Threat detection method, device and equipment and storage medium

A technology for threat detection and detection results, which is applied in the field of network security and can solve the problems of poor global threat information detection and weak security defense capability.

Active Publication Date: 2020-05-12
SANGFOR TECH INC
View PDF9 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a threat detection method, device, equipment and storage medium,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat detection method, device and equipment and storage medium
  • Threat detection method, device and equipment and storage medium
  • Threat detection method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] Such as figure 1 as shown, figure 1 It is a schematic diagram of the terminal structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0030] The embodiment terminal of the present invention can be PC, also can be smart mobile phone, panel computer, e-book reader, MP3 (Moving Picture Experts Group Audio Layer III, moving picture expert compresses standard audio level 3) player, MP4 (Moving Picture Experts Group Audio Layer III) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert compression standard audio layer 4) Players, portable computers and other mobile terminal devices with display functions.

[0031] Such as figure 1 As shown, the terminal may include: a processor 1001 , such as a CPU, a network interface 1004 , a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threat detection method. The method comprises the steps of collecting weblog monitored in real time; performing threat detection on the weblog by utilizing a threat detectionmodel to obtain a detection result; if the detection result represents that the behavior of the weblog is abnormal, determining a target attack link to which the weblog with the abnormal behavior belongs based on an attack chain of a network space security framework; and taking the target attack link in the attack chain and all preorder attack links of the target attack link as attacked links tocomplete threat detection of the weblog. The invention further discloses a threat detection device and equipment and a storage medium. Threat capture is carried out from the global perspective of theattack chain, and the security defense capability is improved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a threat detection method, device, equipment and storage medium. Background technique [0002] The current security defense system prevailing in the industry still focuses on the defense or blocking capabilities at the network or host level. Intrusion detection systems are deployed on each network security node for threat capture. The intrusion detection systems of each network node are independent detection systems. It can only capture threat information in a single attack scenario. However, since many attackers' attack links cover multiple links and entities such as networks, servers, hosts, and applications, the current solution cannot conduct security analysis from the global perspective of the attack chain, and cannot place the attacker in the entire attack chain. Simultaneous capture of multiple links of the attack, so that the entire attack link cannot be restored,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1416H04L63/1425H04L63/20G06N3/08G06N3/044G06N3/045
Inventor 庞思铭
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products