Method and device for determining an attack surface of a terminal

A terminal and equipment technology, applied in the field of Internet security, can solve problems such as economic loss, strengthening mail monitoring, and incompatible with the enterprise's personalized network environment.

Active Publication Date: 2019-02-12
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] It is self-evident that malicious samples such as viruses are harmful to individual users. However, for enterprise users, the harm caused by malicious sample intrusion is more serious. It can not only lead to the paralysis of electronic equipment in the enterprise, but also affect the work efficiency of enterprise employees. It may also lead to the leakage of confidential business information or the loss of key documents, resulting in serious economic losses
[0003] In order to strengthen the enterprise's ability to defend and control malicious samples, the current prevention and control measures are mainly: analyze the data of the attack channel of malicious samples, and take measures according to the analysis results. For example, when the main attack channel of malicious samples is email, Restrict the use of mailboxes of internal personnel in the enterprise, or strengthen the monitoring of emails; when the main attack channel of malicious samples is the website, restrict the permission of employees to use the external network
[0004] However, due to the changeable and diverse attack channels of malicious samples, taking defensive measures by analyzing the attack channel data of malicious samples often limits the working conditions of employees, and does not conform to the personalized network environment of the enterprise. sex
[0005] It can be seen that the existing technology for the defense of malicious samples of enterprises lacks a data determination method that is more suitable for the personalized network environment of enterprises, making it difficult to formulate more targeted defense measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining an attack surface of a terminal
  • Method and device for determining an attack surface of a terminal
  • Method and device for determining an attack surface of a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The general idea of ​​the technical solution in the embodiment of the application is as follows:

[0038] Obtain the killing records of N terminals, the killing records are used to record the killing of the malicious sample group by the N terminals, wherein, N is a positive integer; then according to the killing records, determine the N The attack surface of each terminal attacked by the malicious sample group, where the attack surface is used to characterize the threat degree of the malicious sample group to the terminal. That is, starting from the direct result of malicious sample attacks, that is, the killing records, determine the threat level of each terminal in the enterprise that is easily attacked by malicious sample groups, thereby exposing the weak terminals in the enterprise that are most likely to be attacked by malicious samples. The terminal adopts direct defense measures, which is conducive to formulating more targeted defense measures against malicious s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and equipment for determining attack surfaces of terminals. The method comprises the steps of acquiring checking and killing records of N terminals, wherein the checking and killing records are used for recording the checking and killing situations of the N terminals on a malicious sample group, and N is a positive integer; and determining an attack surface, attacked by the malicious sample group, of each terminal among the N terminals according to the checking and killing records, wherein the attack surface is used for characterizing the threatening degree of the malicious sample group on the terminal. The method and the equipment can solve the technical problem that a data determination method fitter to a personalized network environment of an enterprise lacks in malicious sample defense of the enterprise in the prior art so that more specific defensive measures are difficult to make. Provided is a data determination method capable of directly exposing the weak link attacked by malicious samples most easily.

Description

technical field [0001] The present invention relates to the field of Internet security, in particular to a method and equipment for determining an attack surface of a terminal. Background technique [0002] It is self-evident that malicious samples such as viruses are harmful to individual users. However, for enterprise users, the harm caused by malicious sample intrusion is more serious. It can not only lead to the paralysis of electronic equipment in the enterprise, but also affect the work efficiency of enterprise employees. It may also lead to the leakage of confidential business information or the loss of key documents, resulting in serious economic losses. [0003] In order to strengthen the enterprise's ability to defend and control malicious samples, the current prevention and control measures are mainly: analyze the data of the attack channel of malicious samples, and take measures according to the analysis results. For example, when the main attack channel of malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/145
Inventor 潘山金振祖吴云坤
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products