Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for visualizing attack and defense strategies

A strategy and network attack technology, applied in the field of network security, which can solve the problems of difficulty in updating and defining attack types and ineffective deployment of defense strategies.

Active Publication Date: 2021-11-26
武汉思普崚技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method and system for visualizing attack defense strategies to solve the problems that existing attack types are difficult to update and define, and defense strategies cannot be effectively deployed. The class identifier extracts the classified feature vector to obtain a multi-dimensional set, and sends the multi-dimensional set to the machine learning model for attack detection. The detected class of attack marks is used as the type of attack, and targeted source tracing is carried out to conduct morphological analysis on the attack coverage. Predict historical attack data, and administrators can deploy defense strategies based on options and probabilities on the interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for visualizing attack and defense strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0032] figure 1 A general flow chart of the attack defense strategy visualization method provided by this application, the method includes:

[0033] Obtain the data packets in the data stream, classify the data packets based on the transmission protocol, port, and application feature code, and put the classified data packets into a designated buffer queue;

[0034] Configure corresponding policy graphical interface systems for different types of data packets, use WYSIWYG policy management, select operations on the interface system, and continuously merge and organize the different types of data packets according to user identification information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for visualizing attack and defense strategies, which solves the problems that existing attack types are difficult to update and define, and defense strategies cannot be effectively deployed. Classified feature vectors are obtained to obtain multi-dimensional sets, and machine learning models are used to detect attacks, and a class of detected attacks is identified as the type of attack, targeted source tracing is carried out, attack coverage is morphologically analyzed, and historical attack data is matched for prediction. The historical attack data predicts the strategic options and probabilities of the offensive and defensive sides, and administrators can deploy defensive strategies on the interface.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and system for visualizing attack defense strategies. Background technique [0002] With the rapid development of network technology, it is becoming more and more difficult to define the type of attack, and it is difficult to use the corresponding effective defense strategy without knowing the type of attack. Therefore, knowing the type of attack is the first step in attack detection. This application creatively uses a method of defining broad types of attacks. [0003] In the past, the deployment of defense strategies was either man-made or system background deployment, which lacked the cooperation of man and machine, and lacked the support of historical data. Only when the deployment strategy failed, would the deployment be known to be insufficient, which is very unfavorable for enterprise use. [0004] Therefore, there is an urgent need for a metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06N20/00
CPCG06N20/00H04L63/1416H04L63/1441H04L63/20
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products