Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack link visualization system, method and server

A network attack and server technology, applied in the transmission system, electrical components, etc., can solve the problem of not dynamically displaying the attack link of the enterprise topology area and the risk of being attacked, and achieve the effect of improving efficiency

Active Publication Date: 2021-01-08
COSCO SHIPPING TECH CO LTD +1
View PDF20 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional supply chain visualization mainly depicts the attack route in the form of a static picture based on the enterprise network topology and displays the effect of the breathing light to prompt the enterprise customer server to be attacked, but this traditional mode also brings some restrictions to the enterprise. It does not dynamically display the attack link and the risk of being attacked in the topological area of ​​the enterprise, which brings certain challenges to the analysis and judgment of the enterprise and the product empowerment of security vendors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack link visualization system, method and server
  • Network attack link visualization system, method and server
  • Network attack link visualization system, method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Terms involved in the present invention include,

[0014] Stream processing: In scenarios with high real-time requirements, continuous processing, aggregation, and analysis of unbounded data are performed.

[0015] Enrichment: Serialize multi-source heterogeneous data according to different rules.

[0016] WAN area: A network area that provides internal leased line access.

[0017] Server area: A network area that provides access to internal application servers.

[0018] DMZ zone: The network area that provides Internet application server access.

[0019] Independent server area: a network area that provides independent application servers.

[0020] NGSOC security operation platform: Qi Anxin Wangshen security analysis and management system

[0021] IDS Platform: Intrusion Detection System

[0022] IPS Platform: Intrusion Prevention System

[0023] collector module: data acquisition module

[0024] Kafka: Distributed Messaging System

[0025] According to one or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network attack link visualization system comprises a service acquisition module used for acquiring data used for drawing network topology from each regional server in a network in real time; a threat event acquisition module which is used for acquiring and summarizing threat events of each area of the network from the network security monitoring platform; and a visual service module which is used for aggregating the network topology data obtained from the service acquisition module and the threat event obtained from the threat event acquisition module, and drawing a network attack link and athreat event risk condition dynamic change graph.

Description

technical field [0001] The invention relates to the field of network security data visualization, dynamically draws network attack links based on enterprise network topology and threat event risks, and clearly displays the attack links and the degree of harm. Background technique [0002] With the advent of the era of big data, more and more attention has been paid to network information security, but the possibility of network attacks and information leakage is still unavoidable. Security vendors have proposed a solution to visualize the supply link for the attack link of a network attack. The traditional supply chain visualization mainly depicts the attack route in the form of a static picture based on the enterprise network topology and displays the effect of the breathing light to prompt the enterprise customer server to be attacked, but this traditional mode also brings some restrictions to the enterprise. It does not dynamically display the attack links in the enterpr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 王轶琳郭磊王学志
Owner COSCO SHIPPING TECH CO LTD