Network forensics method and device based on alarm aggregation
A network and cybercrime technology, applied in the field of network security, can solve problems such as affecting the accuracy of network forensics results, achieve strong practicability and operability, and improve efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions. The technical term involved in the embodiment is as follows:
[0030] Currently, for situations where intrusion detection relies on captured network data fragments, the obtained network alarm evidence is likely to be incomplete. To this end, the embodiment of the present invention provides a network forensics method based on alarm aggregation, see figure 1 shown, including:
[0031] A) Build an attack graph; and obtain the intrusion detection data of key nodes in the network, and use the intrusion detection data as an alarm evidence set for network forensics analysis;
[0032] B) Map the alarm evidence in the alarm evidence set to the attack graph, and obtain the alarm evidence chain;
[0033] C) Clustering the alarm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com