Attack chain construction method and device, equipment and medium
A construction method and attacker's technology, applied in the field of network security, can solve the problems of high cost, high requirements of network security hardware equipment, lack of attack chain, etc., achieve the effect of low cost and improve the level of network security defense
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0049] At present, the attack chain acquisition method is mainly to detect malicious attack behaviors through different types of security detection equipment, and then collect attack logs through the backend, store the attack logs in a pre-selected database, and centralize the data in the attack logs. Push it to the data sharing platform for correlation analysis to build an attack chain. However, in the process of obtaining the attack chain, there are high requirements on the networ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


