Advanced threat attack assessment method and device, electronic equipment and storage medium
An advanced and attacker's technology, applied in the field of network security, can solve the problem of not being able to accurately discover typical targeted attacker identities or attack events
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
[0061] It should be noted that like numerals and letters refer to like items in the following figures, so once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", etc. are only used to distinguish the description, and cannot be understood as indicating or implying relative importance.
[0062] see figure 1 , figure 1 This is a flowchart of a method for evaluating an advanced threat attack provided in an embodiment of the present application. This method can be applied to big data security analysis of products or situational awareness projects such as supervisory units. It can output the results of attack events by means of alerts and judgme...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


