Network attack tracing method and device

A network attack and attack source technology, applied in the field of network security, can solve the problem that users cannot quickly retain and discover logs, and achieve the effect of reducing losses

Pending Publication Date: 2020-02-07
NEW H3C SECURITY TECH CO LTD
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When encountering a network attack, security defense log sources (various security devices used to defend against network attacks) will generate a large number of logs, making it impossible for users to quickly retain and find important logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack tracing method and device
  • Network attack tracing method and device
  • Network attack tracing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0061] It should be noted that, unless otherwise specified, technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which this application belongs.

[0062] In addition, the terms "first" and "second", etc. are used to distinguish different objects, not to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack tracing method and device. The method comprises the following steps: when an attack event reported by security equipment in a network is received, acquiring anattack log which is generated by the security equipment and corresponds to the attack event, and extracting network address information of an attack source and an attack target in the attack log basedon streaming computation, storing the network address information in a memory, and then matching the network address information of the attack source and the attack target with a basic information database pre-established in the memory to obtain network position information of the attack source and the attack target; and finally, a network attack path diagram can be quickly generated according tothe network position information of the attack source and the attack target, and the whole network attack topology can be accurately restored in real time, so that a user can quickly alarm and repairattacked network assets and user terminals, and corresponding loss is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for network attack source tracing. Background technique [0002] In recent years, with the continuous popularization of the network, the attack techniques and attack methods used by network attackers have also developed new trends. Therefore, network security issues also require network users to pay constant attention and take effective security protection measures. [0003] At present, in most network security protection solutions, the security administrator conducts manual management through the Security Operation Center (SOC), and manually counts network attack events and issues manual work orders. Due to the inevitable lag of manual management and manual early warning, the network suffers certain losses. [0004] In order to reduce the losses caused by network attacks, more and more security analysis scenarios need to quickly and accur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F16/29G06T11/20
CPCG06F11/3072G06F16/29G06T11/206
Inventor 韩敏
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products