Network attack path prediction method

A network attack and prediction method technology, applied in the field of network security, can solve the problems that the attack cannot be detected, it is difficult for network security personnel to prevent the work in advance, and the attack path cannot be achieved, so as to reduce the cost of manpower maintenance and protect against intrusion and the effect of stealing and protecting against network attacks

Inactive Publication Date: 2017-08-11
上海斗象信息科技有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to protect network security, devices such as firewalls and intrusion prevention systems have appeared on the market, but these devices perform rule matching based on unique parameters in network data packets. If the data packets match the rule base, they will send an alarm It has a certain hysteresis and cannot detect upcoming and upcoming attacks. It is difficult to assist network security personnel to do a good job in advance protection.
For example: what risks exist in existing network assets, which assets will conduct network connection and data interaction, let alone predict the attack path in advance (which path hackers will use to attack) to assist network security personnel in advance protection, After the attack occurs, the attack path traceability is a comprehensive network asset risk positioning technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack path prediction method
  • Network attack path prediction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the technical means, creative features, goals and effects of the present invention easy to understand, the following embodiments will specifically illustrate the network attack path prediction method of the present invention in conjunction with the accompanying drawings.

[0018] Such as figure 1 As shown, the network attack path prediction method of the present invention includes the following steps:

[0019] Step S1, using active scanning and passive scanning to capture IP data packets to discover network assets, and store them in the network asset information database, perform 24-hour real-time detection of network asset information, and update the network asset information database in real time.

[0020] In this embodiment, before the network asset information is stored, the IP data packet is split to extract data fields related to the asset information. Network assets include IP, port, protocol information, application service information, system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack path prediction method. Because network asset information is monitored in real time throughout the day through active scanning and passive scanning, the latest news of assets can be known in real time. According to the latest network asset information, the connection condition of each asset is identified, and an asset connection information and network asset topology map is drawn. Then, all possible paths of network attack are analyzed and judged, and the network administrator takes measures in advance to defend the network system and the core assets according to all the possible network attack paths predicted. Therefore, through the network attack path prediction method of the invention, network attacks can be prevented, the core data of enterprises can be protected from being invaded and stolen, and the cost of human maintenance can be reduced.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network attack path prediction method. Background technique [0002] With the rapid development of computer information technology, people's daily work and study are increasingly dependent on the Internet. However, recent network security incidents frequently broke out, which have seriously affected the information security of the entire society and individuals. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. In an open network environment, a large amount of information flows on the Internet, and an Internet computer intrusion event occurs every 20 seconds on average around the world. Therefore, in order to protect network security, devices such as firewalls and intrusion prevention systems have appeared on the market, but these...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 袁劲松
Owner 上海斗象信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products