Visual attack and defense graph generation method and device, computer equipment and storage medium

A technology for generating devices and computer programs, applied in electrical components, transmission systems, platform integrity maintenance, etc., and can solve problems such as low generation efficiency of attack and defense diagrams

Active Publication Date: 2019-10-08
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method, device, computer equipment, and storage medium for generating a visualized attack-defense graph, so as to solve the problem of low generation efficiency of the current attack-defense graph

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual attack and defense graph generation method and device, computer equipment and storage medium
  • Visual attack and defense graph generation method and device, computer equipment and storage medium
  • Visual attack and defense graph generation method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] The visual attack and defense map generation method provided by this application can be applied in such as figure 1 In the application environment, in which, the client communicates with the server through the network, the server obtains the attack and defense map generation request through the client, and obtains each access record of the business system according to the attack and defense map generation request; access records that meet the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of security monitoring, and discloses a visual attack and defense graph generation method and device, computer equipment and a storage medium, and the method comprises the steps: obtaining an attack and defense graph generation request, and obtaining each access record of a business system according to the attack and defense graph generation request; determiningthe access record meeting the preset condition as an abnormal access record; acquiring a corresponding attack source IP and an attacked point IP based on each abnormal access record; obtaining latitude and longitude corresponding to the attack source IP and latitude and longitude corresponding to the attacked point IP; and sending the latitude and longitude of the attack source IP and the latitudeand longitude of the attacked point IP to a business-level data chart, and displaying the attack source IP and the attacked point IP of each abnormal access record through the business-level data chart to obtain an attack and defense chart. By positioning the attack source and the attacked point and automatically displaying the attack source and the attacked point through the chart, the visualization effect of the network attack and defense chart and the efficiency of network security management can be improved.

Description

technical field [0001] The invention belongs to the field of security monitoring, and more specifically relates to a method, device, computer equipment and storage medium for generating a visualized attack and defense diagram. Background technique [0002] Network attack and defense mainly refers to computer anti-virus technology and technology to create destructive viruses. The specific attack and defense can be understood as: one is a hacker, the other is an anti-virus software; or one is a technology for invading a computer system, and the other is a technology for protecting a computer from being invaded. [0003] With the advent of the big data era, the network is developing towards intelligence and collaboration, and multi-step combined penetration attacks have become the main form of threatening network security, which has brought great difficulties to network security administrators. Especially in recent years, there have been more and more violent problems in netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55
CPCH04L63/1441G06F21/55H04L63/20H04L63/1416
Inventor 张栋唐炳武袁志超
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products