Cross-terminal traceability analysis method, device and system and storage medium

A cross-terminal and terminal technology, applied in the field of information security, can solve the problems of high implementation cost and low processing efficiency of traceability work, and achieve the effect of shortening the time for response and handling of security incidents, and improving the degree of automation and efficiency.

Active Publication Date: 2021-06-29
SANGFOR TECH INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of cross-terminal traceability requires manual intervention, which is costly to implement, and relies on manual analysis to make the processing efficiency of the entire traceability work low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-terminal traceability analysis method, device and system and storage medium
  • Cross-terminal traceability analysis method, device and system and storage medium
  • Cross-terminal traceability analysis method, device and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0062] In order to enable those skilled in the art to better understand the solution of the present application, the present application will be further described in detail below in conjunction with the drawings and specific implementation methods.

[0063] Network security is an important condition for the normal operation and maintenance of information systems. In the traditional way, malicious files or malicious behaviors appearing on the terminal are detected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a cross-terminal traceability analysis method, device and system and a storage medium. The method comprises the steps: carrying out the matching of obtained traceability information with the safety data of each terminal, so as to obtain a matched terminal and matched data information; and recognizing the data information corresponding to each matched terminal by using a set role analysis rule so as to determine the role of each matched terminal. In the embodiment of the invention, association behaviors exist among different roles, the association behaviors among the roles can be set in the form of role association rules, and a traceability analysis result is determined according to the roles of the matched terminals and the set role association rules.2 By recognizing the roles of the terminals According to the role association rules, cross-terminal automatic traceability can be realized, the automation degree and efficiency of traceability analysis are greatly improved, and the time for responding to and disposing safety events is shortened.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method, device, system and computer-readable storage medium for cross-terminal traceability analysis. Background technique [0002] Information security incidents refer to network security incidents that cause harm to information systems due to human factors, software and hardware defects or failures, natural disasters and other factors, and have negative impacts on society. When an information security incident occurs, people often need to conduct a traceability analysis on it. On the basis of the traceability analysis, it is possible to carry out targeted security rectification and reinforcement of the information system to avoid the same or similar information security incidents from happening again. [0003] Modern information security incidents often occur on multiple terminals. The most typical intrusion scenario is that after an attacker captures a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/126H04L63/1416
Inventor 顾立明
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products