Unlock instant, AI-driven research and patent intelligence for your innovation.

Privileged account threat alarm method based on behaviors

An account and privilege technology, applied in the field of privileged account threat detection and analysis, can solve the problems of high false positive rate, overwhelmed, and complex data sources in the security protection center, achieving the effect of low false positive rate and simple deployment and configuration.

Pending Publication Date: 2020-10-16
广州海颐信息安全技术有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. There are a lot of alarm information provided by various security devices and security analysis software and hardware, and the false alarm rate is high. Wrong alarms will consume a lot of energy of security operation and maintenance personnel
[0004] 2. Gateway-type blocking devices and terminal anti-virus software mainly rely on the existing security signature database to identify attack events, but cannot identify payload bypassing or encryption-type and zero-day vulnerability-type attack events, resulting in attacks that have achieved their goals but not yet be found
[0005] 3. The data sources of the self-owned security protection center are complex, and data collection may be limited by the difficulties in deployment and analysis caused by huge data volume, data encryption, incomplete system interfaces, and too many types of data that cannot be processed.
[0006] 4. The daily attention and protection of the entire attack process makes the security protection work lose focus and struggle to cope

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privileged account threat alarm method based on behaviors
  • Privileged account threat alarm method based on behaviors
  • Privileged account threat alarm method based on behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] In the embodiment of the behavior-based privileged account threat warning method of the present invention, the structural diagram of the behavior-based privileged account threat warning method is as follows figure 1 shown. At the beginning of the whole process, it is necessary to set the system log in the operating system of each terminal to enable auditing, and send out to the privileged account threat alarm system log data processing interface, includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privileged account threat alarm method based on behaviors. The method comprises the following steps: managing a terminal IP address and a port for sending log data to a privileged account threat detection system, periodically detecting whether the communication is normal or not, counting and counting the normal communication ratio of the terminals and the privileged account threat alarm system according to IP addresses, and counting the uploaded data volume of each terminal and the overall received data volume of the privileged account threat alarm system in real time; processing the received terminal log data; generating a threat alarm strategy; and outputting the alarm terminal information, the alarm content and the threat condition of the privileged account asa report, associating a built-in mail gateway and a short message gateway, and sending summary alarm information to a related person in charge in time. According to the method, the false alarm rate isextremely low, deployment and configuration are simple, the alarm strategy is generated by subdividing the change condition of the privileged account in various attack behaviors, and the situation that the real attack behavior cannot be early warned due to insufficient identification of files such as attack messages and virus Trojans is avoided.

Description

technical field [0001] The invention relates to the field of threat detection and analysis of privileged accounts, in particular to a behavior-based threat warning method for privileged accounts. Background technique [0002] In various attack events of information security, the intruder's attack process is basically consistent with the famous "Lockheed-Martin kill chain" process. The attack process can be summarized as follows: reconnaissance and detection, weapon construction, payload delivery, Exploitation, implantation, command and control, and ultimately the goal. The current network security protection measures are basically deployed and implemented around each link of the kill chain, hoping to detect or prevent such attacks in advance. After a relatively complete set of security solutions and security devices are deployed, most security attacks can be blocked, but at the same time it brings new problems. [0003] 1. All kinds of security equipment and security analy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L63/20H04L41/142
Inventor 张子通潘明政
Owner 广州海颐信息安全技术有限公司