Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack tracing system and method based on graph database and equipment

A network attack and database technology, which is applied in the field of network attack traceability system based on graph database, can solve data leakage, network security companies cannot expand classification services, cannot detect and block attacks, etc., and achieve the effect of short response time

Pending Publication Date: 2021-12-28
ZHEJIANG CHUANGLIN TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1) Data breach
[0009] Malware may be the main problem facing businesses before 2019, but after 2020, phishing attacks will be the biggest threat
Legacy graphs that cannot perform deep link analysis (i.e. the ability to traverse more than 5 entries) in real-time will also fail to detect and prevent attacks
[0013] At the same time, the cybersecurity firm was unable to scale its classification services with existing SQL server-based solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack tracing system and method based on graph database and equipment
  • Network attack tracing system and method based on graph database and equipment
  • Network attack tracing system and method based on graph database and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and therefore are only examples, rather than limiting the protection scope of the present invention.

[0052] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0053] It should also be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack traceability system and method based on a graph database and equipment, and the system comprises a graph database module which stores a sample data set comprising entity information, attribute information corresponding to the entity information and a relationship between the entity information, an attack detection module used for acquiring alarm information, and a traceability analysis module used for tracing the network attack according to the alarm information in combination with the sample data set. According to the method, the hidden relation between the data is found by utilizing the graph database, the risk IP can be found more quickly, early warning is made in advance, and the possible loss is reduced to the minimum.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network attack source tracing system, method and device based on a graph database. Background technique [0002] Without network security, there will be no national security, no economic and social stability, and it will be difficult to protect the interests of the general public; it is necessary to strengthen the protection of information infrastructure network security, strengthen the construction of network security information coordination mechanisms, means, and platforms, and strengthen emergency command of network security incidents Capacity building, actively develop the network security industry, move the gate forward, and prevent problems before they happen. [0003] Cyberspace consists of the Internet, communication networks, computer systems, automation control systems, digital devices, and the applications, services, and data they carry. Network security r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F16/901
CPCH04L63/1416H04L63/1425H04L63/1441G06F16/9024H04L2463/146
Inventor 张晨
Owner ZHEJIANG CHUANGLIN TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More