Continuous sub-graph matching method and system for mode graph change, and equipment

A matching method and pattern diagram technology, applied in the field of network security, can solve problems such as unpredictable network attack patterns, and achieve the effects of network threat detection, cost reduction, and rapid incremental maintenance

Active Publication Date: 2020-08-07
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technology researches continuous subgraph pattern matching technology to find out whether there are abnormal network attack patterns in a dynamically changing network, so that abnormal network attack behaviors can be monitored, but research has found that there is currently no graph-based method to solve network threats For the last two problems of detection, it is impossible to predict the network attack mode or guess the target of the attack. The monitoring of abnormal network attack behaviors is regarded as a passive detection mode of network threats, and the last two problems of network threat detection are regarded as active detection methods. Now Technology cannot proactively detect cyber threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous sub-graph matching method and system for mode graph change, and equipment
  • Continuous sub-graph matching method and system for mode graph change, and equipment
  • Continuous sub-graph matching method and system for mode graph change, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0057] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present invention shall have the usual meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar terms used in one or more embodiments of the present invention do not indicate any order, quantity or importance, but are used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the invention provide a continuous sub-graph matching method and a continuous sub-graph matching system for mode graph change, and equipment. The continuous sub-graph matching method comprises the steps of: constructing a data structure based on a network topological graph G and a mode graph P, wherein the data structure is used for storing a local matching result of thenetwork topological graph G and the mode graph P; constructing a maintenance model based on the dynamic change of the mode graph P; updating the data structure based on the dynamic change of the modegraph P by means of the maintenance model, so that the data structure stores a real-time local matching result; constructing a cost model based on a matching sequence of the mode graph P; calculatingthe minimum matching cost of the mode graph P by using the cost model, and acquiring a matching algorithm based on the minimum matching cost; and acquiring a final matching result of the network topological graph G and the mode graph P based on the real-time local matching result and the matching algorithm, so as to complete network threat detection. According to the continuous sub-graph matchingmethod and the continuous sub-graph matching system, abnormal network attack behaviors can be monitored, an impending network attack mode can be predicted, and an attack target of a network hacker can be speculated.

Description

technical field [0001] One or more embodiments of the present invention relate to the technical field of network security, and in particular to a continuous subgraph matching method, system and device for pattern graph changes. Background technique [0002] As an important means of maintaining network security, network threat detection mainly includes: 1) monitoring abnormal network attack behaviors; 2) predicting upcoming network attack patterns; 3) speculating on the attack targets of network hackers. Existing technology researches continuous subgraph pattern matching technology to find out whether there are abnormal network attack patterns in a dynamically changing network, so that abnormal network attack behaviors can be monitored, but the research finds that there is currently no graph-based method to solve network threats For the last two problems of detection, it is impossible to predict the network attack mode or guess the target of the attack. The monitoring of abno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1425H04L63/1416H04L63/20H04L41/142H04L41/12
Inventor 郭得科张千桢王希罗来龙
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products