Network forensics method and device based on alarm aggregation
A network and evidence technology, applied in the field of network security, can solve problems affecting the accuracy of network forensics results, achieve strong practicability and operability, and improve efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions. The technical term involved in the embodiment is as follows:
[0030] Currently, for situations where intrusion detection relies on captured network data fragments, the obtained network alarm evidence is likely to be incomplete. To this end, the embodiment of the present invention provides a network forensics method based on alarm aggregation, see figure 1 shown, including:
[0031] A) Build an attack graph; and obtain the intrusion detection data of key nodes in the network, and use the intrusion detection data as an alarm evidence set for network forensics analysis;
[0032] B) Map the alarm evidence in the alarm evidence set to the attack graph, and obtain the alarm evidence chain;
[0033] C) Clustering the alarm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


