Network threat collaborative defense system and method based on information sharing

A collaborative defense and intelligence technology, applied in the field of network security, can solve problems affecting the reputation of institutions, distrust of security institutions, and ignoring threat intelligence sharing privacy issues, etc., to reduce communication overhead, improve training efficiency, and improve network defense performance Effect

Active Publication Date: 2021-01-12
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at this stage, the sharing of network threat intelligence still faces the following challenges: (1) security agencies do not trust each other and are unwilling to share data; (2) due to privacy protection or commercial competition considerations, some agencies are unwilling to share the network with others Threat intelligence; (3) Threat intelligence may expose the information of the organization and affect the reputation of the organization
[0003] At present, relevant research has proposed a privacy protection framework for cyber threat intelligence sharing, using group signatures to hide the identity of each organization, but this scheme cannot protect the data of the organization; there are also models of privacy issues in cyber threat intelligence sharing as participants and A game between attackers, but it can only reason about a sharing strategy, but it cannot provide a practical solution to protect shared network threat intelligence; or raise many alarms by discussing alarm correlation in a cooperative intrusion detection system associated application methods, but does not consider privacy concerns in threat intelligence sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat collaborative defense system and method based on information sharing
  • Network threat collaborative defense system and method based on information sharing
  • Network threat collaborative defense system and method based on information sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0027] The current network threat intelligence sharing lacks a general technical system, and it is difficult to provide a practical data sharing platform for distributed security agencies; and there is too much communication overhead when jointly building an intrusion detection model, resulting in a high cost of collaborative defense ; The privacy and security of threat intelligence sharing is not enough, and the opponent can still steal the sensitive data information of the organization through privacy attacks such as model extraction and model reverse. For this reason, embodiment of the present invention, see figure 1 As shown, a network threat collaborative defense system based on intelligence sharing is provided, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and particularly relates to a network threat cooperative defense system and method based on information sharing. The method comprisesthe steps: deploying a central server and a plurality of safety mechanisms which train an intrusion detection model based on respective local threat information databases; after the model updating parameters are encrypted, uploading the ciphertext to a central server; and employing the central server for aggregating the received ciphertext to obtain global model updating parameters through decryption and broadcasting the global model updating parameters to all security mechanisms so as to update the local intrusion detection model of each security mechanism. Based on the federated learning framework, multiple security mechanisms can be helped to jointly establish a system defense model, the method can be suitable for multiple machine learning models, multiple collusion attack scenes can beresisted, the applicability is high, and the anti-attack performance of the network is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network threat cooperative defense system and method based on intelligence sharing. Background technique [0002] Various attacks in the current network emerge in an endless stream, posing a major threat to important infrastructure in the network. With the development of machine learning, researchers began to realize that there is a large amount of data containing intrusion or attack information in the network infrastructure. Using these data to train the network active defense system based on machine learning can effectively detect possible abnormal behaviors . However, due to the ever-increasing cybercrime rate and increasingly complex cyber threat scenarios, it is difficult for organizations to build a sufficiently accurate intrusion detection model to defend against cyber attacks based on their own data alone. More and more organizations and enterpris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCH04L9/008H04L9/0861H04L9/088H04L63/16
Inventor 郭渊博方晨琚安康李涛
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products