Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability attack detection system and method based on mimicry defense mechanism, and medium

An attack detection and defense mechanism technology, applied in transmission systems, computer security devices, instruments, etc., can solve problems such as difficult to know vulnerability attacks

Active Publication Date: 2020-11-24
EAST CHINA INST OF COMPUTING TECH
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can effectively protect the system from attacks to a certain extent, it is often in a passive position, and it is difficult to obtain some information about vulnerability attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability attack detection system and method based on mimicry defense mechanism, and medium
  • Vulnerability attack detection system and method based on mimicry defense mechanism, and medium
  • Vulnerability attack detection system and method based on mimicry defense mechanism, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054]The present invention is based on the mimetic DHR architecture, aiming at SQL injection, XSS (Cross-Site Script) cross-site scripting attack, CSRF (Cross-Site Request Forgery ) Cross-site request forgery and other attack behaviors have active detection capabilities, using tools such as NESSUS, awvs, OpenVAS, NetSparker, OWASP ZAP, Burpsuit, and MapReduce to build an active vulnerability attack detection system.

[0055] see figure 1 According to a vulnerability attack detection system based on a mimic defense mechanism provided by the present invention, it includes an attack detection module, a mimic defense module, and a vulnerability determination module;

[0056] The attack detection module is used to receive the data sent by the external device, temporarily store and transfer the external data, forward the data to the mimic defense module, and judge whether it is attacked according to the signal returned by the mimic defense module. The judgment module sends a signa...

Embodiment 2

[0069] The vulnerability attack detection system based on the mimic defense mechanism provided by the present invention includes:

[0070] Attack detection module: Receive the data sent by the external device, temporarily store and transfer the external data, forward the received external data to the mimic defense module, and judge whether it is attacked according to the signal returned by the mimic defense module. The vulnerability determination module sends a signal;

[0071] Mimic defense module: According to the mimic defense mechanism, it performs input agent distribution, redundant heterogeneous judgment and external response output for the received external data, and returns the judgment result to the attack detection module;

[0072] Vulnerability determination module: extract information from detected attack behaviors, obtain attack source characteristic information, trace attack source, establish vulnerability detection information database, match attack source chara...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability attack detection system and method based on a mimicry defense mechanism, and a medium, and the system comprises an attack detection module which receives data transmitted by external equipment, carries out the temporary storage and transfer of the external data, and forwards the received external data to a mimicry defense module; a mimicry defense module which is used for carrying out input proxy distribution, redundant heterogeneous judgment and external response output on the received external data according to a mimicry defense mechanism, and returninga judgment result to the attack detection module; and a vulnerability judgment module which is used for carrying out information extraction on the detected attack behaviors, obtaining attack source feature information, carrying out attack tracing, establishing a vulnerability detection information base, matching the attack source feature information and carrying out real-time monitoring on inputdata. According to the method, related measures can be taken for maintaining the stability and the safety of the system more efficiently in real time, and a detailed detection report is automaticallygenerated, so that the evaluation requirement of an efficient and stable vulnerability attack detection method is met.

Description

technical field [0001] The present invention relates to the technical field of network space security, in particular to a vulnerability attack detection system, method and medium based on a mimic defense mechanism. Background technique [0002] While the rapid development of cyberspace technology has brought fast, efficient and convenient aspects of modern society, it is also accompanied by huge security risks, such as privacy leaks, data tampering, data theft, and so on. In the case of high reliance on Internet information technology, the traditional network security defense model has gradually been unable to adapt to the ever-changing vulnerability attack methods of hackers. Therefore, how to turn passive defense into active attack has become a major technical problem to be solved urgently in this field. [0003] Usually, technicians fix the vulnerabilities by installing corresponding patch packages for the vulnerabilities, so as to prevent hackers from exploiting the unr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1433
Inventor 李建军汪杨臧敬艺吴振宇夏梦李洪梅朱杰石安婷刘姣王伟佳
Owner EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products