CN110324312A - Network attack map-indication method and storage medium - Google Patents

Network attack map-indication method and storage medium Download PDF

Info

Publication number
CN110324312A
CN110324312A CN201910431158.7A CN201910431158A CN110324312A CN 110324312 A CN110324312 A CN 110324312A CN 201910431158 A CN201910431158 A CN 201910431158A CN 110324312 A CN110324312 A CN 110324312A
Authority
CN
China
Prior art keywords
attack
network attack
network
map
destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910431158.7A
Other languages
Chinese (zh)
Inventor
谢鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sw Technology Co Ltd
Original Assignee
Sw Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sw Technology Co Ltd filed Critical Sw Technology Co Ltd
Priority to CN201910431158.7A priority Critical patent/CN110324312A/en
Publication of CN110324312A publication Critical patent/CN110324312A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention discloses a kind of network attack map-indication method and storage mediums.The described method includes: obtaining different types of network attack data in network;Network attack data are parsed, network attack information is obtained;Arrange network attack information, it draws and shows network attack map, the network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, it is shown in a manner of light beam animation on map from attack source to the attack of attack destination, the circle for gradually spreading and fading out is shown after light beam arrives at the destination, the size of circle indicates the severity of attack.The multiple rolling zone of alarm of the setting of the network attack map with distinguishing real-time display attack source, attack destination, primary challenge list, primary challenge type.The present invention can show the region of network attack, can the severity to network attack quantified in a manner of color, thickness, circle size etc., have and roll zone of alarm, it is display interface image, intuitive, it is visual strong.

