Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic network defense method and device and computer readable storage medium

An automated network and network-side technology, applied in the field of network security, can solve problems such as inability to achieve rapid response to attack behaviors and defense lag

Pending Publication Date: 2022-03-08
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It alleviates the problem that the existing technology cannot realize the rapid response to the attack behavior, and the defense always lags behind the network attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic network defense method and device and computer readable storage medium
  • Automatic network defense method and device and computer readable storage medium
  • Automatic network defense method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following detailed description of the exemplary embodiments refers to the accompanying drawings. The same reference numbers in different drawings identify the same or similar elements. Furthermore, the drawings are not necessarily drawn to scale. Also, the following detailed description does not limit the invention. Rather, the scope of the invention is defined by the appended claims.

[0017] Reference throughout this specification to "one embodiment" or "an embodiment" or "some embodiments" means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment of the disclosed subject matter. Thus, appearances of the phrase "in one embodiment" or "in an embodiment" or "in some embodiments" in various places throughout the specification are not necessarily referring to the same embodiment(s). In addition, the particular features, structures or characteristics may be combined in any suitab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic network defense method and device and a computer readable storage medium. The automatic network defense method for the network side comprises the following steps: receiving threat intelligence information from an alliance member node; calculating a credible value of the intelligence information based on the threat intelligence information submitted by the alliance member nodes; calculating a credible value of the intelligence information based on the open source threat intelligence information; calculating a comprehensive credible value of the threat intelligence information based on each calculated credible value; and when the comprehensive credible value is greater than a preset threshold value, issuing the threat intelligence information to the plurality of alliance member nodes.

Description

technical field [0001] The present disclosure generally relates to the field of network security, and more particularly, to an automated network defense method, device, and computer-readable storage medium. Background technique [0002] With the rapid development of Internet security technology, traditional open source threat intelligence analysis methods can no longer meet the security needs of a single enterprise. The professionalism and pertinence of cyber attacks are constantly improving, and the attack methods are developing from a single method to multi-directional, multi-method, and multi-method combinations. [0003] The traditional manual extraction of features and deployment of targeted defense strategies cannot achieve a quick response to attacks and has low timeliness. [0004] For the traditional threat intelligence linkage method, the data source is relatively single, the false positive rate is high, and the timeliness for responding to attacks is long. A hor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425
Inventor 吴涛张鉴薄明霞刘文韬
Owner CHINA TELECOM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More