Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tracing analysis method for network attacks

An analysis method and network attack technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as difficult detection, single node attacking other nodes, etc.

Pending Publication Date: 2020-08-04
西安交大捷普网络科技有限公司
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attack techniques and attack methods used by network attackers have also developed new trends. The traditional protection by setting up security tools such as firewalls at the network boundary points to isolate the internal and external networks is common for a single node to attack other nodes or target A single, easy-to-find attack method such as attacking system vulnerabilities or preventing Trojan horse programs is effective
[0003] However, with the continuous emergence of network attack methods, not only are there various types, but also develop rapidly in the direction of high integration and automation. With the increasing complexity of the network, security threats are also tending to be diversified. and alerts, especially for advanced persistent threat attacks (Advanced Persistent Threat, APT), the tools or malicious programs used are generally targeted development, difficult to detect, 0day vulnerabilities will also be used in the attack, and it is persistent, will Make preparations for a long period of observation, spot check, information collection, social engineering, etc., and then gradually infiltrate, information return, communication control, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tracing analysis method for network attacks
  • Tracing analysis method for network attacks
  • Tracing analysis method for network attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions of the present invention will be described in detail below in conjunction with the drawings and embodiments; it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.

[0032] In order to facilitate the understanding of the embodiments of the present invention, a brief introduction of related technical terms is first introduced.

[0033] Threat, a potential cause of an unwanted incident that could result in harm to a system or organization.

[0034] Information security risk refers to the degree of impact on the organization after a security incident occurs due to the threat of exploiting the vulnerability of the information system.

[0035] Vulnerabilities, weaknesses of an asset or of several assets that may be exploited by threats.

[0036] Network traffic is the collection of data packets generated on the network by devices connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tracing analysis method for network attacks, which comprises the following steps: acquiring threat intelligence of a specified type, and caching the threat intelligence to alocal threat intelligence database; acquiring current alarm information and the local threat information, and judging the attack source of the alarm; respectively carrying out alarm association according to the attack source and / or the equipment identifier of the attack target, determining the attack stage of the equipment, and judging the equipment collapse level according to the attack stage; and obtaining asset information of the equipment, and determining the influence range of the attack according to the alarm association result. Effective traceability analysis of network attacks is achieved, various traceability results are obtained, traceability data can be updated every time traceability is conducted, and a basis is provided for network operation and maintenance personnel to handleproblems and strengthen security policies.

Description

technical field [0001] The invention belongs to the technical field of network security and data analysis, and in particular relates to a method for traceability and analysis of network attacks. Background technique [0002] With the advancement of technology, the Internet has penetrated into all aspects, and the number of attacks has increased year by year, and network security issues have gradually become the focus of society. The attack techniques and attack methods used by network attackers have also developed new trends. The traditional protection by setting up security tools such as firewalls at the network boundary points to isolate the internal and external networks is common for a single node to attack other nodes or target Single, easy-to-find attack methods such as attacking system vulnerabilities or preventing Trojan horse programs are effective. [0003] However, with the continuous emergence of network attack methods, not only are there various types, but also...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/1416H04L63/1425H04L63/1433H04L63/20H04L2463/146
Inventor 李福宜王平陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products