Network attack path reconstruction method based on topological information

A technology of network attack and topology information, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem that the network attack path is difficult to reconstruct, and achieve the effect of ensuring accuracy and correctness

Inactive Publication Date: 2021-07-16
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a network attack path reconstruction method b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack path reconstruction method based on topological information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objects and advantages of the present invention clearer, the present invention will be specifically described below in conjunction with examples. It should be understood that the following words are only used to describe one or several specific implementation modes of the present invention, and do not strictly limit the protection scope of the specific claims of the present invention.

[0021] The operating environment required by this embodiment is a PC with Intel-Windows architecture, several PCs that have run traceroute path measurement, and several routers that support NetFlow / NetStream. The routers are connected by network cables, etc., and run The PCs for traceroute path measurement are deployed at the edge of the network and connected to the network.

[0022] Run the PC system configuration of the network attack path reconstruction method based on topology information provided by the present invention as follows: install and run the software ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network space security, in particular to a network attack path reconstruction method based on topological information, which comprises the following steps of: firstly, obtaining a network topological structure by utilizing topological measurement probes distributed in each area of a network through a traceroute technology, then extracting router information through which an attack flow passes through through a NetFlow/NetStream technology, and finally reconstructing a network attack path according to the extracted router information, and then, according to the extracted routers and related network topology data, adopting a Dijkstra shortest path selection algorithm to gradually reconstruct an attack path of the whole attack flow. According to the method, active and passive network measurement methods are comprehensively utilized, the path information of the network attack can be accurately and completely drawn, and the correctness of a reconstruction structure is ensured.

Description

technical field [0001] The invention relates to the technical field of network space security, in particular to a network attack path reconstruction method based on topology information. Background technique [0002] With the rapid development of the Internet, more and more traditional operation methods are being replaced by low-consumption, open and efficient distributed network applications, and the network has become an indispensable part of people's daily life. However, network-based attacks have become more and more intense, network security incidents have emerged one after another, and various network attacks have brought serious harm to the country, society and individuals. Attackers take advantage of the rapid and extensive interconnectivity of the network, making traditional security measures basically useless and seriously threatening the security of the country and society. Network security threats have brought huge losses to the country and people's lives. Secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26H04L12/733H04L12/751H04L45/02H04L45/122
CPCH04L63/20H04L63/1416H04L63/0876H04L43/028H04L45/02H04L45/122H04L45/20H04L2463/146
Inventor 吴巍王占丰郭彦涛张林杰马潇霄毛传奇
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products