Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack defense method and apparatus

An attack data, preset technology, applied in the field of network security, can solve the problems of low APT attack defense accuracy, loopholes in defense measures, massive data analysis, etc., to achieve the effect of improving defense accuracy

Inactive Publication Date: 2017-02-01
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for threats lurking in the analysis of massive data, the above defense measures have loopholes, and it is difficult to analyze all massive data, so lurking APT attacks may be missed, and the accuracy of APT attack defense is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method and apparatus
  • Attack defense method and apparatus
  • Attack defense method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] In order to make the advantages of the technical solution of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0035] The embodiment of the present invention provides an attack defense method, such as figure 1 As shown, the method includes:

[0036] 101. Obtain log information in the target device.

[0037] Wherein, the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack defense method and apparatus, relates to the technical field of network security and solves the problem of low APT (Advanced Persistent Threat) defense accuracy. The invention adopts the main technical scheme of: acquiring log information in a target device; by a preset credit library, detecting whether the log information comprises attack data; if the log information does not comprise the attack data, by a preset track library, distinguish whether a behavior corresponding to the log information is abnormal; and if the behavior corresponding to the log information is abnormal, outputting alarm information. The attack defense method and apparatus disclosed by the invention are mainly used for defending an APT attack.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack defense method and device. Background technique [0002] APT (Advanced Persistent Threat) is a new type of network attack that poses a serious threat to national defense security, national economic security, important industry information security, and company business information security. APT uses advanced attack methods to carry out long-term continuous network attacks on specific targets. The principle of the attack is more advanced and advanced than other attack forms. Accurate collection of processes and target systems. During the collection process, this attack will actively dig out the vulnerabilities of the trusted system and application program of the attacked target, and use these vulnerabilities to build the network required by the attacker. [0003] At present, the measures taken against the APT crisis are mainly to install a network security ear...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 傅涛冯凌
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD