Advanced persistent threat detection method, system, computer and storage medium

A threat detection and advanced technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to block, trace, and find out network attacks

Pending Publication Date: 2020-09-08
CHINA MOBILE COMM GRP CO LTD +3
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the key nodes of the network, operators are completely unaware of APT attacks in the network. At the same time, if such a phenomenon occurs in t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Advanced persistent threat detection method, system, computer and storage medium
  • Advanced persistent threat detection method, system, computer and storage medium
  • Advanced persistent threat detection method, system, computer and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures.

[0050] figure 1 It is a schematic flow diagram of an advanced sustainable threat detection method in an embodiment, such as figure 1 As shown, in one embodiment, the embodiment of the application of the present invention is used for network security equipment, and an advanced sustainable threat detection method includes the following steps:

[0051] Step 110: Analyze the traffic of the backbone network of the operator and restore the files transmitted in the backbone network.

[0052] Specifically, after receivi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an advanced persistent threat detection method, a system, a computer and a storage medium. The advanced persistent threat detection method comprises the steps of: analyzing traffic of a backbone network of an operator, and restoring files transmitted in the backbone network; filtering the traffic in the backbone network so as to filter normal traffic and files; detecting the filtered files; detecting intrusion attack traffic in the backbone network; processing the detection result, and intercepting and blocking the corresponding intrusion attack traffic; performing logrecording on the detected attack; and displaying the recorded logs for evidence acquisition and tracing of subsequent advanced persistent threat attacks. According to the advanced persistent threat detection method provided by the invention, the advanced persistent threat (APT) attack can be detected in a multi-directional manner; and powerful data support and detailed traceability information areprovided for the operator for APT detection, meanwhile, network attacks can be blocked, and benefits of users are guaranteed.

Description

technical field [0001] Embodiments of the present invention relate to computer network security technology, and in particular to an advanced sustainable threat detection method, system, computer and storage medium. Background technique [0002] Advanced Persistent Threat (ATP) attacks usually infiltrate into the network and stay dormant for a long time, using the internal personnel of the organization as an attack springboard, constantly trying various attack methods, and continuously collecting various information until important intelligence is collected. The intent of an APT attack is to steal data, not to cause damage to the network. [0003] At present, the protection against APT is generally to detect traffic, behavior or files at the gateway of the LAN network egress, and generally requires the network firewall to have this related function. As the key nodes of the network, operators are completely unaware of APT attacks in the network. At the same time, if such a ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/0227H04L63/145
Inventor 王悦李伟鲁银冰蒋熠智绪龙刘乐田毅赵雪昆谢锋林胡声秋
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products