Network security countering method and device based on big data, equipment and medium

The embodiment of the invention provides a network security countering method and device based on big data, equipment and a medium. The technical problem that an existing network security defense scheme is low in reliability is solved. The method comprises the steps of collecting abnormal traffic da...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: DU LILI, YANG HONGCHANG, ZHENG YI, JIANG WEI, ZHANG LUGUANG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The embodiment of the invention provides a network security countering method and device based on big data, equipment and a medium. The technical problem that an existing network security defense scheme is low in reliability is solved. The method comprises the steps of collecting abnormal traffic data based on preset time; comparing the abnormal traffic data with a network attack traffic sample stored in a database to determine that the abnormal traffic data is from a network attack behavior; backtracking and determining an attacker device initiating the network attack based on the abnormal traffic data; and constructing a countering Trojan horse, and carrying out network countering on the attacker equipment. According to the method, the abnormal traffic data is analyzed to determine whether the network is attacked or not, the portrait of an attacker is described according to massive big data samples stored in a local database, and Trojan horse is constructed for the attacker for effective countering, so that