Method and apparatus for predicting network attack behaviour

A technology for predicting network and network attacks, applied in the direction of data exchange network, special data processing applications, instruments, etc. safety effect

Inactive Publication Date: 2007-11-21
HUAWEI TECH CO LTD +1
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the process of realizing the present invention, the inventors found that the prior art has at least the following problems: either the description of the attack behavior in the attack process in the prior art is too simple, the attack process cannot be clearly described, and the large-scale network attack is not reflected. Holistic, not suitable for macro networks
Either simply define the intrusion behavior through four-tuples, and describe the intrusion process with petri nets, without further proposing how to predict and describe the next intrusion behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for predicting network attack behaviour
  • Method and apparatus for predicting network attack behaviour
  • Method and apparatus for predicting network attack behaviour

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0020] Combining with Figure 1 and Figure 2, we will introduce the method of describing network attack behavior in detail. The correspondence between the attack behavior and its subsequent attack behavior is represented by a weighted directed graph of the attack behavior. Fig. 1 is a structural diagram of an attack behavior weighted directed graph describing a network attack behavior in an embodiment of the present invention. Circles are vertices in the attack behavior weighted directed graph, and each vertex represents an attack behavior. The letter in represents the name of the specific attack behavior; the arrow line is the arc in the weighted directed graph of the attack behavior, the arc represents the pointing relationship from the attack behavior to the subsequent attack behavior, the arc tail conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: monitoring the parameter of network status; using the variation of network status parameters to know the attack action from network; based on the relation between an attack action and its subsequent attack action, selecting an subsequent attack action with maximum probability from all attack actions; said attack action with maximum probability is the one with maximum attack times, and is taken as the forecasted network attack to be outputted. The invention also reveals an apparatus thereof comprising an attack action management unit.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a method and device for predicting network attack behavior. Background technique [0002] With the rapid development of computer network technology, the degree of informatization of the society is constantly improving. While the network brings huge economic and social benefits to people, it is also facing increasingly serious security problems, and attacks against the network emerge in endlessly. The number and types of attacks are increasing; the attacks are becoming more and more complex; and the harm to users who rely on the network is also increasing. Therefore, in-depth research on the characteristics of network attack behavior is imperative. [0003] The research on network attack can not only start from the attacking individual, but also needs to have an overall understanding of the entire network attack system. But on the one hand, the complexity and divers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26G06F17/00H04L29/06
CPCH04L63/1416G06F21/55H04L63/0227
Inventor 何兴高傅翀张凤荔曹振奇汪敦全郑聂军张程伟汪波鹿昌义
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products