Method and device for detecting and backtracking collapsed host based on real-time stream processing
A real-time streaming, host technology, applied in the field of network security, which can solve the problems such as limited threat intelligence quality, lack of historical retrospective means, and undetectable attack behavior.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Such as figure 1 or figure 2 As shown, the present invention discloses a method for detecting a compromised host based on real-time stream processing and backtracking, which includes the following steps:
[0031] Step 1. Obtain network data packets from each node of the network and retain the corresponding original network data packets based on configuration requirements, and extract host behavior data from network data packets based on DPI technology through analysis probes;
[0032] Step 2, compare the current real-time behavior data with the historical data for anomaly detection and judge whether there is a difference; if yes, go to step 3; otherwise, go to step 1;
[0033] Step 3, save the original network data packet of the host whose data is detected to be abnormal and record the network behavior data of the host in detail, and judge whether it is an abnormal host by analyzing the corresponding data file; step 1;
[0034] Step 4, match the information of the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


