Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An automatic scoring method and device for offensive and defensive confrontation platforms based on video recognition

An automatic scoring and video recognition technology, which is applied in the field of network security, can solve problems such as difficult to distinguish and inability to intuitively review the score operation of rehearsal personnel, and achieve the effects of avoiding data differences, easy collection and identification, and convenient replay analysis

Active Publication Date: 2021-05-18
广州锦行网络科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2. The scoring device based on data packets and attack logs cannot intuitively review the scoring operations of drillers. It needs to be analyzed according to data packets or attack logs, and different operations may alternately occur in the same time period, which is difficult to distinguish

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An automatic scoring method and device for offensive and defensive confrontation platforms based on video recognition
  • An automatic scoring method and device for offensive and defensive confrontation platforms based on video recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] According to a specific embodiment of the present invention, when carrying out multiple offensive and defensive drills, comprise the following steps:

[0065] S1: Add the video data of key operational behaviors including successful access to the target host, accessing sensitive files, querying sensitive data, modifying system configuration, attacking the system, or exploiting application vulnerabilities in the video feature library as targets;

[0066] The key operational behaviors are a set of operational behaviors defined before the start of the offensive and defensive confrontation that can be judged as scoring in this offensive and defensive confrontation.

[0067] S2: Record all desktop operation videos of offensive and defensive drillers. Desktop operations include: mouse movement, input cursor movement, desktop window element changes, etc.;

[0068] S3: Extract the video data recorded in step S2 frame by frame, perform feature analysis, read the content of the vi...

example 2

[0081] According to a specific embodiment of the present invention, taking the offensive and defensive confrontation of database sensitive data acquisition as an example, the method includes the following steps:

[0082] S1: Add the video data of accessing the database, querying the database, and querying sensitive data in the video feature library as targets;

[0083] S2: Record all desktop operation videos of offensive and defensive drillers. Desktop operations include: mouse movement, input cursor movement, desktop window element changes, etc.;

[0084] S3: Extract the video data recorded in step S2 frame by frame, perform feature analysis, read the content of the video frame and the content of the previous and subsequent video frames, and judge the desktop operation behavior of the driller according to the change of the content of the video frame. By positioning the two-dimensional coordinates of the mouse and the input cursor in the video, the data of the keyboard and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for automatically scoring offensive and defensive confrontation platforms based on video recognition, belonging to the field of network security, comprising the following steps: S1: adding video data of key operational behaviors in offensive and defensive drills to the video feature library as targets; S2: Record all desktop operation videos of offensive and defensive drillers on the offensive and defensive confrontation platform; S3: Extract the video data recorded in step S2 frame by frame, perform feature analysis, and obtain scoring results; S4: From the feature analysis of step S3 The video frame group of effective operation behavior is extracted from the result and entered into the video feature library. The invention realizes automatic scoring of offensive and defensive drills according to the recorded video data, continuously optimizes the video feature library, facilitates replay analysis, and effectively avoids misjudgment caused by packet loss.

Description

technical field [0001] The invention relates to the field of network security, in particular to an automatic scoring method and device for an offensive and defensive confrontation platform based on video recognition. Background technique [0002] With the rapid development of the Internet, network security has become a matter of great concern to people. Improving network security and preventing network attacks have always been a concern of network security personnel. Network protection has become extremely important. [0003] Conventional network attack methods include: TCP SYN denial of service attack, port scanning, fragmented IP packet attack, simultaneous setting of SYN bit and FIN bit, super long PING packet, address guessing attack, teardrop attack, and IP address with source routing option IP packets, IP packets with record routing options, IP packets with unknown protocol fields, IP address spoofing, routing protocol attacks, and attacks against device forwarding t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/732G06F16/783G06K9/62G06F16/71G06Q10/06
CPCG06F16/7328G06F16/783G06F16/71G06Q10/06398G06F18/22
Inventor 吴建亮胡鹏刘桂潜
Owner 广州锦行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products