Credible threat intelligence identification method and device based on blockchain consensus mechanism

An identification method and identification device technology, applied to electrical components, transmission systems, etc., can solve problems such as insufficient identification accuracy

Active Publication Date: 2020-12-04
ARMY ENG UNIV OF PLA
View PDF13 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, provide a trusted threat intelligence identification method and device based on the blockchain consensus mechanism, and solve the technical problem of insufficient identification accuracy in the existing intelligence identification technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible threat intelligence identification method and device based on blockchain consensus mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0066] Correspondingly, the present invention also provides a trusted threat intelligence identification device based on a blockchain consensus mechanism, including an intelligence data acquisition module, an analysis mode determination module, an analysis result acquisition module, a smart contract execution module, and an intelligence identification module, wherein :

[0067] The intelligence data acquisition module is used to incorporate each node of the intelligence data source into the blockchain to form an intelligence data blockchain, and monitor each node of the blockchain to obtain intelligence data;

[0068] an analysis mode determination module, configured to determine a data analysis mode of the intelligence data;

[0069] The analysis result acquisition module is used to match the corresponding analysis strategy according to the data analysis mode of the intelligence data, and then obtain the corresponding analysis result;

[0070] The smart contract execution mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible threat intelligence identification method and device based on a blockchain consensus mechanism. The method comprises the following steps: bringing each node of an intelligence data source into a blockchain to form an intelligence data blockchain, and monitoring each node of the blockchain to obtain intelligence data; matching a corresponding analysis strategy according to a data analysis mode of the information data to obtain a corresponding analysis result; using an intelligent contract to execute processing of an analysis result of the information data andbroadcasting the analysis result to nodes of the whole network through a blockchain network, and generating a piece of unique queried data of the whole network after the whole network reaches a consensus; and endowing a reputation value by adopting the consensus mechanism, and judging whether the information is credible or threatening information according to the reputation value. In the invention, an intelligent contract and strategy directional analysis are combined, the collected block chain data are integrated and analyzed, an threat intelligence event on the block chain is ensured to be discovered at the first time, and meanwhile an advantage of accuracy of a data analysis result is possessed.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a trusted threat intelligence identification method and device based on a block chain consensus mechanism. Background technique [0002] In recent years, APT (Advanced Persistent Threat Attack) incidents have emerged continuously, and its notable feature is persistence, which usually lasts for several years. Elevate privileges in the network and collect various information until important intelligence is obtained. [0003] As an evidence-based identification and analysis method, network threat intelligence analysis can describe existing or upcoming threats or dangers to assets, notify subjects to take certain responses to related threats or dangers, and actively obtain information about future security threats. information, predict security incidents, and prevent the occurrence of APT attacks from the source. Threat intelligence generally includes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L67/1095Y02D10/00
Inventor 陈涵王真王睿赵洪华朱卫星付印金
Owner ARMY ENG UNIV OF PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products