A security device data communication protocol for cooperative network defense

A technology of security equipment and data communication, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve the problems of responding to network threats, whether it can handle unpredictability, etc., and achieve the effect of flexible change and accurate content.

Active Publication Date: 2022-05-20
HARBIN ENG UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The goal of these specifications is to share network intelligence, but it is far from enough to share network intelligence with major security vendors
In recent years, with the continuous update and faster spread of network threats, even if the existing defense system can quickly receive network threat intelligence, it is different from the analysis timeliness of different security devices. Response, can handle unpredictable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security device data communication protocol for cooperative network defense
  • A security device data communication protocol for cooperative network defense
  • A security device data communication protocol for cooperative network defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A security device data communication protocol for collaborative network defense, which accelerates the speed of existing network defense through the data communication between the creator of the collaborative network defense command and the command receiver. This protocol creates a network defense command and sends it to the command receiver. After the command receiver successfully receives the command, it creates a command response to the received command according to this protocol and sends it back to the command creator; in this protocol, the command receiver is a security For devices, the protocol defines a language for creating cyber defense commands and responses, and supports updating of content.

[0025] The protocol defines the language for network defense command creators to create commands and command receivers to receive commands, and supports content updates.

[0026] Among them, the network defense command consists of a four-tuple:

[0027] , the element ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data communication protocol for safety equipment for cooperative network defense, which belongs to the technical field of network defense. The communication protocol of the present invention is used for data communication between the creator of the cooperative network defense command and the receiver of the network defense command, and is characterized in that, after receiving the defense means, the creator of the network defense command creates a network defense command according to the communication protocol, And send it to the receiver of the network defense command. After successfully receiving the network defense command, the receiver of the network defense command creates a network defense command response to the received network defense command according to this communication protocol, and sends it back to the creator of the network defense command; in this communication protocol In , the recipient of the network defense command is a security device. This protocol responds to endless network threats by keeping the content of the protocol updated, and has the advantages of flexible changes, precise content, and no ambiguity.

Description

technical field [0001] The invention belongs to the technical field of network defense, and in particular relates to a data communication protocol for safety equipment for cooperative network defense. Background technique [0002] Today, cyber defenses leverage the sharing of cyber threat intelligence to detect and contain attackers before they start exploiting vulnerabilities. Mature foreign threat intelligence standards include network observable expressions (CyboX), structured threat information expressions (Structured Threat Information e Expression, STIX) and trusted automated exchange of indicator information (Trusted Automate de Xchange of Indicator Information, TAXII). STIX specifications can describe many aspects of threat intelligence The characteristics of threats, including threat factors, threat activities, security incidents, etc., are used by TAXII to transmit threat intelligence. Users will be able to pass anonymized data to their security vendors, and secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/1441
Inventor 李晋张莉玲蒋正乾刘泽远程建华
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products