Description

Network attack map-indication method and storage medium
Technical field
The present invention relates to network safety fileds, and network attack direction is shown specifically, being related to one kind, and shows The method and storage medium of geographical diversity occur with the time for network attack.
Background technique
With the development of " internet+", more and more business are transferred on line under line, and operation system also carries more More requirements for access.At the same time, network security also becomes extremely important problem.A variety of different network attacks can be directed to The various loopholes of business platform itself carry out network attack to internet service platform, or carry out network and steal secret information, and above-mentioned one It cuts and the normal operation of business is all made to be affected.And the ways and means of network attack can be with the development of time, evolution Different mode and means out.
In recent years, network attack has showed trend, the hackers such as borderlessization, real time implementation, multiple spot superpositionization and organizes energy Enough while using the multiple main frames for being distributed in diverse geographic location start the network attack for a certain host, therefore, how It is enough to show network attack map from dull, simple network attack data packet, network attack is embodied in region and temporal Feature to rapidly find potential network attack storm, and then accurately improves security level, carries out safety precaution, at The technical issues of for prior art urgent need to resolve.
Summary of the invention
In view of this, it is an object of the invention to propose a kind of network attack map-indication method and storage medium, it can The acquired different network attack packets of parsing, obtain relevant regional information and network attack type, and real on map When show, and embody the difference of network attack degree.
A kind of network attack map-indication method, includes the following steps:
Obtain different types of network attack data in network;
Obtained network attack data are parsed, obtain network attack information, the network attack information includes: net The time of origin of network attack, attack source, attack destination, attack type and attacked port;
The network attack information is arranged, the network attack quantity in the unit time is counted, draws network attack Map, the network attack map is using map as Background From Layer, dynamic with light beam on map according to the sequence of Network Attack Time The mode of picture shows that the attack from attack source to attack destination is attacked after the light beam arrives at the destination described It hits destination and shows the circle for gradually spreading and fading out, the size of the circle indicates the severity of attack;
Show the network attack map.
Preferably, zone of alarm is rolled in the setting of the network attack map, the zone of alarm that rolls is in the difference of map Position setting it is multiple, one or more of following information of real-time display respectively: attack source, attack destination, mainly attack Hit list, primary challenge type.
When preferably, when rolling zone of alarm display attack source, the network attack on different attack source ground can be shown Quantity;
When the rolling zone of alarm shows attack destination, the number of the network attack of different attack destinations can be shown Amount;
When the rolling zone of alarm shows primary challenge type, the number of the network attack of different attack types can be shown Amount;
When the rolling zone of alarm shows primary challenge list, it can show that frequency is higher in above-mentioned network attack, or The biggish network attack of person's harmfulness, the primary challenge list include the specifying information attacked every time.
Preferably, the specifying information attacked every time includes the attack time, attack type, attack source attacked every time IP, region, Attacking Packets type and attacked port are attacked
Preferably, additionally it is possible to network attack severity is indicated using the thickness of light beam, the color of light beam.
Preferably, the network attack severity is related with the frequency of network attack, the type of network attack.
Preferably, common system deployment place is marked in the map as Background From Layer.
Preferably, the network attack data can be attacked by big data platform or network routing device or network It hits in suction device and obtains.
The invention also discloses a kind of storage mediums, for storing computer executable instructions,
Computer executable instructions perform claim when being executed by processor requires side described in any one of 1-8 Method.
Compared with the existing technology, the present invention has the advantage that
(1) region of network attack, including attack source and target of attack can be shown, so that image learns network Attack condition;
(2) can the severity to network attack quantified in a manner of color, thickness, circle size etc., with improve It is visual;
(3) have and roll zone of alarm, carry out classification real-time display for disparity items respectively.
(4) display interface is vivid, intuitive, visual strong.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present invention, the above and other purposes of the present invention, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the flow chart of the network attack map-indication method of specific embodiment according to the present invention;
Fig. 2 is the example of the shown network attack map of specific embodiment according to the present invention.
Specific embodiment
Below based on embodiment, present invention is described, but the present invention is not restricted to these embodiments.
These processes, process, logical block, function etc. are generally considered to be the step of reaching ideal or expected result Or the self-consistent sequence of instruction.Step generally comprises the physical manipulation of physical quantity.Under normal conditions, although being not necessarily, these numbers Amount often takes the forms such as electricity, magnetic, optics or quantum signal, they can be stored, and transfers the possession of, and merges, compares, and otherwise It is controlled by computer or data processing system.Facts proved that sometimes for convenience's sake, in view of shared reason, this A little signals are referred to as the similar title such as position, wave, waveform, stream, value, element, symbol, letter, term, number, in computer journey It is referred to as code (may be object code, source code or binary code) in sequence or software.
The present invention obtains network attack data, and the time of statistics network attack, type, number of times of attack, attack source first Ground, target of attack, attacked port, and using map as Background From Layer, with the sequence of Network Attack Time, with light beam on map Mode show from attack source to the attack of attack destination, thus intuitively show the target of attack with Severity.
Specifically, showing the stream of the network attack map-indication method of specific embodiment according to the present invention referring to Fig. 1 Cheng Tu includes the following steps:
Step S110: different types of network attack data in network are obtained;
Illustratively, which can be obtained by the Network Security Device in network equipment front end, net The equipment that network safety equipment can have such as TSM Security Agent, by being embedded in tracked information in the response to access request to chase after Track invader, and then obtain the partial data of network attack.
Alternatively, the data also can be by data interflow center, for example, the embedded network in the router of core node Safety equipment obtains data packet Scanning Detction.
Alternatively, the data can also be obtained by the big data platform of several Network Security Devices.
For example, several operation systems are arranged in a network, attract the attack in network, and obtain using data collection mechanism The big data for obtaining network attack data, to obtain network attack data.
Step S120: parsing obtained network attack data, obtains time of origin, the attack source of network attack The network attacks information such as ground, attack destination, attack type, attacked port.
The information of the network attack obtained in this step obtains data basis for the drafting of network attack map.
Illustratively, the attack source and attack destination, can be obtained by attack source IP and attack destination IP.
Step S130: arranging the network attack information, counts the network attack quantity in the unit time, draws Network attack map, the network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, on map It is shown in a manner of light beam animation from attack source to the attack of attack destination, after the light beam arrives at the destination, The circle for gradually spreading and fading out is shown in the attack destination, the size of the circle indicates the severity of attack, The severity of the attack and in the unit time attack quantity, i.e., attack frequency it is related with attack type.
In this step, all network attacks can be counted according to the time, obtains network in the unit time and attacks The quantity hit, the network attack higher than threshold value are just shown, and the network attack lower than threshold value is no longer displayed by, to avoid display letter Breath is excessive, so that emphasis be caused not protrude.
Different grades can be set for attack type, such as from 1-5 grade, attack frequency is also set different Then the two is weighted the severity for setting attack by grade.
Further, the thickness of the light beam and the size of circle indicate the severity of attack, with more The severity of the embodiment network attack of image.
Further, additionally it is possible to the difference of network attack severity is indicated with the difference of the color of the light beam, for example, The network attack extent of injury is lower using green, and more serious use yellow is serious using red, very serious to adopt With peony etc..
Further, common system deployment can be marked in map, for example, certain operation system is deployed in north respectively Capital, Shanghai, Guangzhou, Chengdu enable then in above-mentioned 4 places icon representation key area when network attack occurs It is enough to remind user rapidly.
In a specific embodiment, the network attack type includes: information sniff, penetration attack, captures invasion And malicious act.
Step S140: the network attack map is shown.
For example, can be shown on the display unit.
Further, zone of alarm can be rolled in the setting of the network attack map, the rolling zone of alarm is in map Different positions settings it is multiple, show one or more of following information respectively: attack source, it is attack destination, main Attack list, primary challenge type.
Specifically, when the rolling zone of alarm show attack source when, can show the network attack on different attack source ground Quantity.
When the rolling zone of alarm shows attack destination, the number of the network attack of different attack destinations can be shown Amount.
When the rolling zone of alarm shows primary challenge type, the number of the network attack of different attack types can be shown Amount.
When the rolling zone of alarm shows primary challenge list, it can show that frequency is higher in above-mentioned network attack, or The biggish network attack of person's harmfulness.Primary challenge list includes the specifying information attacked every time, including attack time, attack class Type, is attacked region, Attacking Packets type (such as http), attacked port etc. at attack source IP.
Rolling information shown by zone of alarm can be updated with the progress of time, that is, show nearest one end time Interior major networks attack information, and the network attack information can add up with the progress of time.
The present invention further discloses a kind of storage mediums, for storing computer executable instructions,
The computer executable instructions execute above-mentioned method when being executed by processor.
Therefore, the security threat for the different levels for current system that the present invention is collected into is carried out according to frequency, time Statistics is shown by attack chain figure.
Compared with the existing technology, the present invention has the advantage that
(1) region of network attack, including attack source and target of attack can be shown, so that image learns network Attack condition;
(2) can the severity to network attack quantified in a manner of color, thickness, circle size etc., with improve It is visual;
(3) have and roll zone of alarm, carry out classification real-time display for disparity items respectively.
(4) display interface is vivid, intuitive, visual strong.
As skilled in the art will be aware of, various aspects of the invention may be implemented as system, method or meter Calculation machine program product.Therefore, various aspects of the invention can take following form: complete hardware embodiment, complete software Embodiment (including firmware, resident software, microcode etc.) or herein usually can referred to as " circuit ", " module " or The embodiment that software aspects are combined with hardware aspect of " system ".In addition, aspect of the invention can take following shape Formula: the computer program product realized in one or more computer-readable medium, computer-readable medium have on it The computer readable program code of realization.
It can use any combination of one or more computer-readable mediums.Computer-readable medium can be computer Readable signal medium or computer readable storage medium.Computer readable storage medium can be such as (but not limited to) electronics, Magnetic, optical, electromagnetism, infrared or semiconductor system, device or any suitable combination above-mentioned.Meter The more specific example (exhaustive to enumerate) of calculation machine readable storage medium storing program for executing will include the following terms: with one or more electric wire Electrical connection, hard disk, random access memory (RAM), read-only memory (ROM), erasable is compiled portable computer diskette Journey read-only memory (EPROM or flash memory), optical fiber, portable optic disk read-only storage (CD-ROM), light storage device, Magnetic memory apparatus or any suitable combination above-mentioned.In the context of this document, computer readable storage medium can be It can include or store the program used by instruction execution system, device or combine instruction execution system, equipment or dress Set any tangible medium of the program used.
