Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability defense method and system

A vulnerability and business module technology, applied in the defense method and system field of vulnerabilities, can solve the problems of not being able to quickly respond to the Internet environment and poor real-time performance, and achieve the effect of improving defense efficiency, improving the overall security level, and reducing security risks

Pending Publication Date: 2021-06-29
BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current defense method for network information security in enterprises is to use security defense software to defend network information. However, this kind of security defense is more dependent on software version updates. For the defense of new vulnerabilities and attacks, a new version must be installed. It can only be done on the basis of software, the real-time performance is poor, and it cannot quickly respond to the complex and changeable Internet environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability defense method and system
  • Vulnerability defense method and system
  • Vulnerability defense method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] In this application, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes none. other elements specifically listed, or also include elements inherent in such a process, method, article, or apparatus. Without further limitations, an element defined by the phrase "com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability defense method and system, and the method comprises the steps: carrying out the independent flow monitoring and business volume monitoring of each pre-divided business module based on a pre-constructed neural network model, predicting the future business volume of each business module, and obtaining the predicted business volume corresponding to each business module; when monitoring that the traffic of any business module is abnormal and / or the business volume is higher or lower than the predicted business volume, detecting whether the business module is attacked; and if the attack is detected, determining an attack type, and executing a defense strategy and a counterattack strategy according to the attack type. According to the scheme, the business modules are divided, the neural network model obtained through pre-training is used for carrying out independent flow monitoring and business volume monitoring on each business module, when any business module is attacked, attacks are defended in time, so that the security risk is reduced, and the attacks are defended in a targeted mode according to the attack types. The defense efficiency is improved, and the overall safety level is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a vulnerability defense method and system. Background technique [0002] With the rapid development of the Internet, the network information security of enterprises is very important. [0003] The current defense method for network information security in enterprises is to use security defense software to defend network information. However, this kind of security defense is more dependent on software version updates. For the defense of new vulnerabilities and attacks, a new version must be installed. It can only be done on the basis of software, the real-time performance is poor, and it cannot quickly respond to the complex and changeable Internet environment. Contents of the invention [0004] In view of this, the embodiments of the present invention provide a vulnerability defense method and system to achieve the purpose of improving defense flexibility, reducing se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/55G06F21/56
CPCG06F21/577G06F21/552G06F21/566
Inventor 申亚坤谭莹坤陶威刘烨敏周慧婷
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products