Clue analysis and verification system and device for network security and storage medium

A network security and clue technology, applied in the field of network security, can solve problems such as lack of Internet data analysis tools

Pending Publication Date: 2021-07-06
STATE GRID HUBEI ELECTRIC POWER COMPANY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In response to these network security incidents, after the law enforcement agencies obtain relevant attack clues such as C2 domain names, IPs, samples, etc., they need to carry out clue research and judgment, expand, trace the source of the attack, locate criminals, etc., but face long-term challenges in the work process Lack of Internet data analysis tools, background research and judgment of new clues through correlation analysis, global expansion of clues in time and space dimensions, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clue analysis and verification system and device for network security and storage medium
  • Clue analysis and verification system and device for network security and storage medium
  • Clue analysis and verification system and device for network security and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. In addition, the technical features in each embodiment or a single embodiment provided by the present invention can be combined arbitrarily with each other to form a feasible technical solution, but it must be based on the realization of those skilled in the art. When there is a contradiction or cannot be realized, it should be considered that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a clue analysis and verification system and equipment for network security. The system comprises a clue studying and judging module which is used for displaying the state of a clue; a clue expansion module which is used for providing clues capable of being deeply excavated; a network attack target positioning module which is used for positioning an attacked target, evaluating the risk degree of the target and screening out the target of which the risk degree exceeds a preset threshold value; a clue positioning module which is used for positioning an IP address of a network attacker; and a collaborative sharing module which is used for sharing the analysis result to all members of the analysis working group. According to the clue analysis and verification system and equipment for network security provided by the embodiment of the invention, efficient big data processing can be realized, visual analysis interaction can be performed, an efficient clue analysis tool can be established according to rich clue data resources, and an analysis result can be visually displayed.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a clue analysis and verification system, equipment and storage medium for network security. Background technique [0002] At present, APT attacks with national and organizational backgrounds are increasing. Since 2014, there have been many APT incidents in China, which have been confirmed as targeted attacks targeting technology, education, energy and transportation, affecting nearly 30 provinces and cities across the country. ; More than 10 types of anti-virus Trojan horses were found, involving Windows, Mac OS and Android platforms. In response to these network security incidents, after the law enforcement agencies obtain relevant attack clues such as C2 domain names, IPs, samples, etc., they need to carry out clue research and judgment, expand, trace the source of the attack, locate criminals, etc., but face long-term challenges in the wo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1408H04L63/1433H04L63/302
Inventor 黄杰李晶刘昕袁慧张先飞田里朱国威
Owner STATE GRID HUBEI ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products