Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for automatically scoring attack and defense confrontation platform based on video recognition

A technology for video recognition and automatic scoring, applied in the field of network security, can solve the problems of inability to intuitively review the score operation of the exercisers, difficult to distinguish, etc., to achieve the effect of easy collection and identification, avoid data differences, and optimize scoring standards

Active Publication Date: 2020-09-08
广州锦行网络科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2. The scoring device based on data packets and attack logs cannot intuitively review the scoring operations of drillers. It needs to be analyzed according to data packets or attack logs, and different operations may alternately occur in the same time period, which is difficult to distinguish

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically scoring attack and defense confrontation platform based on video recognition
  • Method and device for automatically scoring attack and defense confrontation platform based on video recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] According to a specific embodiment of the present invention, when carrying out multiple offensive and defensive drills, comprise the following steps:

[0065] S1: Add the video data of key operational behaviors including successful access to the target host, accessing sensitive files, querying sensitive data, modifying system configuration, attacking the system, or exploiting application vulnerabilities in the video feature library as targets;

[0066] The key operational behaviors are a set of operational behaviors defined before the start of the offensive and defensive confrontation that can be judged as scoring in this offensive and defensive confrontation.

[0067] S2: Record all desktop operation videos of offensive and defensive drillers. Desktop operations include: mouse movement, input cursor movement, desktop window element changes, etc.;

[0068] S3: Extract the video data recorded in step S2 frame by frame, perform feature analysis, read the content of the vi...

example 2

[0081] According to a specific embodiment of the present invention, taking the offensive and defensive confrontation of database sensitive data acquisition as an example, the method includes the following steps:

[0082] S1: Add the video data of accessing the database, querying the database, and querying sensitive data in the video feature library as targets;

[0083] S2: Record all desktop operation videos of offensive and defensive drillers. Desktop operations include: mouse movement, input cursor movement, desktop window element changes, etc.;

[0084] S3: Extract the video data recorded in step S2 frame by frame, perform feature analysis, read the content of the video frame and the content of the previous and subsequent video frames, and judge the desktop operation behavior of the driller according to the change of the content of the video frame. By positioning the two-dimensional coordinates of the mouse and the input cursor in the video, the data of the keyboard and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for automatically scoring an attack and defense confrontation platform based on video recognition, belongs to the field of network security, and comprisesthe following steps: S1, adding video data of key operation behaviors in attack and defense exercises into a video feature library as a target; S2, recording desktop operation videos of all offensiveand defensive confrontation platforms of offensive and defensive exercisers; S3, extracting the video data recorded in the step S2 frame by frame, performing feature analysis, and obtaining a scoringresult; and S4, extracting a video frame group of the effective operation behavior from a feature analysis result in the step S3, and inputting the video frame group into a video feature library. According to the invention, the attack and defense drill is automatically scored according to the recorded video data, and the video feature library is continuously optimized, so that duplicate analysis is facilitated, and misjudgment caused by packet loss is effectively avoided.

Description

technical field [0001] The invention relates to the field of network security, in particular to an automatic scoring method and device for an offensive and defensive confrontation platform based on video recognition. Background technique [0002] With the rapid development of the Internet, network security has become a matter of great concern to people. Improving network security and preventing network attacks have always been a concern of network security personnel. Network protection has become extremely important. [0003] Conventional network attack methods include: TCP SYN denial of service attack, port scanning, fragmented IP packet attack, simultaneous setting of SYN bit and FIN bit, super long PING packet, address guessing attack, teardrop attack, and IP address with source routing option IP packets, IP packets with record routing options, IP packets with unknown protocol fields, IP address spoofing, routing protocol attacks, and attacks against device forwarding t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/732G06F16/783G06K9/62G06F16/71G06Q10/06
CPCG06F16/7328G06F16/783G06F16/71G06Q10/06398G06F18/22
Inventor 吴建亮胡鹏刘桂潜
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products