CN102945254A - Method for detecting abnormal data among TB-level mass audit data - Google Patents

Method for detecting abnormal data among TB-level mass audit data Download PDF

Info

Publication number
CN102945254A
CN102945254A CN2012103957345A CN201210395734A CN102945254A CN 102945254 A CN102945254 A CN 102945254A CN 2012103957345 A CN2012103957345 A CN 2012103957345A CN 201210395734 A CN201210395734 A CN 201210395734A CN 102945254 A CN102945254 A CN 102945254A
Authority
CN
China
Prior art keywords
data
satisfy
filtercondition
pending data
presets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103957345A
Other languages
Chinese (zh)
Other versions
CN102945254B (en
Inventor
高翔
金华松
刘志光
叶松
翁志庚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN STRAIT INFORMATION Corp
Original Assignee
FUJIAN STRAIT INFORMATION Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN STRAIT INFORMATION Corp filed Critical FUJIAN STRAIT INFORMATION Corp
Priority to CN201210395734.5A priority Critical patent/CN102945254B/en
Publication of CN102945254A publication Critical patent/CN102945254A/en
Application granted granted Critical
Publication of CN102945254B publication Critical patent/CN102945254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method for detecting abnormal data among TB-level mass audit data. The method comprises the following steps: obtaining critical features of to-be-processed data, and judging whether the to-be-processed data satisfy the preset filtration conditions according to the critical features, if not, judging whether the to-be-processed data satisfy the preset harmless judgment conditions according to the critical features; and if not, judging that the to-be-processed data are abnormal. The method for detecting abnormal data among TB-level mass audit data, provided by the invention, can effectively analyze abnormal data by further analysis and judgment whether the to-be-processed data which do not satisfy the preset filtration conditions satisfy the preset harmless judgment conditions. With the technical scheme, a large amount of harmless data can be filtered out and the following analysis is not needed, so that the processing efficiency of the system is increased and the different types of illegal operations can be detected.

Description

The method of the data that in TB level magnanimity Audit data, note abnormalities
Technical field
The present invention relates to be applied in the database audit system for hospital information system, relate in particular to a kind of method of the data that in TB level magnanimity Audit data, note abnormalities.
Background technology
Development along with Hospital Informatization, hospital numerous operation systems are such as HIS, PACS, LIS etc. depend on database, can contact with the personnel in usage data storehouse also more and more, the daily servicing personnel of related service sections in the existing institute have again the third party attendants such as the various information system development merchant of hospital, integrator.Under the present this overall situation, exist the internal security risk, namely enter hospital information system to the compliance of access and the operation of data, to hospital information system maloperation, unauthorized operation etc. with the legal authorization identity.For example, a lot of medicine manufacturers are by the hospital internal channel, and the personal information of extracting the patient by the HIS system reaches the purpose of money-making.Again for example, the non-legally constituted authority side of medicine problem is exactly one of persistent ailment that is difficult to solve fully under this overall background.
Present non-legally constituted authority side means are diversified, complicated and specialized direction development before, obtain related data by the earliest SQL query invasion server mode till now, the side's of system instrument also develops into the professional by the database maintenance software at initial stage writes specialty system equation etc.Because technological means is various and complicated, the method for the anti-medicine system side of present stage hospital's discipline prison department can only be " education is for first, and system is main ", lacks the effective technology means of taking precautions against the behavior of non-legally constituted authority side.And database audit system normally operates relevant packet by crawl and hospital information system, and passes through in vain, the policy filtering of black rule, and realization is to the audit of database manipulation and user behavior, and the discovery harmful act is also reported to the police.
But often there is following shortcoming in said method.
Shortcoming 1: data volume is large, professional complicated, and under the regular auditing mode, the audit efficiency problem becomes " bottleneck ".
Shortcoming 2: traditional defining is white, and the new attack gimmick that the method for blacklist rule can't accurate description emerges in an endless stream causes auditing result inaccurate, might fail to report.
Shortcoming 3: need a large amount of manpowers to come that system is deceived rule in vain and safeguard.
Summary of the invention
For addressing the above problem, a kind of technical scheme that the present invention adopts is: a kind of method of the data that note abnormalities in TB level magnanimity Audit data is provided, comprises:
Obtain the key feature of pending data, and judge according to described key feature whether described pending data satisfy the filtercondition that presets;
If satisfy the filtercondition that presets, then judge described pending data as harmless data and store described pending data; If do not satisfy the filtercondition that presets, judge according to described key feature whether described pending data satisfy the harmless decision condition that presets;
If satisfy the harmless decision condition that presets, judge that then described pending data are harmless data, and generate new filtercondition according to described pending data; If do not satisfy the harmless decision condition that presets, judge that then described pending data are abnormal data.
Wherein, describedly judge that described pending data also comprise as after the step of abnormal data: list the abnormal data of judging in alarm meter, the concurrent alarming information of delivering newspaper.
Wherein, described key feature comprises: main frame ip address, SQL statement feature, operand, table name and working procedure name.
Wherein, the described filtercondition that presets comprises the first filtercondition and the second filtercondition, describedly judge that whether described pending data satisfy the filtercondition that presets and comprise step: judge whether described pending data do not satisfy the first filtercondition but satisfy the second filtercondition, if so, judge that then described pending data do not satisfy the filtercondition that presets.
Wherein, when described key feature was the SQL statement feature, the acquisition methods of described key feature was:
Whether comprise the database manipulation session to database in the session that the identification current system is set up;
If comprise, identify the database operating instruction in the described wide area information server operating sessions, obtain corresponding SQL statement feature.
Wherein, describedly judge that according to described key feature the step whether described pending data satisfy the filtercondition that presets comprises:
Add up described SQL statement feature and according to the difference of SQL statement feature with described pending Data classification;
Whether the statistics number of judging every kind of SQL statement feature reaches a threshold value, if reach, judges that then the pending data corresponding with the SQL statement feature that reaches a threshold value satisfy the first filtercondition;
If do not reach, then judge according to described key feature whether described pending data satisfy the second filtercondition, if satisfy, judge that then described pending data do not satisfy the filtercondition that presets.
Wherein, describedly judge that according to described key feature the step whether described pending data satisfy the harmless decision condition that presets comprises: in the statistics network main frame ip address of main frame and according to the difference of main frame ip address with described pending Data classification; And, judge whether each main frame ip address is present in the credible address table that presets, if exist, judge that then the pending data corresponding with described main frame ip address satisfy harmless decision condition, and generate the first new filtercondition according to these pending data.
