Plan execution method, apparatus and device, and readable storage medium

A plan and plan library technology, applied in the field of network security, can solve the problems of low plan reuse rate, time-consuming and labor-intensive plan layout, poor flexibility, etc., and achieve the effect of improving reuse rate, improving flexibility, and ensuring normal operation.

Active Publication Date: 2021-08-13
BEIJING QIANXIN TECH
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, there are technical problems such as time-consuming and labor-intensive programming of pre-arranged plans, low reuse rate and poor flexibility of pre-arranged pre-plans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plan execution method, apparatus and device, and readable storage medium
  • Plan execution method, apparatus and device, and readable storage medium
  • Plan execution method, apparatus and device, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiments of the present invention provide a method for implementing a plan, such as figure 1 As shown, the method specifically includes the following steps:

[0048] Step S101: When a network security event occurs, obtain a target plan corresponding to the network security event from a preset plan library.

[0049] In this embodiment, a plurality of preplans for dealing with different network security events will be programmed in advance, and the precompiled plans will be stored in the preplan library for later use. Among them, the contingency plan refers to the emergency response plan of the corresponding level formulated in advance when a major and above-level network security incident occurs. Contingency planning refers to arranging emergency means in a certain order and connecting all emergency means through connecting lines to form an emergency response process for responding to network security incidents.

[0050] Specifically, step S101 includes:

[0051] W...

Embodiment 2

[0106] An embodiment of the present invention provides a device for executing a plan, such as figure 2 As shown, the device specifically includes the following components:

[0107] An acquisition module 201, configured to acquire a target plan corresponding to the network security event from a preset plan library when a network security event occurs;

[0108] The parsing module 202 is used to parse out the plan nodes included in the target plan, and the node sequence between each plan node;

[0109] Execution module 203, configured to sequentially execute all child nodes in the strong process node when the executed plan node is a strong process node during the process of sequentially executing the plan node according to the order of the nodes, and when the executed plan node is a strong process node, execute When the plan node is a weak process node, all child nodes in the weak process node are executed out of sequence.

[0110] Specifically, the acquiring module 201 is use...

Embodiment 3

[0124] This embodiment also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a cabinet server (including an independent server, or A server cluster composed of multiple servers), etc. Such as image 3 As shown, the computer device 30 in this embodiment at least includes but is not limited to: a memory 301 and a processor 302 that can be communicated with each other through a system bus. It should be pointed out that, image 3 Only computer device 30 is shown having components 301-302, but it should be understood that implementing all of the illustrated components is not a requirement and that more or fewer components may instead be implemented.

[0125] In this embodiment, the memory 301 (that is, a readable storage medium) includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a plan execution method, device and equipment and a readable storage medium, and the method comprises the steps: obtaining a target plan corresponding to a network security event from a preset plan library when the network security event occurs; analyzing plan nodes contained in the target plan and a node sequence among the plan nodes; in the process of sequentially executing the plan nodes according to the node sequence, when the executed plan nodes are strong flow nodes, executing all child nodes in the strong flow nodes in sequence, and when the executed plan nodes are weak flow nodes, executing all child nodes in the weak flow nodes out of order. According to the invention, the network security event can be responded through the emergency plan including both the strong flow node and the weak flow node.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device, equipment and readable storage medium for executing a plan. Background technique [0002] In the Internet field, network systems are often threatened by network security incidents during their operation, such as network attacks, remote Trojan horses, mining viruses, etc., which affect the normal operation of the network system. In order to ensure the normal operation of the network system, it is generally necessary for network security personnel to manually arrange the plan, and analyze and respond to network security incidents through the prepared plan to restore the normal operation of the network system. However, in the prior art, there are technical problems such as time-consuming and labor-intensive programming of the contingency plan, low reuse rate and poor flexibility of the compiled contingency plan. Contents of the invention [0003] The pu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 常月
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products