Computer-readable signal media may include the data-signal propagated, and the data-signal of the propagation has wherein The computer readable program code realized such as a part in a base band or as carrier wave.The signal of such propagation can use Any form in diversified forms, including but not limited to: electromagnetism, optical or its any combination appropriate.It is computer-readable Signal media can be following any computer-readable medium: not be computer readable storage medium, and can be to by instructing Program that is that execution system, device use or combining instruction execution system, device to use is communicated, is propagated Or transmission.
Including but not limited to wireless, wired, fiber optic cables, RF etc. or above-mentioned any appropriately combined any can be used Suitable medium transmits the program code realized on a computer-readable medium.
Computer program code for executing the operation for being directed to various aspects of the present invention can be with one or more programming languages Any combination of speech is write, and the programming language includes: programming language such as Java, Smalltalk, C++ of object-oriented etc.; And conventional process programming language such as " C " programming language or similar programming language.Program code can be used as independent software package Fully on the user computer, partly execute on the user computer;Partly exist on the user computer and partly It is executed on remote computer;Or it fully executes on a remote computer or server.It in the latter case, can will be remote Journey computer by include local area network (LAN) or wide area network (WAN) any type of network connection to subscriber computer, or (such as internet by using ISP) can be attached with outer computer.
It will be appreciated that the block in each of flow chart legend and/or block diagram piece and flow chart legend and/or block diagram Combination can be realized by computer program instructions.These computer program instructions can be provided to general purpose computer, specially With computer or the processor of other programmable data processing devices, to generate machine, so that (via computer or other compiling What the processor of journey data processing equipment executed) instruction creation is for realizing the function specified in flowchart and or block diagram block or block The device of energy/movement.
These computer program instructions can also be stored in can instruct computer, other programmable data processing devices Or in the computer-readable medium that runs in a specific way of other devices, so that the instruction stored in computer-readable medium produces Raw includes the product for realizing the instruction for the function action specified in flowchart and or block diagram block or block.
Computer program instructions can also be loaded on computer, other programmable data processing devices or other devices On so that executed on computer, other programmable devices or other devices it is a series of can operating procedure come generate computer reality Existing process, so that the instruction executed on computer or other programmable devices is provided for realizing in flow chart and/or frame The process for the function action specified in segment or block.
The above description is only a preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art For, the invention can have various changes and changes.All any modifications made within the spirit and principles of the present invention are equal Replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of network attack map-indication method, includes the following steps:
Obtain different types of network attack data in network;
Obtained network attack data are parsed, obtain network attack information, the network attack information includes: that network is attacked The time of origin that hits, attack source, attack destination, attack type and attacked port;
The network attack information is arranged, the network attack quantity in the unit time is counted, draws network attack map, The network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, with light beam animation on map Mode is shown from attack source to the attack of attack destination, after the light beam arrives at the destination, in the attack mesh Ground show the circle for gradually spreading and fading out, the size of the circle indicates the severity of attack;
Show the network attack map.
2. network attack map-indication method according to claim 1, which is characterized in that in the network attack map Setting rolls zone of alarm, and the zone of alarm that rolls is multiple in the different position settings of map, respectively the following information of real-time display One or more of: attack source, attack destination, primary challenge list, primary challenge type.
3. network attack map-indication method according to claim 2, which is characterized in that when the rolling zone of alarm is shown Attack source when, can show the quantity of the network attack on different attack source ground;
When the rolling zone of alarm shows attack destination, the quantity of the network attack of different attack destinations can be shown;
When the rolling zone of alarm shows primary challenge type, the quantity of the network attack of different attack types can be shown;
When the rolling zone of alarm shows primary challenge list, the net for meeting predetermined condition in above-mentioned network attack can be shown Network attack, the primary challenge list includes the specifying information attacked every time.
4. network attack map-indication method according to claim 3, which is characterized in that the specific letter attacked every time Breath includes the attack time attacked every time, attack type, attack source IP, is attacked region, Attacking Packets type and attack end Mouthful
5. network attack map-indication method according to claim 1, which is characterized in that the thickness of the light beam, light beam Color for indicating network attack severity.
6. network attack map-indication method according to claim 1, which is characterized in that the network attack severity It is determined according to the frequency of network attack and the type of network attack.
7. network attack map-indication method according to claim 1, it is characterised in that:
Common system deployment place is marked in the map as Background From Layer.
8. network attack map-indication method according to claim 1, it is characterised in that:
The network attack data in big data platform or network routing device or network attack suction device by obtaining It takes.
9. a kind of storage medium, for storing computer executable instructions, which is characterized in that the computer executable instructions exist Perform claim requires method described in any one of 1-8 when being executed by processor.
CN201910431158.7A 2019-05-22 2019-05-22 Network attack map-indication method and storage medium Pending CN110324312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910431158.7A CN110324312A (en) 2019-05-22 2019-05-22 Network attack map-indication method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910431158.7A CN110324312A (en) 2019-05-22 2019-05-22 Network attack map-indication method and storage medium

Publications (1)

Publication Number Publication Date
CN110324312A true CN110324312A (en) 2019-10-11

Family

ID=68113316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910431158.7A Pending CN110324312A (en) 2019-05-22 2019-05-22 Network attack map-indication method and storage medium

Country Status (1)

Country Link
CN (1) CN110324312A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110809010A (en) * 2020-01-08 2020-02-18 浙江乾冠信息安全研究院有限公司 Threat information processing method, device, electronic equipment and medium
CN111726352A (en) * 2020-06-17 2020-09-29 杭州安恒信息技术股份有限公司 Method, apparatus, computer device and medium for visually monitoring probe status
CN111901331A (en) * 2020-07-27 2020-11-06 杭州迪普科技股份有限公司 Security situation perception visualization method and device
CN112256791A (en) * 2020-10-27 2021-01-22 北京微步在线科技有限公司 Network attack event display method and storage medium
CN113542036A (en) * 2021-09-14 2021-10-22 广州锦行网络科技有限公司 Demonstration method, electron and demonstration device for network attack behaviors

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065622A (en) * 2013-03-20 2014-09-24 腾讯科技(深圳)有限公司 Security early warning method and apparatus of network equipment
CN104965847A (en) * 2015-02-04 2015-10-07 北京奇虎科技有限公司 Information displaying method and apparatus
CN105207986A (en) * 2015-07-31 2015-12-30 北京奇虎科技有限公司 Method and device for displaying network attack behavior
CN105516174A (en) * 2015-12-25 2016-04-20 北京奇虎科技有限公司 Network attack tracking display system and method
CN105959184A (en) * 2016-07-14 2016-09-21 杨林 Smart indoor air purification system
CN106209856A (en) * 2016-07-14 2016-12-07 何钟柱 Big data security postures based on trust computing ground drawing generating method
CN109728934A (en) * 2018-12-03 2019-05-07 清华大学 Cyberspace cartographic model creation method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065622A (en) * 2013-03-20 2014-09-24 腾讯科技(深圳)有限公司 Security early warning method and apparatus of network equipment
CN104965847A (en) * 2015-02-04 2015-10-07 北京奇虎科技有限公司 Information displaying method and apparatus
CN105207986A (en) * 2015-07-31 2015-12-30 北京奇虎科技有限公司 Method and device for displaying network attack behavior
CN105516174A (en) * 2015-12-25 2016-04-20 北京奇虎科技有限公司 Network attack tracking display system and method
CN105959184A (en) * 2016-07-14 2016-09-21 杨林 Smart indoor air purification system
CN106209856A (en) * 2016-07-14 2016-12-07 何钟柱 Big data security postures based on trust computing ground drawing generating method
CN109728934A (en) * 2018-12-03 2019-05-07 清华大学 Cyberspace cartographic model creation method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110809010A (en) * 2020-01-08 2020-02-18 浙江乾冠信息安全研究院有限公司 Threat information processing method, device, electronic equipment and medium
CN111726352A (en) * 2020-06-17 2020-09-29 杭州安恒信息技术股份有限公司 Method, apparatus, computer device and medium for visually monitoring probe status
CN111901331A (en) * 2020-07-27 2020-11-06 杭州迪普科技股份有限公司 Security situation perception visualization method and device
CN112256791A (en) * 2020-10-27 2021-01-22 北京微步在线科技有限公司 Network attack event display method and storage medium
CN113542036A (en) * 2021-09-14 2021-10-22 广州锦行网络科技有限公司 Demonstration method, electron and demonstration device for network attack behaviors
CN113542036B (en) * 2021-09-14 2022-01-04 广州锦行网络科技有限公司 Demonstration method, electron and demonstration device for network attack behaviors

Similar Documents

Publication Publication Date Title
CN110324312A (en) Network attack map-indication method and storage medium
AU2019216687B2 (en) Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
CN110351229B (en) Terminal UE (user equipment) management and control method and device
Lo et al. A cooperative intrusion detection system framework for cloud computing networks
CN108063765B (en) SDN system suitable for solving network security
US10805340B1 (en) Infection vector and malware tracking with an interactive user display
CN110336785A (en) The method for visualizing and storage medium of network attack chain figure
CN107612890B (en) Network monitoring method and system
CN103457931A (en) Active defense method for network trick and counter attack
CN108234404A (en) A kind of defence method of ddos attack, system and relevant device
Khemariya et al. An efficient algorithm for detection of blackhole attack in aodv based manets
Seo et al. APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks
Verma et al. IP-CHOCK (filter)-Based detection scheme for Denial of Service (DoS) attacks in VANET
CN106302373A (en) A kind of connection control method and terminal
CN103701818A (en) ARP (address resolution protocol) attack centralized detection and defense method for wireless controller system
CN106330935A (en) Phishing Wi-Fi detection method
CN108777650A (en) A kind of Anonymizing networks source tracing method based on controlled node
CN107426241A (en) A kind of method and device of network safety prevention
US9578039B2 (en) OAM security authentication method and OAM transmitting/receiving devices
CN113098894A (en) SDN IP address hopping method based on randomization algorithm
ES2938762T3 (en) System, device and procedure for detection, mitigation and isolation of a signaling storm
Mandala et al. Quantifying the severity of blackhole attack in wireless mobile adhoc networks
KR20140044970A (en) Method and apparatus for controlling blocking of service attack by using access control list
CN107171867A (en) The guard system of ddos attack
CN104967589B (en) A kind of safety detecting method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011

RJ01 Rejection of invention patent application after publication