Wherein, the acquisition methods of described main frame ip address is: receive and resolve the data message that main frame sends in the network, obtain the main frame ip address of carrying in the data message.
The invention has the beneficial effects as follows: it is white to be different from defining of prior art system, the new attack gimmick that the method for blacklist rule can't accurate description emerges in an endless stream, cause auditing result inaccurate, might fail to report, data volume is large, professional complicated, needing a large amount of manpowers to come that system is deceived rule in vain safeguards, the invention provides a kind of method of the data that in TB level magnanimity Audit data, note abnormalities, by whether the dissatisfied pending data that preset filtercondition being satisfied the judgement of the harmless decision condition that presets, be further analyzed, just can effectively analyze abnormal data.Utilize technique scheme, can filter out a large amount of harmless data, do not carry out next step analysis, thereby improved system's treatment effeciency, and can find various illegal operations.
Description of drawings
Fig. 1 is the method flow diagram of data of noting abnormalities in TB level magnanimity Audit data in an embodiment of the present invention;
Fig. 2 is the method flow diagram of data of noting abnormalities in TB level magnanimity Audit data in another embodiment of the present invention;
Fig. 3 is the method flow diagram that whether pending data satisfy the filtercondition that presets in other embodiment;
Fig. 4 is the method flow diagram that whether pending data satisfy the harmless decision condition that presets in the above-mentioned embodiment;
Fig. 5 is the method particular flow sheet of data of noting abnormalities in TB level magnanimity Audit data in the above-mentioned embodiment;
First filtercondition of Fig. 6 for providing in an embodiment of the present invention;
Second filtercondition of Fig. 7 for providing in the above-mentioned embodiment of the present invention;
The statement form of Fig. 8 for providing in the above-mentioned embodiment of the present invention;
The key feature that Fig. 9 provides for another embodiment of the present invention choose figure.
Embodiment
By describing technology contents of the present invention, structural attitude in detail, realized purpose and effect, below in conjunction with embodiment and cooperate that accompanying drawing is detailed to give explanation.
See also Fig. 1, present embodiment provides a kind of method of the data that note abnormalities in TB level magnanimity Audit data, comprise the steps:
Step S1, obtain the key feature of pending data, and judge according to described key feature whether described pending data satisfy the filtercondition that presets;
If step S2 satisfies the filtercondition that presets, judge that then described pending data are harmless data, and store described pending data; If do not satisfy the filtercondition that presets, judge according to described key feature whether described pending data satisfy the harmless decision condition that presets;
If step S3 satisfies the harmless decision condition that presets, judge that then described pending data are harmless data, and generate new filtercondition according to these pending data; If do not satisfy the harmless decision condition that presets, judge that described pending data are abnormal data.
In above-mentioned embodiment as shown in Figure 2, step S3 judges that described pending data are as also comprising after the abnormal data: step S4, list the abnormal data of judging in alarm meter, the concurrent alarming information of delivering newspaper.
In above-mentioned concrete embodiment, described key feature comprises: SQL statement feature and operand.The described filtercondition that presets comprises the first filtercondition and the second filtercondition, describedly judge that whether described pending data satisfy the filtercondition that presets and comprise step: judge whether described pending data do not satisfy the first filtercondition but satisfy the second filtercondition, if so, judge that then described pending data do not satisfy the filtercondition that presets.Be that the condition that described pending data do not satisfy the filtercondition preset is: described pending data satisfy the first filtercondition, but satisfied the second filtercondition.
See also Fig. 3 and Fig. 4, in above-mentioned another embodiment, when described key feature was the SQL statement feature, step S1 mainly comprised the steps:
Whether comprise the database manipulation session to database in the session that step S11, identification current system are set up; And, if comprise, identify the database operating instruction in the described wide area information server operating sessions, obtain corresponding SQL statement feature.
Step S12, the described SQL statement feature of statistics and according to the difference of SQL statement feature with described pending Data classification;
Step S13, judge whether the statistics number of every kind of SQL statement feature reaches a threshold value;
If step S14 reaches, judge that then the pending data corresponding with the SQL statement feature that reaches a threshold value satisfy the first filtercondition; If do not reach, judge that then the pending data corresponding with the SQL statement feature that reaches a threshold value do not satisfy the first filtercondition, and judge according to described key feature whether described pending data satisfy the second filtercondition;
If do not satisfy, judge that then described pending data satisfy the filtercondition that presets; If satisfy, judge that then described pending data do not satisfy the filtercondition that presets.
In the present invention, for understanding better so-called " SQL statement feature ", the applicant is in this for example explanation.Such as following two sql statements: " select a from b where name=gao " reaches " select a from b where name=huang ", these two statements only are " name condition " differences, other agent structure is all consistent, and it is identical so then to regard as sql statement feature.That is to say that as long as some sql statement effect in medical system is in full accord, it is identical to regard as so sql statement feature.
Step S2 mainly comprise the steps: the main frame ip address of main frame in step 201, the statistics network and according to the difference of main frame ip address with described pending Data classification; Step 202, judge whether each main frame ip address is present in the credible address table that presets; And if step S203 do not exist, judge that then the pending data corresponding with described main frame ip address do not satisfy harmless decision condition; If exist, judge that then the pending data corresponding with described main frame ip address satisfy harmless decision condition, and generate the first new filtercondition according to these pending data.
