Threat-driven network attack detection and response method

A network attack and intelligence technology, applied in the field of information security, can solve the problems of lack of diversity and single processing space

Pending Publication Date: 2020-12-04
BEIJING INST OF COMP TECH & APPL
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What is more serious is that the cyberspace information system architecture and defense system are essentially "static, similar, and deterministic", with transparent architecture, single processing space, and lack of diversity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat-driven network attack detection and response method
  • Threat-driven network attack detection and response method
  • Threat-driven network attack detection and response method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0048] The attacking and defending parties have been in a dynamic game under the condition of information asymmetry for a long time, and the defender knows far less about the attacker than the attacker knows about the defender. Traditional attack detection methods not only cannot meet the current security detection requirements, but also do not analyze the attacker's relevant information deeply enough. Therefore, on the basis of the research and analysis of the general network attack process, the present invention designs a threat-based attack detection and response method based on the attacker's attack idea and process, mainly including threat response based on the attack life cycle and ontology communication-based Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a threat-driven network attack detection and response method, and belongs to the technical field of information security. Aiming at the defects of a traditional static defensetechnology system and an emergency threat response protection mechanism, the invention designs a threat-driven security response method according to a PPDR model starting from the attack thought andprocess of an attacker on the basis of research and analysis of a universal network attack process. The invention designs a threat-based attack detection and response method, so as to establish a threat dynamic response system which is linked internally and externally, is mainly used for prevention and has overall threat perception and rapid response processing capabilities in the near future.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a threat-driven network attack detection and response method. Background technique [0002] As an important symbol of the information age, the network, with its "borderless" and "super-territorial" virtual existence, has fully penetrated into all aspects and fields of the real world, and has increasingly become the basic platform for political, economic, cultural and social activities. and the nervous system upon which society as a whole depends. With the development of new technologies and applications such as cloud computing, big data, artificial intelligence, mobile Internet, Internet of Things, and social networks, new problems and new challenges to network security are increasing, and the situation is extremely severe, especially the "Stuxnet", "Flame The emergence of weapon-grade viruses such as "Prism" and the exposure of network monitoring progra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1408H04L63/1416H04L63/1425H04L63/1441H04L63/1491G06F18/23
Inventor 赵磊常承伟王芳鸣
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products