Attack detection method and device, electronic equipment and storage medium

An attack detection and sample technology, applied in the computer field, can solve the problem of inaccurate and reliable attack identification results, and achieve the effect of accurate and reliable attack detection.

Pending Publication Date: 2021-04-09
INST OF INFORMATION ENG CAS
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides an attack detection method, device, electronic equipment and storage medium, which are used to solve the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device, electronic equipment and storage medium
  • Attack detection method and device, electronic equipment and storage medium
  • Attack detection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] Modern computer systems are being attacked by various attack programs and are at great risk.

[0044] Take the transient attack as an example, the attacker of the transient attack usually uses the security loopholes generated by the processor microarchitecture hardware design flaws, such as fuse and ghost, etc., to steal any location in the shared memory with a legal identity and minim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack detection method and apparatus, electronic equipment and a storage medium. The method comprises the steps of obtaining target instruction tracking information when a target program runs; determining a target entity relation graph between target instruction execution entities based on the target instruction tracking information; and based on a graph neural network model and the target entity relationship graph, detecting that the target program is an attack program. The defect of poor quality of attack detection training samples in the prior art is overcome by acquiring the target instruction tracking information when the target program runs, the entity relationship graph between the target instruction execution entities is determined on the basis of the target instruction tracking information, and then the target program is detected through the graph neural network model. The method can be used for automatic feature representation learning and topological mode learning, the defects that an existing attack detection method excessively depends on manual feature extraction and cannot capture a graph topological relation mode of a non-Euclidean space are overcome, and attacks are accurately and reliably detected.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an attack detection method, device, electronic equipment and storage medium. Background technique [0002] Modern computer systems are being attacked by various attack programs and are at great risk, so it is particularly important to be able to detect attacks as accurately as possible. [0003] The current attack detection methods are only designed to capture the relational patterns of Euclidean space, and cannot adapt to the complex semantic patterns of computer programs. This method first converts the behavior of a series of events into sequences in Euclidean space, which constitute the temporal relationship between events, and then uses sequence analysis techniques to learn sequence patterns from historical events and predict the next event, if the actual If there is a large deviation between the occurred event and the predicted event, it is considered as a suspici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06F11/30G06N3/08G06N20/00
CPCG06F21/566G06F21/577G06F11/302G06F11/3051G06N3/08G06N20/00
Inventor 孟丹郑阳文雨张博洋张东雪杨纯杜莹莹
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products