A method for real-time detection of cyberspace security situation

A security situation, real-time detection technology, applied in the field of information security, can solve the problems of reduced sequence randomness, inaccurate network behavior analysis, etc., to achieve the effect of high integration level, accurate situation assessment results, and comprehensive time scale.

Active Publication Date: 2019-09-10
金润方舟科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the information entropy theory, if there are abnormal behaviors in the sample sequence, the randomness of the sequence will be reduced, resulting in a decrease in the sample entropy that measures the complexity of the structure. Complexity characteristics, overcome the problem of inaccurate network behavior analysis under a single space-time scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for real-time detection of cyberspace security situation
  • A method for real-time detection of cyberspace security situation
  • A method for real-time detection of cyberspace security situation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0044] Such as figure 1 As shown, the present invention proposes a network security situation assessment method based on artificial immunity and multi-scale entropy, which includes six parts: original feature extraction, multi-scale entropy calculation, detector training, network threat security detection, network security Situational computing and situational visualization. Among them, the original feature extraction is to obtain the original network packet features from the network through the data collection module, which is used for the subsequent multi-scale entropy calculation and network anomaly detection process; the multi-scale entropy calculation is to perform multi-scale entropy on the extracted network features. Calculation, calculate the sample entropy of the original data packet feature sequence at different time scales, and obtain the entropy feature v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cyberspace security situation real-time detection method. The method comprises the following steps: original characteristic extraction that original network data packet characteristics are obtained from a network, multi-scale entropy calculations that sample entropy of an original data packet characteristic sequence is calculated at different time scales, detector training that a mature immunization detector is trained and generated by utilizing a sample entropy characteristic vector and a negative-selection algorithm at the different time scales, network threat security detection that a network sample is detected by utilizing the trained mature immunization detector at the different time scales, cyberspace security situation calculations that cyberspace security situations at the different time scales and different network layers, and situation visualization that the cyberspace security situations are expressed by different colors of curve charts at different time and the different network layers. The time scales considered in the method is relatively comprehensive, the fusion level is high, a situation assessment result is relatively accurate, a complex characteristics of a network behavior can be described, and the whole process of a network threat behavior can be carved in a fine-grained manner.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for real-time detection of cyberspace security situation. Background technique [0002] With the continuous development of the scale and application fields of the Internet, its basic and overall status is gradually enhanced. At the same time, cyber attacks and destructive behaviors are increasing day by day, and they are gradually showing the characteristics of strict organization, profit-oriented behavior and direct target. However, the existing network security protection mainly relies on single-point security devices such as virus detection, intrusion detection, and firewalls. Due to the lack of effective cooperation among them, the effectiveness of various security devices cannot be fully utilized. Network security issues have become an issue that affects the Internet and The main problems in the development of various applications. Cyberspace Security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26H04L29/06
Inventor 陈文
Owner 金润方舟科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products