Security defense method, device and electronic equipment for advanced persistent threats

A security defense and continuous technology, applied in the field of network security, can solve the problems of loss of defense performance and inability to guarantee the security of user data and information, and achieve accurate and effective defense and ensure the effect of data and information security

Active Publication Date: 2020-09-25
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since these active protection technologies mainly detect and analyze the attack event itself, when faced with organized, targeted, and highly concealed APT attacks, they often lose their defensive performance due to the difficulty of effective detection, and cannot guarantee user data. information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense method, device and electronic equipment for advanced persistent threats
  • Security defense method, device and electronic equipment for advanced persistent threats
  • Security defense method, device and electronic equipment for advanced persistent threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments in the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the embodiments of the present invention.

[0027] For the two scenarios of simultaneous action or non-simultaneous action in the process of network attack and defense, static game models or dynamic game models can be used to study network defense decision-making problems. When further considering the impact of offensive and defensive behavior info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security defense method and device for advanced persistent threats and electronic equipment, and the method comprises the steps: building countermeasure models of an attack party and a defense party in the attack process based on the characteristics of the attack party and the defense party of the advanced persistent threats in the attack process; utilizing an income model of an asymmetric information game to carry out formalized description on the asymmetry of the information acquired by the attacking and defending parties in the attack process; based on the adversarial model and the income model of the asymmetric information game, predicting the traffic probability of the advanced persistent threat for each feasible attack path through forward solving; and based on the passing probability, obtaining an optimal defense strategy for the advanced persistent threat so as to carry out security defense. According to the embodiment of the invention, advanced persistent threats can be detected and defended more comprehensively, accurately and effectively, so that the data information security of a user can be ensured more effectively.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, and more specifically, relate to a security defense method, device and electronic equipment for advanced persistent threats (Advanced Persistent Threat, APT). Background technique [0002] At present, the threat of network attack and information theft has seriously affected the data and information security of computer network and communication network space. Among the many current security threats, there is a new type of attack with a very long duration, called advanced persistent threat attack APT. APT attacks have the characteristics of strong targeting, high concealment, multi-dimensional methods, and not easy to be detected. [0003] Some of the existing network security technologies still rely on means such as firewalls, intrusion detection and anti-virus software, which are static and one-sided passive defenses. These passive defense technologies are attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 刘银龙张杭生马宇晨李婷梁杰耿立茹
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products