APT attack detection method and device

A technology of attack detection and detection method, applied in the field of information security, can solve problems such as inability to detect, achieve the effect of improving the level, shortening the time of protection, and reducing manual investment

Active Publication Date: 2021-09-07
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because APT attacks often have clear attack intentions, and their attack methods are extremely conce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APT attack detection method and device
  • APT attack detection method and device
  • APT attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the scope of protection of this application.

[0072] It should be noted that the APT attack detection method and device disclosed in this application can be used in the field of information security technology, and can also be used in any field other than the information security technology field. The application of the APT attack detection method and device disclosed in this application The field is n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An APT attack detection method and device provided by the invention can be used in the technical field of information security or other fields, and the method comprises the following steps: according to a segment and a reserved time length corresponding to each segment, a knowledge graph comprises an association relationship between an observable entity and an interested entity, and the observable entity corresponds to a low-order scene; an interested entity corresponds to a high-order entity, and then a context awareness computing technology is introduced into the security detection device, so that the detection device can sense the security condition of POS equipment based on a Windows system, performs real-time analysis on an abnormal event of an unknown APT attack, performs timely identification and detection before a large-scale attack event occurs, and shortens the protection time, and the level of a safety protection system can be greatly improved while the labor investment is reduced.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method and device for detecting an APT attack. Background technique [0002] Advanced Persistent Threat (Advanced Persistent Threat, APT) refers to a persistent attack that is usually carefully planned by hackers to target a specific attack target and maintain high concealment for a long time. Because APT attacks often have clear attack intentions, and their attack methods are extremely concealed and latent, traditional network detection methods are usually unable to effectively detect them. [0003] With the rapid development of mobile payment technology, Point-of-Sales (POS) devices are an indispensable part of modern life. As the front end of the financial payment system, POS devices can be used to read credit card and debit card holders. The bank communicates with the bank's personal account information management system through the POS device, proce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L63/1416H04L63/1433H04L63/02H04L67/34H04L41/145
Inventor 孙杰苏建明张玲戴心齐
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products