
- CN
- China
- Prior art keywords
- log file
- attack type
- log
- attack
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
- G06F16/1815—Journaling file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Evolutionary Computation (AREA)
- Computer Hardware Design (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Medical Informatics (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910502393.9A CN110245491B (zh) | 2019-06-11 | 2019-06-11 | 网络攻击类型的确定方法、装置以及存储器和处理器 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910502393.9A CN110245491B (zh) | 2019-06-11 | 2019-06-11 | 网络攻击类型的确定方法、装置以及存储器和处理器 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110245491A CN110245491A (zh) | 2019-09-17 |
CN110245491B true CN110245491B (zh) | 2021-01-08 |
Family
ID=67886541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910502393.9A Expired - Fee Related CN110245491B (zh) | 2019-06-11 | 2019-06-11 | 网络攻击类型的确定方法、装置以及存储器和处理器 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110245491B (zh) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111016720A (zh) * | 2019-12-23 | 2020-04-17 | 深圳供电局有限公司 | 基于k最近邻算法攻击识别方法及充电装置 |
CN113098832B (zh) * | 2019-12-23 | 2022-09-27 | 四川大学 | 一种基于机器学习的远程缓冲区溢出攻击检测方法 |
CN111277606B (zh) * | 2020-02-10 | 2022-04-15 | 北京邮电大学 | 检测模型训练方法、检测方法及装置、存储介质 |
CN113497784B (zh) * | 2020-03-20 | 2023-03-21 | 中国电信股份有限公司 | 检测情报数据的方法、装置及计算机可读存储介质 |
CN111582474B (zh) * | 2020-04-24 | 2023-08-25 | 中科物栖(南京)科技有限公司 | 神经网络结构探测方法、结构探测模型的训练方法及装置 |
CN111767957B (zh) * | 2020-07-01 | 2024-03-05 | 中国银行股份有限公司 | 一种日志异常的检测方法、装置、存储介质及电子设备 |
CN111787018A (zh) * | 2020-07-03 | 2020-10-16 | 中国工商银行股份有限公司 | 用于识别网络攻击行为的方法、装置、电子设备及介质 |
CN112000502B (zh) * | 2020-08-11 | 2023-04-07 | 杭州安恒信息技术股份有限公司 | 海量错误日志的处理方法、装置、电子装置及存储介质 |
CN112256791A (zh) * | 2020-10-27 | 2021-01-22 | 北京微步在线科技有限公司 | 一种网络攻击事件的展示方法及存储介质 |
CN113094510A (zh) * | 2021-04-01 | 2021-07-09 | 广州巨时信息科技股份有限公司 | 一种网络安全数据图谱化智能处理方法和装置 |
CN113065130A (zh) * | 2021-04-15 | 2021-07-02 | 深信服科技股份有限公司 | 一种日志分类方法及相关装置 |
CN113965405A (zh) * | 2021-11-04 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | 一种web攻击的监测方法、装置、设备及可读存储介质 |
CN114978884B (zh) * | 2022-07-27 | 2022-12-13 | 北京搜狐新媒体信息技术有限公司 | 数据包处理方法及装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013055872A2 (en) * | 2011-10-12 | 2013-04-18 | Raytheon Company | An integrated circuit for cyber security processing |
US20150172309A1 (en) * | 2013-12-18 | 2015-06-18 | Cytegic Ltd. | Security risk mapping of potential targets |
CN105656886A (zh) * | 2015-12-29 | 2016-06-08 | 北京邮电大学 | 一种基于机器学习的网站攻击行为的检测方法及装置 |
WO2017056121A1 (en) * | 2015-09-28 | 2017-04-06 | Minded Security S.R.L. | Method for the identification and prevention of client-side web attacks |
CN107241352A (zh) * | 2017-07-17 | 2017-10-10 | 浙江鹏信信息科技股份有限公司 | 一种网络安全事件分类与预测方法及*** |
CN107682317A (zh) * | 2017-09-06 | 2018-02-09 | 中国科学院计算机网络信息中心 | 建立数据检测模型的方法、数据检测方法及设备 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9591006B2 (en) * | 2014-09-18 | 2017-03-07 | Microsoft Technology Licensing, Llc | Lateral movement detection |
US9900338B2 (en) * | 2016-02-09 | 2018-02-20 | International Business Machines Corporation | Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data |
US10721262B2 (en) * | 2016-12-28 | 2020-07-21 | Palantir Technologies Inc. | Resource-centric network cyber attack warning system |
CN108156142A (zh) * | 2017-12-14 | 2018-06-12 | 哈尔滨理工大学 | 基于数据挖掘的网络入侵检测方法 |
CN108183916B (zh) * | 2018-01-15 | 2020-08-14 | 华北电力科学研究院有限责任公司 | 一种基于日志分析的网络攻击检测方法及装置 |
CN109508544B (zh) * | 2018-10-19 | 2022-12-06 | 南京理工大学 | 一种基于mlp的入侵检测方法 |
-
2019
