Unlock instant, AI-driven research and patent intelligence for your innovation.

Active and passive combined network space target deep mining technology based on closed-loop feedback

A cyberspace, closed-loop feedback technology, applied in the field of network security, can solve the problems of blind spots in target data acquisition, inability to quickly obtain a large number of targets, etc.

Inactive Publication Date: 2019-11-19
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a closed-loop feedback-based active-passive combined network space target depth mining technology to solve the problem that a large number of targets cannot be quickly obtained in the prior art and there are blind spots in target data acquisition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active and passive combined network space target deep mining technology based on closed-loop feedback
  • Active and passive combined network space target deep mining technology based on closed-loop feedback

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] see Figures 1 to 2 , the present invention provides a technical solution: a closed-loop feedback-based combination of active and passive cyberspace target depth mining technology, including active detection data, passive analysis data, and threat intelligence database,

[0025] Active detection data is a method based on network detection, which conducts a large-scale identification of assets existing in the target network, as well as asset-related thre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security. The invention relates to a deep mining technology, in particular to an active-passive combined network space target deep mining technology based on closed-loop feedback. The technology comprises actively detecting active detection data, passive analysis data and a threat information library, active detection data are based on a network detection method; performing large-area identification on assets existing in the target network and threats, vulnerabilities, running states and topological structure related attributes related tothe assets to carry out extensive target detection; the passive analysis data are used for detecting a key network; obtaining actual traffic, performing flow enhanced analysis, performing key targetdetection and analysis through passive analysis data; detecting high-value clues; wherein the active detection data can carry out asset re-identification on the clue and carry out important asset detection, the threat intelligence library is used for carrying out data intelligence support on the active detection data and the passive analysis data, and the cooperative linkage and data fusion technology of active and passive data acquisition can realize timely and comprehensive acquisition of situation data.

Description

technical field [0001] The invention relates to the technical field of network security, and the specific field is a closed-loop feedback-based active and passive combined network space target depth mining technology. Background technique [0002] At present, the network security industry mainly uses active and passive means to obtain target network situation data. Active detection is mainly based on the method of network detection, which identifies the assets existing in the target network, as well as asset-related threats, vulnerabilities, operating status, topology and other related attributes in a large area, and can quickly and large-scale discover target information. The disadvantage is that the depth and breadth of information acquisition is not enough, some information is not accurate, and if the concealment of active detection is not enough, it will be discovered. Passive detection detects key networks and needs to obtain actual traffic for more in-depth detection ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/20
Inventor 孙波李应博张伟司成祥张建松李胜男毛蔚轩盖伟麟张泽亚刘云昊亓培锋
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT