Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APT defense system and defense method based on system elasticity

A technology of system elasticity and defense system, applied in the field of network security, can solve the problems of complex and unrealistic APT attack forms, and achieve the effects of high elasticity and adaptive response ability, enhanced concealment, and high elasticity

Inactive Publication Date: 2018-08-28
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The forms of APT attacks are constantly becoming more and more complex, and it is unrealistic to completely defend against attacks. A false sense of security will only cause greater risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APT defense system and defense method based on system elasticity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0064] Such as figure 1 As shown, the present invention utilizes the mutual response cooperation between the database server defense module and the terminal defense module, from the data distributed storage defense module, data security isolation module, probe real-time detection and monitoring module, terminal attack detection and event correlation analysis module , and the mutual coordination and cooperation of system integrity detection and adaptive heterogeneous reorganization modules to improve the redundancy of the system. When the system encounters an attack, the system reorganization can be used to weaken the advantage of the attacker, and to maximize the guarantee that the system will survive the attack. It can run normally and smoothly and reduce the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and in particular relates to an APT defense system and an APT defense method based on system elasticity. In the defense method, data in a database is divided into key data and non-key data; distributing the key data to a plurality of physical locations, meanwhile, the key data is backed up and encrypted to form backup data, and thebackup data is physically isolated and stored; when the system detects an attack behavior, the completeness of the system is comprehensively detected, when the completeness detection of the system isnot passed, the physically isolated and stored backup data is decrypted and recovered, the decrypted and recovered backup data is used for reconstructing the system. According to the system and the method provided by the invention, the advantages of the attacker can be weakened by reconstructing the system when the system is subjected to the attack, and the condition that the system can operate normally and stably after being attacked is furthest ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an APT defense system based on system elasticity and a defense method thereof. Background technique [0002] Advanced Persistent Threat (APT) is to use advanced and complex methods and technologies to conduct long-term and persistent cyber attacks on specific targets, thereby stealing key data of the target. The concept of APT attack was first proposed due to the "Stuxnet" virus attack on Iran's nuclear facilities in 2010, followed by exposure of a large number of government departments, institutions, and organizations. These incidents have different impacts on national security, business operations, social life and other aspects. For the field of information security and traditional network security defense, this is a huge threat. [0003] Advanced Persistent Threat (Advanced Persistent Threat), where A-Advanced: Advanced means that the attacker has advanced attack mea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60G06F11/14
CPCG06F11/1446G06F21/602H04L63/1416H04L63/1441H04L63/1491
Inventor 张玉臣刘小虎范钰丹程相然张恒巍鲁晓彬董书琴
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products