CN110324312A - Network attack map-indication method and storage medium - Google Patents
Network attack map-indication method and storage medium Download PDFInfo
- Publication number
- CN110324312A CN110324312A CN201910431158.7A CN201910431158A CN110324312A CN 110324312 A CN110324312 A CN 110324312A CN 201910431158 A CN201910431158 A CN 201910431158A CN 110324312 A CN110324312 A CN 110324312A
- Authority
- CN
- China
- Prior art keywords
- attack
- network attack
- network
- map
- destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/26—Visual data mining; Browsing structured data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention discloses a kind of network attack map-indication method and storage mediums.The described method includes: obtaining different types of network attack data in network;Network attack data are parsed, network attack information is obtained;Arrange network attack information, it draws and shows network attack map, the network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, it is shown in a manner of light beam animation on map from attack source to the attack of attack destination, the circle for gradually spreading and fading out is shown after light beam arrives at the destination, the size of circle indicates the severity of attack.The multiple rolling zone of alarm of the setting of the network attack map with distinguishing real-time display attack source, attack destination, primary challenge list, primary challenge type.The present invention can show the region of network attack, can the severity to network attack quantified in a manner of color, thickness, circle size etc., have and roll zone of alarm, it is display interface image, intuitive, it is visual strong.
Description
Technical field
The present invention relates to network safety fileds, and network attack direction is shown specifically, being related to one kind, and shows
The method and storage medium of geographical diversity occur with the time for network attack.
Background technique
With the development of " internet+", more and more business are transferred on line under line, and operation system also carries more
More requirements for access.At the same time, network security also becomes extremely important problem.A variety of different network attacks can be directed to
The various loopholes of business platform itself carry out network attack to internet service platform, or carry out network and steal secret information, and above-mentioned one
It cuts and the normal operation of business is all made to be affected.And the ways and means of network attack can be with the development of time, evolution
Different mode and means out.
In recent years, network attack has showed trend, the hackers such as borderlessization, real time implementation, multiple spot superpositionization and organizes energy
Enough while using the multiple main frames for being distributed in diverse geographic location start the network attack for a certain host, therefore, how
It is enough to show network attack map from dull, simple network attack data packet, network attack is embodied in region and temporal
Feature to rapidly find potential network attack storm, and then accurately improves security level, carries out safety precaution, at
The technical issues of for prior art urgent need to resolve.
Summary of the invention
In view of this, it is an object of the invention to propose a kind of network attack map-indication method and storage medium, it can
The acquired different network attack packets of parsing, obtain relevant regional information and network attack type, and real on map
When show, and embody the difference of network attack degree.
A kind of network attack map-indication method, includes the following steps:
Obtain different types of network attack data in network;
Obtained network attack data are parsed, obtain network attack information, the network attack information includes: net
The time of origin of network attack, attack source, attack destination, attack type and attacked port;
The network attack information is arranged, the network attack quantity in the unit time is counted, draws network attack
Map, the network attack map is using map as Background From Layer, dynamic with light beam on map according to the sequence of Network Attack Time
The mode of picture shows that the attack from attack source to attack destination is attacked after the light beam arrives at the destination described
It hits destination and shows the circle for gradually spreading and fading out, the size of the circle indicates the severity of attack;
Show the network attack map.
Preferably, zone of alarm is rolled in the setting of the network attack map, the zone of alarm that rolls is in the difference of map
Position setting it is multiple, one or more of following information of real-time display respectively: attack source, attack destination, mainly attack
Hit list, primary challenge type.
When preferably, when rolling zone of alarm display attack source, the network attack on different attack source ground can be shown
Quantity;
When the rolling zone of alarm shows attack destination, the number of the network attack of different attack destinations can be shown
Amount;
When the rolling zone of alarm shows primary challenge type, the number of the network attack of different attack types can be shown
Amount;
When the rolling zone of alarm shows primary challenge list, it can show that frequency is higher in above-mentioned network attack, or
The biggish network attack of person's harmfulness, the primary challenge list include the specifying information attacked every time.
Preferably, the specifying information attacked every time includes the attack time, attack type, attack source attacked every time
IP, region, Attacking Packets type and attacked port are attacked
Preferably, additionally it is possible to network attack severity is indicated using the thickness of light beam, the color of light beam.
Preferably, the network attack severity is related with the frequency of network attack, the type of network attack.
Preferably, common system deployment place is marked in the map as Background From Layer.
Preferably, the network attack data can be attacked by big data platform or network routing device or network
It hits in suction device and obtains.
The invention also discloses a kind of storage mediums, for storing computer executable instructions,
Computer executable instructions perform claim when being executed by processor requires side described in any one of 1-8
Method.
Compared with the existing technology, the present invention has the advantage that
(1) region of network attack, including attack source and target of attack can be shown, so that image learns network
Attack condition;
(2) can the severity to network attack quantified in a manner of color, thickness, circle size etc., with improve
It is visual;
(3) have and roll zone of alarm, carry out classification real-time display for disparity items respectively.
(4) display interface is vivid, intuitive, visual strong.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present invention, the above and other purposes of the present invention, feature and
Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the flow chart of the network attack map-indication method of specific embodiment according to the present invention;
Fig. 2 is the example of the shown network attack map of specific embodiment according to the present invention.
Specific embodiment
Below based on embodiment, present invention is described, but the present invention is not restricted to these embodiments.
These processes, process, logical block, function etc. are generally considered to be the step of reaching ideal or expected result
Or the self-consistent sequence of instruction.Step generally comprises the physical manipulation of physical quantity.Under normal conditions, although being not necessarily, these numbers
Amount often takes the forms such as electricity, magnetic, optics or quantum signal, they can be stored, and transfers the possession of, and merges, compares, and otherwise
It is controlled by computer or data processing system.Facts proved that sometimes for convenience's sake, in view of shared reason, this
A little signals are referred to as the similar title such as position, wave, waveform, stream, value, element, symbol, letter, term, number, in computer journey
It is referred to as code (may be object code, source code or binary code) in sequence or software.
The present invention obtains network attack data, and the time of statistics network attack, type, number of times of attack, attack source first
Ground, target of attack, attacked port, and using map as Background From Layer, with the sequence of Network Attack Time, with light beam on map
Mode show from attack source to the attack of attack destination, thus intuitively show the target of attack with
Severity.
Specifically, showing the stream of the network attack map-indication method of specific embodiment according to the present invention referring to Fig. 1
Cheng Tu includes the following steps:
Step S110: different types of network attack data in network are obtained;
Illustratively, which can be obtained by the Network Security Device in network equipment front end, net
The equipment that network safety equipment can have such as TSM Security Agent, by being embedded in tracked information in the response to access request to chase after
Track invader, and then obtain the partial data of network attack.
Alternatively, the data also can be by data interflow center, for example, the embedded network in the router of core node
Safety equipment obtains data packet Scanning Detction.
Alternatively, the data can also be obtained by the big data platform of several Network Security Devices.
For example, several operation systems are arranged in a network, attract the attack in network, and obtain using data collection mechanism
The big data for obtaining network attack data, to obtain network attack data.
Step S120: parsing obtained network attack data, obtains time of origin, the attack source of network attack
The network attacks information such as ground, attack destination, attack type, attacked port.
The information of the network attack obtained in this step obtains data basis for the drafting of network attack map.
Illustratively, the attack source and attack destination, can be obtained by attack source IP and attack destination IP.
Step S130: arranging the network attack information, counts the network attack quantity in the unit time, draws
Network attack map, the network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, on map
It is shown in a manner of light beam animation from attack source to the attack of attack destination, after the light beam arrives at the destination,
The circle for gradually spreading and fading out is shown in the attack destination, the size of the circle indicates the severity of attack,
The severity of the attack and in the unit time attack quantity, i.e., attack frequency it is related with attack type.
In this step, all network attacks can be counted according to the time, obtains network in the unit time and attacks
The quantity hit, the network attack higher than threshold value are just shown, and the network attack lower than threshold value is no longer displayed by, to avoid display letter
Breath is excessive, so that emphasis be caused not protrude.
Different grades can be set for attack type, such as from 1-5 grade, attack frequency is also set different
Then the two is weighted the severity for setting attack by grade.
Further, the thickness of the light beam and the size of circle indicate the severity of attack, with more
The severity of the embodiment network attack of image.
Further, additionally it is possible to the difference of network attack severity is indicated with the difference of the color of the light beam, for example,
The network attack extent of injury is lower using green, and more serious use yellow is serious using red, very serious to adopt
With peony etc..
Further, common system deployment can be marked in map, for example, certain operation system is deployed in north respectively
Capital, Shanghai, Guangzhou, Chengdu enable then in above-mentioned 4 places icon representation key area when network attack occurs
It is enough to remind user rapidly.
In a specific embodiment, the network attack type includes: information sniff, penetration attack, captures invasion
And malicious act.
Step S140: the network attack map is shown.
For example, can be shown on the display unit.
Further, zone of alarm can be rolled in the setting of the network attack map, the rolling zone of alarm is in map
Different positions settings it is multiple, show one or more of following information respectively: attack source, it is attack destination, main
Attack list, primary challenge type.
Specifically, when the rolling zone of alarm show attack source when, can show the network attack on different attack source ground
Quantity.
When the rolling zone of alarm shows attack destination, the number of the network attack of different attack destinations can be shown
Amount.
When the rolling zone of alarm shows primary challenge type, the number of the network attack of different attack types can be shown
Amount.
When the rolling zone of alarm shows primary challenge list, it can show that frequency is higher in above-mentioned network attack, or
The biggish network attack of person's harmfulness.Primary challenge list includes the specifying information attacked every time, including attack time, attack class
Type, is attacked region, Attacking Packets type (such as http), attacked port etc. at attack source IP.
Rolling information shown by zone of alarm can be updated with the progress of time, that is, show nearest one end time
Interior major networks attack information, and the network attack information can add up with the progress of time.
The present invention further discloses a kind of storage mediums, for storing computer executable instructions,
The computer executable instructions execute above-mentioned method when being executed by processor.
Therefore, the security threat for the different levels for current system that the present invention is collected into is carried out according to frequency, time
Statistics is shown by attack chain figure.
Compared with the existing technology, the present invention has the advantage that
(1) region of network attack, including attack source and target of attack can be shown, so that image learns network
Attack condition;
(2) can the severity to network attack quantified in a manner of color, thickness, circle size etc., with improve
It is visual;
(3) have and roll zone of alarm, carry out classification real-time display for disparity items respectively.
(4) display interface is vivid, intuitive, visual strong.
As skilled in the art will be aware of, various aspects of the invention may be implemented as system, method or meter
Calculation machine program product.Therefore, various aspects of the invention can take following form: complete hardware embodiment, complete software
Embodiment (including firmware, resident software, microcode etc.) or herein usually can referred to as " circuit ", " module " or
The embodiment that software aspects are combined with hardware aspect of " system ".In addition, aspect of the invention can take following shape
Formula: the computer program product realized in one or more computer-readable medium, computer-readable medium have on it
The computer readable program code of realization.
It can use any combination of one or more computer-readable mediums.Computer-readable medium can be computer
Readable signal medium or computer readable storage medium.Computer readable storage medium can be such as (but not limited to) electronics,
Magnetic, optical, electromagnetism, infrared or semiconductor system, device or any suitable combination above-mentioned.Meter
The more specific example (exhaustive to enumerate) of calculation machine readable storage medium storing program for executing will include the following terms: with one or more electric wire
Electrical connection, hard disk, random access memory (RAM), read-only memory (ROM), erasable is compiled portable computer diskette
Journey read-only memory (EPROM or flash memory), optical fiber, portable optic disk read-only storage (CD-ROM), light storage device,
Magnetic memory apparatus or any suitable combination above-mentioned.In the context of this document, computer readable storage medium can be
It can include or store the program used by instruction execution system, device or combine instruction execution system, equipment or dress
Set any tangible medium of the program used.
Computer-readable signal media may include the data-signal propagated, and the data-signal of the propagation has wherein
The computer readable program code realized such as a part in a base band or as carrier wave.The signal of such propagation can use
Any form in diversified forms, including but not limited to: electromagnetism, optical or its any combination appropriate.It is computer-readable
Signal media can be following any computer-readable medium: not be computer readable storage medium, and can be to by instructing
Program that is that execution system, device use or combining instruction execution system, device to use is communicated, is propagated
Or transmission.
Including but not limited to wireless, wired, fiber optic cables, RF etc. or above-mentioned any appropriately combined any can be used
Suitable medium transmits the program code realized on a computer-readable medium.
Computer program code for executing the operation for being directed to various aspects of the present invention can be with one or more programming languages
Any combination of speech is write, and the programming language includes: programming language such as Java, Smalltalk, C++ of object-oriented etc.;
And conventional process programming language such as " C " programming language or similar programming language.Program code can be used as independent software package
Fully on the user computer, partly execute on the user computer;Partly exist on the user computer and partly
It is executed on remote computer;Or it fully executes on a remote computer or server.It in the latter case, can will be remote
Journey computer by include local area network (LAN) or wide area network (WAN) any type of network connection to subscriber computer, or
(such as internet by using ISP) can be attached with outer computer.
It will be appreciated that the block in each of flow chart legend and/or block diagram piece and flow chart legend and/or block diagram
Combination can be realized by computer program instructions.These computer program instructions can be provided to general purpose computer, specially
With computer or the processor of other programmable data processing devices, to generate machine, so that (via computer or other compiling
What the processor of journey data processing equipment executed) instruction creation is for realizing the function specified in flowchart and or block diagram block or block
The device of energy/movement.
These computer program instructions can also be stored in can instruct computer, other programmable data processing devices
Or in the computer-readable medium that runs in a specific way of other devices, so that the instruction stored in computer-readable medium produces
Raw includes the product for realizing the instruction for the function action specified in flowchart and or block diagram block or block.
Computer program instructions can also be loaded on computer, other programmable data processing devices or other devices
On so that executed on computer, other programmable devices or other devices it is a series of can operating procedure come generate computer reality
Existing process, so that the instruction executed on computer or other programmable devices is provided for realizing in flow chart and/or frame
The process for the function action specified in segment or block.
The above description is only a preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art
For, the invention can have various changes and changes.All any modifications made within the spirit and principles of the present invention are equal
Replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (9)
1. a kind of network attack map-indication method, includes the following steps:
Obtain different types of network attack data in network;
Obtained network attack data are parsed, obtain network attack information, the network attack information includes: that network is attacked
The time of origin that hits, attack source, attack destination, attack type and attacked port;
The network attack information is arranged, the network attack quantity in the unit time is counted, draws network attack map,
The network attack map is using map as Background From Layer, according to the sequence of Network Attack Time, with light beam animation on map
Mode is shown from attack source to the attack of attack destination, after the light beam arrives at the destination, in the attack mesh
Ground show the circle for gradually spreading and fading out, the size of the circle indicates the severity of attack;
Show the network attack map.
2. network attack map-indication method according to claim 1, which is characterized in that in the network attack map
Setting rolls zone of alarm, and the zone of alarm that rolls is multiple in the different position settings of map, respectively the following information of real-time display
One or more of: attack source, attack destination, primary challenge list, primary challenge type.
3. network attack map-indication method according to claim 2, which is characterized in that when the rolling zone of alarm is shown
Attack source when, can show the quantity of the network attack on different attack source ground;
When the rolling zone of alarm shows attack destination, the quantity of the network attack of different attack destinations can be shown;
When the rolling zone of alarm shows primary challenge type, the quantity of the network attack of different attack types can be shown;
When the rolling zone of alarm shows primary challenge list, the net for meeting predetermined condition in above-mentioned network attack can be shown
Network attack, the primary challenge list includes the specifying information attacked every time.
4. network attack map-indication method according to claim 3, which is characterized in that the specific letter attacked every time
Breath includes the attack time attacked every time, attack type, attack source IP, is attacked region, Attacking Packets type and attack end
Mouthful
5. network attack map-indication method according to claim 1, which is characterized in that the thickness of the light beam, light beam
Color for indicating network attack severity.
6. network attack map-indication method according to claim 1, which is characterized in that the network attack severity
It is determined according to the frequency of network attack and the type of network attack.
7. network attack map-indication method according to claim 1, it is characterised in that:
Common system deployment place is marked in the map as Background From Layer.
8. network attack map-indication method according to claim 1, it is characterised in that:
The network attack data in big data platform or network routing device or network attack suction device by obtaining
It takes.
9. a kind of storage medium, for storing computer executable instructions, which is characterized in that the computer executable instructions exist
Perform claim requires method described in any one of 1-8 when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431158.7A CN110324312A (en) | 2019-05-22 | 2019-05-22 | Network attack map-indication method and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431158.7A CN110324312A (en) | 2019-05-22 | 2019-05-22 | Network attack map-indication method and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110324312A true CN110324312A (en) | 2019-10-11 |
Family
ID=68113316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910431158.7A Pending CN110324312A (en) | 2019-05-22 | 2019-05-22 | Network attack map-indication method and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110324312A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110809010A (en) * | 2020-01-08 | 2020-02-18 | 浙江乾冠信息安全研究院有限公司 | Threat information processing method, device, electronic equipment and medium |
CN111726352A (en) * | 2020-06-17 | 2020-09-29 | 杭州安恒信息技术股份有限公司 | Method, apparatus, computer device and medium for visually monitoring probe status |