- 2019-06-11 CN CN201910502393.9A patent/CN110245491B/zh not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013055872A2 (en) * | 2011-10-12 | 2013-04-18 | Raytheon Company | An integrated circuit for cyber security processing |
US20150172309A1 (en) * | 2013-12-18 | 2015-06-18 | Cytegic Ltd. | Security risk mapping of potential targets |
WO2017056121A1 (en) * | 2015-09-28 | 2017-04-06 | Minded Security S.R.L. | Method for the identification and prevention of client-side web attacks |
CN105656886A (zh) * | 2015-12-29 | 2016-06-08 | 北京邮电大学 | 一种基于机器学习的网站攻击行为的检测方法及装置 |
CN107241352A (zh) * | 2017-07-17 | 2017-10-10 | 浙江鹏信信息科技股份有限公司 | 一种网络安全事件分类与预测方法及*** |
CN107682317A (zh) * | 2017-09-06 | 2018-02-09 | 中国科学院计算机网络信息中心 | 建立数据检测模型的方法、数据检测方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN110245491A (zh) | 2019-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110245491B (zh) | 网络攻击类型的确定方法、装置以及存储器和处理器 | |
US11405419B2 (en) | Preventing advanced persistent threat attack | |
KR101890272B1 (ko) | 보안이벤트 자동 검증 방법 및 장치 | |
US8171544B2 (en) | Method and system for preventing, auditing and trending unauthorized traffic in network systems | |
Acer et al. | Where the wild warnings are: Root causes of Chrome HTTPS certificate errors | |
CN110266673B (zh) | 基于大数据的安全策略优化处理方法和装置 | |
Osanaiye | Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing | |
US11681804B2 (en) | System and method for automatic generation of malware detection traps | |
Indre et al. | Detection and prevention system against cyber attacks and botnet malware for information systems and Internet of Things | |
Mangino et al. | Internet-scale insecurity of consumer internet of things: An empirical measurements perspective | |
CN110768949B (zh) | 探测漏洞的方法及装置、存储介质、电子装置 | |
CN112583845A (zh) | 一种访问检测方法、装置、电子设备和计算机存储介质 | |
Ye et al. | A system-fault-risk framework for cyber attack classification | |
Aguirre-Anaya et al. | A new procedure to detect low interaction honeypots | |
JP3986871B2 (ja) | アンチプロファイリング装置およびアンチプロファイリングプログラム | |
Amran et al. | Metrics for network forensics conviction evidence | |
Pickering | Evaluating the viability of intrusion detection system benchmarking | |
Mohammed | Network-Based Detection and Prevention System Against DNS-Based Attacks | |
US12039048B2 (en) | System and method for automatic generation of malware detection traps | |
Fu et al. | Camouflaging virtual honeypots | |
Zou et al. | Generating comprehensive data with protocol fuzzing for applying deep learning to detect network attacks | |
Thakare et al. | Computer attacks and intrusion detection system: A need review | |
Leshchenko et al. | Technologies for Detecting Malicious Requests in Computer Networks Based on the DNS Protocol. | |
O’Hara | Cloud-based network telescope for Internet background radiation collection | |
Reikha et al. | A Survey on Predicting Distributed Denial of Service Attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Hao Inventor after: Ma Jinhui Inventor after: Wang Wei Inventor after: Zhang Wei Inventor after: Guo Xinghua Inventor before: Zhang Wei Inventor before: Guo Xinghua |
|
CB03 | Change of inventor or designer information | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201222 Address after: 230000 No. 9 Huangshan Road, Baohe District, Hefei City, Anhui Province Applicant after: STATE GRID ANHUI ELECTRIC POWER Co.,Ltd. Address before: 230000 commercial building 108, building 20b, Mingzhu garden, intersection of Lianhua Road and Danxia Road, Hefei Economic and Technological Development Zone, Anhui Province Applicant before: Hefei Yishihui Network Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210108 Termination date: 20210611 |
|
CF01 | Termination of patent right due to non-payment of annual fee |