In the above-described embodiment, the acquisition methods of described main frame ip address is: receive and resolve the data message that main frame sends in the network, obtain the main frame ip address of carrying in the data message.
By foregoing description as can be known, for satisfying the first filtercondition but the pending data that do not satisfy the second filtercondition are the data for doubtful abnormal data, again by whether the dissatisfied pending data that preset filtercondition being satisfied the judgement of the harmless decision condition that presets, be further analyzed, just can effectively analyze abnormal data.Utilize technique scheme, can filter out a large amount of harmless data, do not carry out next step analysis, thereby improved system's treatment effeciency, and can find various illegal operations.The present invention also generates new filtering rule according to the pending data that satisfy harmless decision condition, again whether such pending data are satisfied the judgement of the harmless decision condition that presets when being unlikely to again to filter, further embodied intelligent, real-time of the present invention and accuracy, efficientibility.
Consult Fig. 5 to Fig. 8, the invention provides a concrete embodiment, comprising:
Step S1, gather pending data, obtain the key feature of pending data.
Step S2, according to described key feature described pending data are carried out white list and filter;
If described key feature meets the first filtercondition that white list presets, be harmless data with described pending data judging so, and store; If described key feature does not meet the first filtercondition that white list presets, so then according to described key feature described pending data are carried out blacklist and filter;
If described key feature does not meet the second filtercondition that blacklist presets, be harmless data with described pending data judging so, and store; If described key feature meets the second filtercondition that blacklist presets, so then carry out step S3.In step S2, the embodiment here can be previously described embodiment, does not repeat them here.
In concrete embodiment, the first filtercondition that described white list presets as shown in Figure 6, the second filtercondition that described blacklist presets is as shown in Figure 7.As example among Fig. 6 take ip address, source, can obtain the source ip of official's program by statistics, we just are set to it the first filtercondition, meet the data that the ip address of this first filtercondition transmit and then be harmless data, in Fig. 6, ip address, the source 10.10.19.103,10.10.19.112,10.10.19.113,10.10.19.117,10.10.19.119,10.10.19.129, the 10.10.19.142 that choose are safe ip address, and the data that transmit by these ip addresses so are harmless data.Be exactly the second filtercondition that we arrange among Fig. 7---be the blacklist rule, if choose some rule and activated them, meet so these regular packets and just will be processed by step S3, namely enter accurate alarm meter these packets are classified.But it should be noted that such as us to have defined default rule 3, might not be that the hacker triggers this rule, and major part is hospital management system official operation and triggering.We are just by automatic statistical, warning to triggering rule 3 is classified (such as classifying according to source ip, and obtain the quantity that each source ip triggers, if certain ip frequently triggered within a period of time, it is exactly that official's program is managing or adding up so), and according to quantity, filter out that part of administrators of the hospital's operation triggering, stay to occur probability very low, those all are that some hackers do mostly.Step S3, reception and parsing are by the packet of said process, obtain the main frame ip address that sends described pending data, add up described main frame ip address and according to the difference of main frame ip address with described pending Data classification, and judge whether each main frame ip address is present in the credible address table that presets;
If exist, judge that then the pending data corresponding with described main frame ip address are harmless data, and generate new white list rule according to these pending data, return step S1, use new white list rule to finish next time and filter; If do not exist, judge that then the pending data corresponding with described main frame ip address are abnormal data, list the abnormal data of judging in alarm meter, the concurrent alarming information of delivering newspaper is made corresponding form.In concrete embodiment, statement form comprises the source ip of abnormal data, target ip, and corresponding SQL statement, mode of operation, operand, rule names etc. also can generate bar chart as shown in Figure 8 when making, more directly perceived.
In other embodiment, also can generate the such bar chart of Fig. 9, in Fig. 9, key feature comprises: main frame ip address, SQL statement feature, operand, table name and working procedure name, in the present embodiment, key feature only is not with a certain, also can multiplely use simultaneously, the user can select key feature voluntarily.
In sum, it is white to be different from defining of prior art system, the new attack gimmick that the method for blacklist rule can't accurate description emerges in an endless stream, cause auditing result inaccurate, might fail to report, data volume is large, professional complicated, needing a large amount of manpowers to come that system is deceived rule in vain safeguards, the invention provides a kind of method of the data that in TB level magnanimity Audit data, note abnormalities, by whether the dissatisfied pending data that preset filtercondition being satisfied the judgement of the harmless decision condition that presets, be further analyzed, just can effectively analyze abnormal data.Utilize technique scheme, can filter out a large amount of harmless data, do not carry out next step analysis, thereby improved system's treatment effeciency, and can find various illegal operations.
The above only is embodiments of the invention; be not so limit claim of the present invention; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to do; or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (8)

1. the method for data that notes abnormalities in TB level magnanimity Audit data is characterized in that, comprising:
Obtain the key feature of pending data, and judge according to described key feature whether described pending data satisfy the filtercondition that presets;
If satisfy the filtercondition that presets, then judge described pending data as harmless data and store described pending data; If do not satisfy the filtercondition that presets, judge according to described key feature whether described pending data satisfy the harmless decision condition that presets;
If satisfy the harmless decision condition that presets, judge that then described pending data are harmless data, and generate new filtercondition according to described pending data; If do not satisfy the harmless decision condition that presets, judge that then described pending data are abnormal data.
2. the method for the data that in TB level magnanimity Audit data, note abnormalities according to claim 1, it is characterized in that, describedly judge that described pending data also comprise as after the step of abnormal data: list the abnormal data of judging in alarm meter, the concurrent alarming information of delivering newspaper.
3. the method for the data that note abnormalities in TB level magnanimity Audit data according to claim 1 and 2 is characterized in that described key feature comprises: main frame ip address, SQL statement feature, operand, table name and working procedure name.
4. the method for the data that in TB level magnanimity Audit data, note abnormalities according to claim 3, it is characterized in that, the described filtercondition that presets comprises the first filtercondition and the second filtercondition, describedly judge that whether described pending data satisfy the filtercondition that presets and comprise step: judge whether described pending data do not satisfy the first filtercondition but satisfy the second filtercondition, if so, judge that then described pending data do not satisfy the filtercondition that presets.
5. the method for the data that note abnormalities in TB level magnanimity Audit data according to claim 4 is characterized in that when described key feature was the SQL statement feature, the acquisition methods of described key feature was:
Whether comprise the database manipulation session to database in the session that the identification current system is set up;
If comprise, identify the database operating instruction in the described wide area information server operating sessions, obtain corresponding SQL statement feature.
6. the method for the data that note abnormalities in TB level magnanimity Audit data according to claim 5 is characterized in that, describedly judges that according to described key feature the step whether described pending data satisfy the filtercondition that presets comprises:
Add up described SQL statement feature and according to the difference of SQL statement feature with described pending Data classification;
Whether the statistics number of judging every kind of SQL statement feature reaches a threshold value, if reach, judges that then the pending data corresponding with the SQL statement feature that reaches a threshold value satisfy the first filtercondition;
If do not reach, then judge according to described key feature whether described pending data satisfy the second filtercondition, if satisfy, judge that then described pending data do not satisfy the filtercondition that presets.
7. the method for the data that note abnormalities in TB level magnanimity Audit data according to claim 6 is characterized in that, describedly judges that according to described key feature the step whether described pending data satisfy the harmless decision condition that presets comprises:
In the statistics network main frame ip address of main frame and according to the difference of main frame ip address with described pending Data classification;
And, judge whether each main frame ip address is present in the credible address table that presets, if exist, judge that then the pending data corresponding with described main frame ip address satisfy harmless decision condition, and generate the first new filtercondition according to these pending data.
8. the method for the data that in TB level magnanimity Audit data, note abnormalities according to claim 7, it is characterized in that, the acquisition methods of described main frame ip address is: receive and resolve the data message that main frame sends in the network, obtain the main frame ip address of carrying in the data message.
CN201210395734.5A 2012-10-18 2012-10-18 The method of the data that note abnormalities in TB level magnanimity Audit data Active CN102945254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210395734.5A CN102945254B (en) 2012-10-18 2012-10-18 The method of the data that note abnormalities in TB level magnanimity Audit data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210395734.5A CN102945254B (en) 2012-10-18 2012-10-18 The method of the data that note abnormalities in TB level magnanimity Audit data

