Advanced persistent threat attack recognition method and device
An advanced persistent threat and attack identification technology, applied to electrical components, transmission systems, etc., can solve problems such as difficult to achieve security protection detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In the embodiment of the present invention, the APT attack includes the first stage, the second stage and the third stage. The attack event is detected first, and then the detected attack event is recorded, and the APT attack stage is classified and recorded according to the characteristics of the attack event. When the record includes the attack event of the third stage, the attack event of the third stage is associated with the attack event of the first stage and the second stage suffered by the attacked object, and the associated attack event has When it comes from an external source, it is determined to be an APT attack event.
[0033] Further, the attack event of the third stage is associated with the attack events of the first stage and the second stage suffered by the attacked object, and when the associated attack event has an internal source, the associated The attack event is associated with the attack events of the first stage, the second stage, and the third...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 