CN111901331A (en) * | 2020-07-27 | 2020-11-06 | 杭州迪普科技股份有限公司 | Security situation perception visualization method and device |
CN112256791A (en) * | 2020-10-27 | 2021-01-22 | 北京微步在线科技有限公司 | Network attack event display method and storage medium |
CN113542036A (en) * | 2021-09-14 | 2021-10-22 | 广州锦行网络科技有限公司 | Demonstration method, electron and demonstration device for network attack behaviors |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065622A (en) * | 2013-03-20 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Security early warning method and apparatus of network equipment |
CN104965847A (en) * | 2015-02-04 | 2015-10-07 | 北京奇虎科技有限公司 | Information displaying method and apparatus |
CN105207986A (en) * | 2015-07-31 | 2015-12-30 | 北京奇虎科技有限公司 | Method and device for displaying network attack behavior |
CN105516174A (en) * | 2015-12-25 | 2016-04-20 | 北京奇虎科技有限公司 | Network attack tracking display system and method |
CN105959184A (en) * | 2016-07-14 | 2016-09-21 | 杨林 | Smart indoor air purification system |
CN106209856A (en) * | 2016-07-14 | 2016-12-07 | 何钟柱 | Big data security postures based on trust computing ground drawing generating method |
CN109728934A (en) * | 2018-12-03 | 2019-05-07 | 清华大学 | Cyberspace cartographic model creation method and device |
-
2019
- 2019-05-22 CN CN201910431158.7A patent/CN110324312A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065622A (en) * | 2013-03-20 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Security early warning method and apparatus of network equipment |
CN104965847A (en) * | 2015-02-04 | 2015-10-07 | 北京奇虎科技有限公司 | Information displaying method and apparatus |
CN105207986A (en) * | 2015-07-31 | 2015-12-30 | 北京奇虎科技有限公司 | Method and device for displaying network attack behavior |
CN105516174A (en) * | 2015-12-25 | 2016-04-20 | 北京奇虎科技有限公司 | Network attack tracking display system and method |
CN105959184A (en) * | 2016-07-14 | 2016-09-21 | 杨林 | Smart indoor air purification system |
CN106209856A (en) * | 2016-07-14 | 2016-12-07 | 何钟柱 | Big data security postures based on trust computing ground drawing generating method |
CN109728934A (en) * | 2018-12-03 | 2019-05-07 | 清华大学 | Cyberspace cartographic model creation method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110809010A (en) * | 2020-01-08 | 2020-02-18 | 浙江乾冠信息安全研究院有限公司 | Threat information processing method, device, electronic equipment and medium |
CN111726352A (en) * | 2020-06-17 | 2020-09-29 | 杭州安恒信息技术股份有限公司 | Method, apparatus, computer device and medium for visually monitoring probe status |
CN111901331A (en) * | 2020-07-27 | 2020-11-06 | 杭州迪普科技股份有限公司 | Security situation perception visualization method and device |
CN112256791A (en) * | 2020-10-27 | 2021-01-22 | 北京微步在线科技有限公司 | Network attack event display method and storage medium |
CN113542036A (en) * | 2021-09-14 | 2021-10-22 | 广州锦行网络科技有限公司 | Demonstration method, electron and demonstration device for network attack behaviors |
CN113542036B (en) * | 2021-09-14 | 2022-01-04 | 广州锦行网络科技有限公司 | Demonstration method, electron and demonstration device for network attack behaviors |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324312A (en) | Network attack map-indication method and storage medium | |
AU2019216687B2 (en) | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | |
CN110351229B (en) | Terminal UE (user equipment) management and control method and device | |
Lo et al. | A cooperative intrusion detection system framework for cloud computing networks | |
CN108063765B (en) | SDN system suitable for solving network security | |
US10805340B1 (en) | Infection vector and malware tracking with an interactive user display | |
CN110336785A (en) | The method for visualizing and storage medium of network attack chain figure | |
CN107612890B (en) | Network monitoring method and system | |
CN103457931A (en) | Active defense method for network trick and counter attack | |
CN108234404A (en) | A kind of defence method of ddos attack, system and relevant device | |
Khemariya et al. | An efficient algorithm for detection of blackhole attack in aodv based manets | |
Seo et al. | APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks | |
Verma et al. | IP-CHOCK (filter)-Based detection scheme for Denial of Service (DoS) attacks in VANET | |
CN106302373A (en) | A kind of connection control method and terminal | |
CN103701818A (en) | ARP (address resolution protocol) attack centralized detection and defense method for wireless controller system | |
CN106330935A (en) | Phishing Wi-Fi detection method | |
CN108777650A (en) | A kind of Anonymizing networks source tracing method based on controlled node | |
CN107426241A (en) | A kind of method and device of network safety prevention | |
US9578039B2 (en) | OAM security authentication method and OAM transmitting/receiving devices | |
CN113098894A (en) | SDN IP address hopping method based on randomization algorithm | |
ES2938762T3 (en) | System, device and procedure for detection, mitigation and isolation of a signaling storm | |
Mandala et al. | Quantifying the severity of blackhole attack in wireless mobile adhoc networks | |
KR20140044970A (en) | Method and apparatus for controlling blocking of service attack by using access control list | |
CN107171867A (en) | The guard system of ddos attack | |
CN104967589B (en) | A kind of safety detecting method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |
|
RJ01 | Rejection of invention patent application after publication |