Attack behavior analysis method and device, storage medium and electronic device

An analysis method and behavioral technology, applied in the field of network security, can solve problems such as inability to predict threats

Active Publication Date: 2019-11-05
ZHEJIANG DAHUA TECH CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an attack behavior analysis method and device, storage medium, and electronic device, so as to at least solve the problem in the related art that network security analysis cannot make targeted threat predictions for specific targets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack behavior analysis method and device, storage medium and electronic device
  • Attack behavior analysis method and device, storage medium and electronic device
  • Attack behavior analysis method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0029] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

[0030] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal of an attack behavior analysis method according to an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an attack behavior analysis method and device, a storage medium and an electronic device, and the method comprises the steps: obtaining first safety data whichat least comprises an attack object and an attack behavior; performing classification statistics on the first security data according to the attack object and the attack behavior to obtain a target attack behavior for the target object; and analyzing the target attack behavior by using the target risk analysis model of the target object to obtain an analysis result for the target attack behavior.The problem that the network security analysis cannot perform targeted threat prediction on the specific target in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular, to an attack behavior analysis method and device, a storage medium, and an electronic device. Background technique [0002] With more and more emphasis on network security, most security companies have begun to introduce behavior analysis technology into their products to effectively improve the ability of security products to detect abnormal behavior. Identify potential threats through in-depth analysis and detection of communication data from network devices and terminal devices. At present, in the related technologies of network security analysis, the analysis data used is generally the security data of general equipment, such as firewalls, security logs and other data. Analyzing these data can obtain the overall security status of the network, but it is not very targeted and cannot Make targeted threat predictions for specific targets. [0003] In related tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433
Inventor 徐云飞张霞飞卢珂谢国豪尚玉红
Owner ZHEJIANG DAHUA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products