Supercharge Your Innovation With Domain-Expert AI Agents!

Networking alarm method and system for attack source

An attack source and offensive technology, applied in the field of network security, can solve problems such as single solution capability, limited specific applications, and inability to achieve group defense and group governance, and achieve the effect of achieving synchronization and achieving group defense and group governance.

Inactive Publication Date: 2019-11-19
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In general, the capabilities of existing solutions are relatively single, or limited to specific applications, and cannot achieve group prevention and group governance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking alarm method and system for attack source
  • Networking alarm method and system for attack source
  • Networking alarm method and system for attack source

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the technical solutions of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and therefore are only examples, rather than limiting the protection scope of the present invention.

[0042] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0043] like figure 1 As shown in FIG. 1 , it is a flow chart of the method for network alerting of attack sources according to Embodiment 1 of the present application. from figure 1 It can be seen from the figure that the networked alarm method of the attack source in this embodiment can be applied to the cloud center, including the following steps:

[0044] S101: Receive the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a networking alarm method for an attack source. The networking alarm method comprises the following steps: receiving first attack source information reported by a first end management platform, updating current credit data according to the first attack source information, and generating a first credit data set; receiving second attack source information reported by a secondend management platform, and updating the first reputation data set according to the second attack source information to generate a second reputation data set; and issuing the second reputation dataset to the first end management platform, and sending the abnormal protocol message to a first-end management platform, so that the first-end management platform updates a matching rule of the first-end management platform, and the matching rule is used for identifying the abnormal protocol message, and after updating the matching rule of the first-end management platform, the first-end managementplatform issues the updated matching rule to a user side connected with the first-end management platform, so that the user side identifies the attack source according to the updated matching rule. According to the networking alarm method of the attack source, synchronization of matching rules of the attack source by the user side is achieved, and then mass prevention and mass treatment of the attack source are achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack source network alarm method and system. Background technique [0002] In recent years, cyber security incidents such as hacker attacks, cyber crimes, and cyber terrorism have occurred frequently, and state-level, organized, and large-scale cyber attacks are also common. Hacker attacks are developing from individuals to organizations and countries. They have strong purpose, obvious motives, and often have clear business, economic interests, or political demands. Attack methods have changed from traditional random viruses, Trojan horse infections, and network attacks to advanced How to effectively identify the source of attacks and respond in a timely manner has become a problem that cannot be ignored. The traditional intrusion detection system is based on its own rules for feature recognition, that is, it cannot be recognized beyond the coverage of the rules. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0263H04L63/1408H04L63/1441
Inventor 杨鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More