Network attack path prediction method and device and security management platform

A technology of attack path and network attack, which is applied in the field of network security of information technology, can solve the problems of no overall cognition of attack path, unfavorable asset security protection, and inability to predict attack path, etc., to achieve the comprehensive effect of eliminating attack and warning information

Active Publication Date: 2020-06-12
北京威努特技术有限公司
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a network attack path prediction method, device and security management platform to solve the problem that in the existing attack analysis, there is no overall cognition of the attack path in the attack process, and the attack path cannot be predicted. , which is not conducive to the subsequent security protection of assets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack path prediction method and device and security management platform
  • Network attack path prediction method and device and security management platform
  • Network attack path prediction method and device and security management platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0021] The embodiment of the present invention provides a network attack path prediction method, such as figure 1 shown, including:

[0022] S101. Obtain various alarm information generated during network operation. The alarm information at least includes: unknown device alarm information, peripheral equipment alarm information, and each alarm information in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack path prediction method and device and a security management platform, and the method comprises the steps: obtaining various types of alarm information generated in the operation of a network, the alarm information at least comprises unknown equipment alarm information and peripheral alarm information, and each piece of alarm information comprises alarm time, a source asset IP and a target asset IP; sorting the alarm information according to time, and constructing a plurality of attack paths by taking target asset IPs in the unknown equipment alarm information and the peripheral alarm information as attack path starting points; calculating the attack probability of each attack path according to each attack path and a preset probability calculation rule; and determining the attack path with the maximum attack probability as the optimal attack path. According to the optimal attack path determined by the method, an attack source, an attack destination, attacked assets and equipment with potential safety hazards can be clearly checked, so that all assets in the attack process can be specifically analyzed, and the assets which may be attacked aresubjected to safety protection.

Description

technical field [0001] The invention relates to the technical field of network security of information technology, in particular to a network attack path prediction method, device and security management platform. Background technique [0002] In the practice of industrial control system (referred to as industrial control system) network security, because the process, communication and data of the industrial control system are relatively single and stable, the industrial control system has strict requirements on the reliability and continuity of the business. Whitelist or blacklist techniques are introduced. [0003] At present, the attack analysis of industrial assets and equipment is based on blacklist technology. The attack analysis based on blacklist technology is based on the analysis of known security vulnerabilities and assets that have been attacked, but there is no attack path in the attack process. The overall cognition cannot predict the attack path, which is not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/101H04L63/20
Inventor 刘无敌李飞龙国东
Owner 北京威努特技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products