Security event response method and device

A security event and event identification technology, applied in the field of network security, can solve problems such as complex security events, single response strategy, and inability to respond to security events, and achieve the effect of enhancing flexibility

Active Publication Date: 2019-07-05
NEW H3C SECURITY TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, security incidents are often very complex, relying only on a single response strategy is usually unable to deal with complex security incidents, resulting in poor flexibility in security incident response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security event response method and device
  • Security event response method and device
  • Security event response method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] In order to improve the flexibility of security event response, embodiments of the present invention provide a security event response method, device, network device, and machine-readable storage medium. In the following, the security event response method provided by the embodiment of the present invention is firstly introduced.

[0027] The security event response method provided by the embodiment of the present invention can be applied to a network d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety event response method and device. The security event response method comprises the following steps of: when network equipment detects that a securityevent occurs, obtaining an event identifier of the security event and a current moment when the security event occurs, and according to the event identifier, searching a plurality of strategy identifiers corresponding to the event identifier and effective time periods respectively corresponding to the strategy identifiers from a configured security event response strategy list, determining a firststrategy identifier corresponding to the effective time period matched with the current moment, and executing a first response strategy with the strategy identifier being the first strategy identifier. A plurality of response strategies are configured for the same safety event, the effective time periods of the response strategies of the safety event do not coincide, different response strategiescan be executed for one safety event in different time periods, complex safety events are effectively coped with, and the response flexibility of the safety event is enhanced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security event response method and device. Background technique [0002] With the rapid development of Internet technology, the information carried by the network has become increasingly rich, and the Internet has become an important infrastructure for people's lives, bringing great convenience to people's lives. At the same time, network security issues are becoming more and more serious. Network viruses, worms, Trojan horses, and malicious software emerge in an endless stream, endangering the information security of network users. [0003] Security event analysis is an important means of network security technology. Common security events include remote Trojan horses, malicious program attacks, malformed message attacks, distributed services, brute force cracking, and lateral penetration. In the traditional security event analysis method, corresponding response stra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 孙尚勇
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products