A method for traceability of IP address organization based on knowledge graph

A technology of IP addresses and knowledge graphs, applied in the field of network information, can solve problems such as clustering errors, reduced solution efficiency, and inaccurate clustering results, and achieve the effect of ensuring accuracy and improving accuracy

Active Publication Date: 2022-03-18
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) IP address information in cyberspace cannot be directly mapped to the organization to which it belongs;
[0007] (2) The search results are complicated and disorderly, and it is difficult to obtain optimal inference results;
[0008] (3) The clustering result is inaccurate, and there is a huge clustering error
[0009] Therefore, there is no particularly practical and effective method in the existing field of network information security, which can analyze and obtain effective security information from the network, and then use and solve practical problems; making the solutions to many problems in reality less efficient and reliable Sex can not be effectively improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for traceability of IP address organization based on knowledge graph
  • A method for traceability of IP address organization based on knowledge graph
  • A method for traceability of IP address organization based on knowledge graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] This embodiment aims at many problems of information security in cyberspace in the prior art, especially the situation where it is difficult to trace back to its affiliated organization under the current situation of isolated and scattered security information, and proposes a way of tracing the source, which can be based on the hidden information contained in the IP address. Find the available information in , and calculate and extrapolate the most likely said institution.

[0048] Specifically, such as figure 1 As shown, this embodiment discloses a method for traceability of IP address institutions based on knowledge graphs, including:

[0049] S01. Obtain domain name information: for the effective IP address of the institution to be inferred, obtain the domain name information corresponding to the IP address through DNS reverse analysis;

[0050] S02. Obtain key domain name information: truncate and screen the domain name information to obtain key information in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of information technology, and relates to a method for tracing the source of an IP address organization based on a knowledge map, which uses cyberspace to detect an IP address, further infers its organization based on the combination of search, clustering and knowledge maps, and mines the hidden information in the IP address. Deep value information. Aiming at the isolation and dispersion of security information in cyberspace, the present invention solves the dilemma of IP and domain name mapping without organizational information in cyberspace security, and eliminates the barriers between network security information such as IP, domain name and organization, based on practical applications. , to collect more and more comprehensive security information for network attack and defense, monitoring, etc. in cyberspace security; to effectively filter out the names of candidate organizations with high probability and high possibility from the messy and disordered search results, and efficiently Realize the optimal inference result of obtaining the organization to which it belongs through the IP address; ensure the accuracy of the result of inferring the organization to which it belongs from the IP address in the field of cyberspace security.

Description

technical field [0001] The invention relates to the field of network information technology, in particular to a method for traceability of an IP address organization based on a knowledge map. Background technique [0002] In today's era, the development of information technology is getting faster and faster, and the threat sources and attack methods of network security are constantly changing. It is urgent for network security personnel to improve the perception ability of network security information, perceive security information in an all-round way, and discover and master more security information in time. Seize the first opportunity in cyberspace security offensive and defensive battles, and achieve "know yourself and the enemy". [0003] At present, in the field of network security, most network security information is isolated and scattered, which makes it difficult for security personnel to effectively use security information to solve practical problems. [0004] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/36G06F16/35G06F40/295G06F16/951H04L61/4511H04L9/40
CPCG06F16/367G06F16/353G06F40/295G06F16/951H04L63/126H04L61/4511
Inventor 周玉金孙治张志勇刘方陈剑锋
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products