Check patentability & draft patents in minutes with Patsnap Eureka AI!

Visualization method for network attack chain graph and storage medium

A network attack and chain graph technology, applied in the field of network security, can solve the problem of network security display disorganized and other problems

Inactive Publication Date: 2019-10-15
北京瀚海思创科技有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the simple superimposition of information may make the display of network security messy, so how to make the network attack display simple and intuitive without losing information has become a technical problem that needs to be solved urgently in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visualization method for network attack chain graph and storage medium
  • Visualization method for network attack chain graph and storage medium
  • Visualization method for network attack chain graph and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention is described below based on examples, but the present invention is not limited to these examples.

[0032] These processes, processes, logic blocks, functions, etc. are generally considered to be a self-consistent sequence of steps or instructions to achieve an ideal or expected result. The steps generally involve physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, optical, or quantum signals capable of being stored, transferred, combined, compared, and otherwise manipulated by a computer or data processing system. It turns out that it is sometimes convenient, for reasons of sharing, to refer to these signals as bits, waves, waveforms, streams, values, elements, symbols, letters, terms, numbers, and similar names, and to refer to them in computer programs or software as It is code (which may be object code, source code or binary code).

[0033] The present inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a visualization method for a network attack chain graph and a storage medium, and the method comprises the steps: carrying out the tracking of a network attack, and determiningthe type of the network attack and attacker information; analyzing the network attack to obtain information of the network attack; sorting the information of the network attack; according to the timesequence, the types and the times of the network attacks are counted, generating an attack chain graph, wherein one dimension of the attack chain graph is the types of the network attacks, the otherdimension of the attack chain graph is the occurrence time of the network attacks, a plurality of network attack dots are arranged on the graph, and the sizes of the dots represent the number of the network attacks; and displaying the attack chain graph. The method has the advantages that the display interface is multi-dimensional; a display interface is concise and clear; and the display elementsare diversified.

Description

technical field [0001] The invention relates to the field of network security, in particular to a visualization method and a storage medium for tracking and displaying network attacks and embodying attack chains. Background technique [0002] With the development of "Internet +", more and more businesses are transferred from offline to online, and business systems also carry more access requirements. At the same time, network security has also become a very important issue. Various network attacks will target various loopholes in the business platform itself, conduct network attacks on the Internet business platform, or conduct network stealing, all of which will affect the normal operation of the business. Moreover, the methods and means of network attacks will evolve with the development of time and different methods and means. [0003] The visualization of network security is to display a variety of high-latitude, unstructured, and multivariate data, how to display it b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/20
Inventor 谢鹏
Owner 北京瀚海思创科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More