Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal behavior alarm traceability analysis method, device, equipment and medium

A behavioral and terminal technology, applied in the field of communications, can solve the problems of re-traceability, secondary complete traceability, excessive security alarm security event handling, risk alarm audit fatigue, etc., so as to improve the detection rate, reduce the false alarm rate, and improve the correlation of events. and the effect of accuracy

Pending Publication Date: 2021-11-19
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the actual application scenarios of terminal security products, a large number of various high, medium and low risk alarms will be generated. When security workers need to make decisions on these single alarms, they may not be 100% sure whether the risk alarms are normal behaviors or real. Attack and penetration behavior requires in-depth investigation and research in conjunction with other products or artificial terminals, or a large number of alarms encountered are false positives. Excessive security alarms or false positives bring risks to security incident handling Alarm audit fatigue
[0003] At present, current technologies use malicious file rule features or Indicator Of Compromise (IOC) for real-time traceability. The traceability data is reported as a single alarm. Re-trace or conduct a second full trace of a certain alarm or risk point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal behavior alarm traceability analysis method, device, equipment and medium
  • Terminal behavior alarm traceability analysis method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] The present invention provides a method for source analysis of terminal behavior alarms, such as figure 1 shown, including the following steps:

[0041] S101. Monitor terminal behavior data, read and analyze the terminal behavior data in real time, obtain behavior logs and store them in a local database;

[0042] It should be noted that the above-mentioned local database has a full-volume log storage function, and the present invention can dynamically ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal behavior alarm traceability analysis method, device and equipment and a medium, and the method comprises the steps: monitoring terminal behavior data, carrying out the real-time reading and analysis of the terminal behavior data, obtaining a behavior log, and storing the behavior log in a local database; taking predefined behavior characteristics as preset alarm rules to carry out matching collision with the behavior log to obtain a collision record result; performing automatic context traceability according to the alarm point of the collision record result to form a traceability chain, and automatically submitting the traceability chain to a data platform; and performing risk grade evaluation on the traceability chain through the data platform. Therefore, the data of the traceability chain is analyzed and processed, the risk level of the data is evaluated, powerful data support and judgment basis are provided for alarm behaviors, the event relevance and accuracy of risk alarm can be improved, behavior log records of the risk alarm events are obtained, the tedious processes of manual retrieval analysis, manual study and judgment and manual traceability are reduced, the detection rate is improved, and the false alarm rate is reduced.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a method, device, equipment and medium for source traceability and analysis of terminal behavior alarms. Background technique [0002] In the actual application scenarios of terminal security products, a large number of various high, medium and low risk alarms will be generated. When security workers need to make decisions on these single alarms, they may not be 100% sure whether the risk alarms are normal behaviors or real. Attack penetration behavior requires in-depth investigation and research with other products or artificial terminals, or a large number of alarms encountered are false positives. Excessive security alarms or false positives will bring risk alarm audit fatigue to security incident handling. [0003] At present, current technologies use malicious file rule features or Indicator Of Compromise (IOC) for real-time traceability. The traceability da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F11/30G06F16/24
CPCG06F21/577G06F11/3065G06F16/24G06F2221/034
Inventor 刘华范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD