Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat discovery model construction technology based on digital certificate

A technology of digital certificates and models, applied in digital transmission systems, user identity/authority verification, electrical components, etc.

Inactive Publication Date: 2019-11-12
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a digital certificate-based threat discovery model construction technology to solve the problem of passive inspection data security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat discovery model construction technology based on digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] see figure 1 , the present invention provides a technical solution: a digital certificate-based threat discovery model construction technology, the steps of which are:

[0033] (1) Detect the port on the specified IP side:

[0034] (1.1) Obtain the detailed information of the port certificate;

[0035] (1.2) Get connection response time difference;

[0036] (1.3) Obtain the port connection home page information;

[0037] (1.4) Obtain other port info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network protection, in particular to a threat discovery model construction technology based on a digital certificate, which comprises the following steps: (1) detecting a port of a specified IP end: (1.1) acquiring detailed information of a port certificate; (1.2) acquiring a connection response time difference; (1.3) acquiring port connection home page information; (1.4) acquiring information of other ports; (2) analyzing the acquired data: (2.1) analyzing the certificate; (2.2) calculating the hyper-connection amount of the home page; (2.3) analyzing the connection response time; (2.4) carrying out data size analysis on home page information; and (2.5) carrying out screening analysis on other correspondingly detected ports. According to theinvention, a suspicious secret-stealing fingerprint analysis model can be constructed, and targeted monitoring and discovery of a specific scene are realized.

Description

technical field [0001] The invention relates to the technical field of network protection, and the specific field is a digital certificate-based threat discovery model construction technology. Background technique [0002] In recent years, the network facilities and data of key units in our country have been frequently attacked and stolen by overseas spy agencies and anti-communist hacker organizations. Overseas spy organizations use a series of extremely advanced attack methods such as APT attacks and 0day vulnerabilities to easily break through traditional Network security protection facilities attack, control, steal secrets, and destroy our important and sensitive departments and key infrastructure, while network security responses are always in a situation of hindsight and passive attack, lack of high-level attacks originating from abroad The ability to conduct timely response and early warning. Contents of the invention [0003] The purpose of the present invention i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3263H04L63/145H04L63/1466
Inventor 孙波李应博张伟司成祥张建松李胜男毛蔚轩盖伟麟王亿芳胡晓旭王梦禹
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products