Publications (2)

Publication Number Publication Date
CN102945254A true CN102945254A (en) 2013-02-27
CN102945254B CN102945254B (en) 2015-12-16

Family

ID=47728198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210395734.5A Active CN102945254B (en) 2012-10-18 2012-10-18 The method of the data that note abnormalities in TB level magnanimity Audit data

Country Status (1)

Country Link
CN (1) CN102945254B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063473A (en) * 2014-06-30 2014-09-24 江苏华大天益电力科技有限公司 Database auditing monitoring system and database auditing monitoring method
CN105704146A (en) * 2016-03-18 2016-06-22 四川长虹电器股份有限公司 System and method for SQL injection prevention
CN103678716B (en) * 2013-12-31 2017-01-04 中国科学院深圳先进技术研究院 A kind of Distributed Storage based on formatted data collection and computational methods
CN110363014A (en) * 2019-07-05 2019-10-22 上海瀚之友信息技术服务有限公司 A kind of auditing system of database
CN112764962A (en) * 2021-01-29 2021-05-07 恒鸿达科技有限公司 Tracking method and system for application version exception recovery

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741855A (en) * 2009-12-16 2010-06-16 中兴通讯股份有限公司 Maintenance method of address resolution protocol cache list and network equipment
CN101895420A (en) * 2010-07-12 2010-11-24 西北工业大学 Rapid detection method for network flow anomaly
CN101902366A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Method and system for detecting abnormal service behaviors
CN102413127A (en) * 2011-11-09 2012-04-11 中国电力科学研究院 Database generalization safety protection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902366A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Method and system for detecting abnormal service behaviors
CN101741855A (en) * 2009-12-16 2010-06-16 中兴通讯股份有限公司 Maintenance method of address resolution protocol cache list and network equipment
CN101895420A (en) * 2010-07-12 2010-11-24 西北工业大学 Rapid detection method for network flow anomaly
CN102413127A (en) * 2011-11-09 2012-04-11 中国电力科学研究院 Database generalization safety protection method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678716B (en) * 2013-12-31 2017-01-04 中国科学院深圳先进技术研究院 A kind of Distributed Storage based on formatted data collection and computational methods
CN104063473A (en) * 2014-06-30 2014-09-24 江苏华大天益电力科技有限公司 Database auditing monitoring system and database auditing monitoring method
CN104063473B (en) * 2014-06-30 2017-11-17 北京华电天益信息科技有限公司 A kind of database audit monitoring system and its method
CN105704146A (en) * 2016-03-18 2016-06-22 四川长虹电器股份有限公司 System and method for SQL injection prevention
CN110363014A (en) * 2019-07-05 2019-10-22 上海瀚之友信息技术服务有限公司 A kind of auditing system of database
CN112764962A (en) * 2021-01-29 2021-05-07 恒鸿达科技有限公司 Tracking method and system for application version exception recovery

Also Published As

Publication number Publication date
CN102945254B (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN104937886B (en) Log analysis device, information processing method
CN109951500B (en) Network attack detection method and device
US9386036B2 (en) Method for detecting and preventing a DDoS attack using cloud computing, and server
US8819807B2 (en) Apparatus and method for analyzing and monitoring sap application traffic, and information protection system using the same
EP4060939B1 (en) Cyber defence system
CN106790023A (en) Network security Alliance Defense method and apparatus
US20080096526A1 (en) Apparatus and a security node for use in determining security attacks
WO2019041774A1 (en) Customer information screening method and apparatus, electronic device, and medium
CN104509034A (en) Pattern consolidation to identify malicious activity
CN102945254A (en) Method for detecting abnormal data among TB-level mass audit data
CN105827594A (en) Suspicion detection method based on domain name readability and domain name analysis behavior
CN106850647B (en) Malicious domain name detection algorithm based on DNS request period
CN114598525A (en) IP automatic blocking method and device for network attack
Born et al. Ngviz: detecting dns tunnels through n-gram visualization and quantitative analysis
CN111181978B (en) Abnormal network traffic detection method and device, electronic equipment and storage medium
CN109257393A (en) XSS attack defence method and device based on machine learning
CN102882748A (en) Network access detection system and network access detection method
CN113360566A (en) Information content monitoring method and system
CN114785567B (en) Flow identification method, device, equipment and medium
KR102295488B1 (en) System and method for exponentiation of security element to analyze danger
KR101666791B1 (en) System and method of illegal usage prediction and security for private information
CN115632884B (en) Network security situation perception method and system based on event analysis
CN112769739A (en) Database operation violation processing method, device and equipment
CN110474888A (en) A kind of free-standing sql injection defence analysis alarm method and its system based on php
CN105553990A (en) Network security triple anomaly detection method based on decision tree algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant