Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for processing network security event, related device and storage medium

A technology for network security and security incidents, applied to a method for dealing with network security incidents, related devices and storage media, can solve problems such as missed reports and false reports of network security events, so as to avoid false positives and negative reports, improve The Effects of Network Security

Inactive Publication Date: 2019-11-22
国家工业信息安全发展研究中心
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method for processing network security events, related devices and storage media, so as to solve the problem of false positives and false positives of network security events in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing network security event, related device and storage medium
  • Method for processing network security event, related device and storage medium
  • Method for processing network security event, related device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The embodiment of the present invention provides a method for processing network security incidents, see figure 1 , the method includes:

[0033] S101. Verify the authenticity of the network security incidents discovered through monitoring, and formulate corresponding incident handling requirements for the network security incidents that pass the verification;

[0034] S102. Distribute the information of the network security incident and the corresponding disposal requirements to the affected relevant units, and receive the event feedback information from the relevant units, analyze the event feedback information, and determine whether the network security incident has been obtained Effectively dispose of, and end after it is determined that the network security incident has been effectively disposed of.

[0035] The embodiments of the present invention formulate corresponding event processing requirements for all monitored real network security events, thereby avoidin...

Embodiment 2

[0081] An embodiment of the present invention provides a device for processing network security events, see image 3 , the device consists of:

[0082] The verification unit is used to verify the authenticity of the network security incidents discovered by monitoring, and formulate corresponding incident handling requirements for the network security incidents that pass the verification;

[0083] A processing unit, configured to distribute information about network security incidents and corresponding disposal requirements to affected relevant units, receive event feedback information from the relevant units, analyze the event feedback information, and judge the network security incidents Whether it has been effectively dealt with, and after it is determined that the network security incident has been effectively dealt with, end.

[0084] The embodiments of the present invention formulate corresponding event processing requirements for all monitored real network security even...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for processing a network security event, a related device and a storage medium, and the method comprises the steps: verifying the authenticity of a monitored and foundnetwork security event, and formulating a corresponding event processing requirement for the network security event passing the verification; distributing the information of the network security events and the corresponding disposal requirements to affected related units; and receiving event feedback information of the related unit, analyzing the event feedback information, studying and judging whether the network security event is effectively handled or not, and ending after determining that the network security event is effectively handled. Therefore, corresponding event processing requirements are made for all monitored real network security events, and false alarm and missing alarm of the network security events are avoided.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a method for processing network security events, a related device and a storage medium. Background technique [0002] With the popularization of computers, people pay more and more attention to network security. Network security incidents refer to malicious attacks on information systems by attackers, which can lead to data leakage, data tampering, and inaccessibility of information systems. [0003] At present, real network security incidents must have relevant data such as system logs and screenshots as evidence. The information that needs to be reported for network security incidents includes: the domain name, IP address, event type, attack method and parameters of the attacked information system. The system needs to record the domain name, IP address, supervisory unit, contact person, contact information, etc. of the information system in advance, and match th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 张洪张格于盟黄海波刘博陈特林理平鹿瀚林杨杰高羽茜鞠远张晓帆赵阳光杨安朱丽娜刚占慧周瑞坤赵凯丽陈皓赵慧孙立立汪礼俊
Owner 国家工业信息安全发展研究中心