Hacker behavior discovery and analysis based on linkage of intrusion detection and vulnerability scanning

A vulnerability scanning and intrusion detection technology, applied in the field of information security, can solve problems such as information loss and user network paralysis, and achieve the effect of reducing false positives, reducing potential threats and avoiding intrusion losses.

Inactive Publication Date: 2016-01-06
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current Internet field, with the frequent occurrence of a series of network security incidents, people's attention to security threats is also increasing. The most important cause of network security incidents is hackers. Usually, the attacks launched by these hackers should not be attacked. Traditional anti-virus software or intrusion detection system, intrusion prevention system detection, some hackers tend to lurk in the system for a long time, even more than 200 days according to some surveys, these latent hacker attacks will be in the user's unconscious Steal their private information or cause user network paralysis, information loss and other losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hacker behavior discovery and analysis based on linkage of intrusion detection and vulnerability scanning
  • Hacker behavior discovery and analysis based on linkage of intrusion detection and vulnerability scanning
  • Hacker behavior discovery and analysis based on linkage of intrusion detection and vulnerability scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] The present invention links the intrusion detection system and the vulnerability scanning system. On the one hand, it conducts correlation analysis through elements such as CVE number, intrusion category, vulnerability category, and port number, and judges the danger of the attack according to the difference in matching degree. It is a suspected intrusion. Whether it is successful or may cause threats, etc., and then perform different alarms or linkage proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for hacker behavior discovery and analysis based on linkage of intrusion detection and vulnerability scanning. Through linkage of an intrusion detection technology and a vulnerability scanning technology, an attack is accurately positioned or a suspicious hacker behavior is discovered, so that the hacker intrusion behavior is timely intervened to avoid loss before the hacker intrusion behavior is successful, and furthermore, an attack source is analyzed and discovered through an attack source tracking technology, and the subsequent attack behavior of the attack source is prevented by utilizing the technologies, such as blacklist.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to the discovery and analysis of hacker behaviors based on the linkage of intrusion detection and vulnerability scanning. Background technique [0002] In the current Internet field, with the frequent occurrence of a series of network security incidents, people's attention to security threats is also increasing. The most important cause of network security incidents is hackers. Usually, the attacks launched by these hackers should not be attacked. Traditional anti-virus software or intrusion detection system, intrusion prevention system detection, some hackers tend to lurk in the system for a long time, even more than 200 days according to some surveys, these latent hacker attacks will be in the user's unconscious In some cases, steal their private information or cause user network paralysis, information loss and other losses. Contents of the invention [0003] The i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1425
Inventor 杨育斌杨帆柯宗贵
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products