Method and system for identifying botnet attack sources of Internet of Things
A botnet, attack source technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of high false positive rate of attacks and inability to capture zombie nodes.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] refer to figure 1 , the embodiment of the present invention provides a method for identifying the attack source of the Internet of Things botnet, which may include the following steps:
[0029] Step S101, obtaining attack warning information;
[0030] In the embodiment of the present invention, the attack warning information may be obtained from a situational awareness platform, which is a network security situational awareness platform, or called a network security situational awareness system. The situational awareness platform is a platform for collecting, mastering and analyzing cyberspace offensive and defensive confrontation information. It should be noted that the attack alarm information includes at least one of attack time, attack alarm type, attack source, attack target, and attack load.
[0031] Step S102, determining the attack warning information satisfying the preset condition as a botnet attack, and identifying the botnet host based on the botnet attack...
Embodiment 2
[0052] refer to Figure 4 , the embodiment of the present invention provides a system for identifying the attack source of the Internet of Things botnet, which includes:
[0053] An acquisition module 11, configured to acquire attack warning information;
[0054] The first determination module 12 is configured to determine the attack warning information satisfying the preset condition as a botnet attack, and identify the botnet host based on the botnet attack;
[0055] The extraction module 13 is used to extract port opening information and fingerprint service information of the botnet host from the threat intelligence library;
[0056] Judging module 14, for judging whether the botnet host meets the characteristics of the Internet of Things device based on port opening information and fingerprint service information;
[0057] The second determining module 15 is configured to determine a botnet host meeting the characteristics of an IoT device as an attack source of an IoT b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


