Supercharge Your Innovation With Domain-Expert AI Agents!

A network coordinated attack storm source detection method and device

A network attack and network coordination technology, applied in the field of network security, can solve the problems of complex coordination relationship, misjudgment of storm characteristics, and many coordination nodes, etc., to achieve the effect of accurate and reasonable capture of characteristics, diversification of analysis dimensions, and intuitive data expression

Active Publication Date: 2019-04-30
四川无声信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the vast majority of enterprises or institutions have realized the transformation from traditional service models to Internet service models. In the face of multi-field business expansion, a large number of user groups, and a rapidly changing network environment, coordinated attacks are complicated due to their complex collaborative relationships and numerous collaborative nodes. Make the traditional detection method based on dynamic baseline control unable to adapt to the existing security operation and maintenance environment
This traditional network coordinated attack storm source detection method has the following defects: the short-term dynamic baseline threshold cannot rule out the correlation of storm point behavior, which may easily lead to misjudgment of storm characteristics; there is no professional technical system for mining storm point of coordinated attack, only the traditional The order of magnitude statistical method; storm point collaborative determination has not yet been realized, only focus on the change trend, lack of final investigation on the cause of the storm itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network coordinated attack storm source detection method and device
  • A network coordinated attack storm source detection method and device
  • A network coordinated attack storm source detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0017] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures.

[0018] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not inten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Preferred embodiments of the present invention provide a network collaborative attack storm source detection method and apparatus. A three-dimensional data model is established for a network attack event set so that a storm time interval is acquired, a neural network model-based estimation and K order moment-based discrete analysis, skewness analysis and kurtosis analysis are performed on the network attack events in the storm time interval, attack events in a periodical behavior relation are excluded, and a final storm source event is acquired. Compared with a traditional dynamic base line-based storm source detection method, the method is characterized by capturing the storm source event more accurately and reasonably, and based on the same feature database, has the advantages of diversified analysis dimensions, deep collaborative analysis of the network attack event, and more intuitive data expression.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method and device for detecting a network coordinated attack storm source. Background technique [0002] With the development and evolution of network attack technology and tools, network attack methods are constantly developing towards automation, intelligence, and collaboration. Among them, collaborative network attacks have been widely spread in hacker organizations by virtue of their own characteristics of good concealment and high reliability. and apply. [0003] At present, the vast majority of enterprises or institutions have realized the transformation from traditional service models to Internet service models. In the face of multi-field business expansion, a large number of user groups, and a rapidly changing network environment, coordinated attacks are complicated due to their complex collaborative relationships and numerous collaborative nodes. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 黄勇周安民陈航宋国志肖仕刚
Owner 四川无声信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More