An Attack Detection Method Based on Fuzzy Uncertainty Reasoning

An attack detection and uncertainty technology, applied in the field of network information security, can solve problems such as undetectable attack behavior and inconsistent matching results

Active Publication Date: 2010-10-06
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if the attack process slightly deviates from the process defined by the template, the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] According to the above technical solutions, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0038] The implementation process of the present invention is described by taking password brute force cracking attack as an example.

[0039] Firstly, the fuzzy knowledge template of the attack is established, and then the attack and its variants are detected through fuzzy reasoning.

[0040] Password cracking generally uses brute force cracking software for cracking. The principle is to sequentially read passwords from a pre-defined password dictionary library and crack them by trying. Both the password dictionary and the rate of password attempts during the cracking process can be customized. The current detection method for password cracking is to detect the characteristics of the number of failed attempts. It is a detection method based on deterministic reasoning technology. The rules are as follows: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attack detection method based on fuzzy uncertainty reasoning, which belongs to the technical field of network information security. Suitable for misuse detection systems. On the basis of extracting fuzzy attack features and establishing fuzzy knowledge templates, the present invention uses fuzzy reasoning technology to detect the possibility of attack occurrence. The misuse detection system adopts the method of the invention, which can effectively improve the detection accuracy of attack behavior and variants thereof.

Description

technical field [0001] The invention relates to an attack detection method based on fuzzy uncertainty reasoning, which belongs to the technical field of network information security. Suitable for misuse detection systems. Background technique [0002] Network attack detection technology collects log data that may contain attack traces from the network, and finds possible attack behaviors by analyzing the data. From the perspective of detection methods, intrusion detection technology can be divided into two categories: anomaly detection and misuse detection. Misuse detection technology needs to establish an attack knowledge template in advance, and then extract the attack evidence from the log data. By matching the attack evidence with the attack knowledge template, if it matches, it is considered an attack; otherwise, it is not considered an attack. [0003] At present, misuse detection mainly adopts deterministic reasoning technology, that is, the knowledge template and m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 胡昌振危胜军
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products