A network attack path tracing method and device
A network attack and path tracing technology, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve the problem that static blacklist strategies cannot be flexibly expanded, and achieve the goal of reducing cost of ownership, improving labeling capabilities, and improving network security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] In order to achieve the purpose in the background technology, the present invention provides a network attack path tracking method, the system flow chart and the system framework schematic diagram are as follows figure 1 with figure 2 As shown, the method includes the following steps:
[0077] Step 1), threat events, host process communication data acquisition, use network traffic analysis sensors to analyze real-time network traffic, and obtain a collection of threat events containing various types of network traffic; use host behavior capture sensors to analyze host process behavior, and obtain white list processes The set of process communication data;
[0078] Step 2), data preprocessing, cleans, filters, and enriches network traffic threat events and host process communication behavior data to obtain data sets related to threat alarms;
[0079] Step 3), attack knowledge graph construction, propose AttackGraph algorithm to construct network attack knowledge graph...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


