Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

2207 results about "Countermeasure" patented technology

A countermeasure is a measure or action taken to counter or offset another one. As a general concept it implies precision, and is any technological or tactical solution or system (often for a military application) designed to prevent an undesirable outcome in the process. The first known use of the term is in 1923.

Area road network traffic safety situation early warning system and method thereof

The invention discloses an area road network traffic safety situation early warning system and a method thereof. The system comprises monitoring equipment, a data transmission system, a data process system and an early warning system. The method comprises the following steps: acquiring data information of road traffic, meteorology, illegal behaviors, and accidents through the monitoring equipment; sending the data information through the data transmission system; carrying out a multiple heterogeneous treatment on the acquired data information through the data process system, and merging data of the same kind; analyzing and assessing early warning grade through the early warning system, and determining and publishing a early warning scheme. Thereby road network traffic safety situation information can be comprehensively grasped, and dangerous source existing in the road network can be discovered timely to determine an early warning grade and generate an intelligent early warning countermeasure. Pertinence, instantaneity and validity of a measure of a road traffic management department actively preventing traffic accidents are improved. Technology support is provided in the invention to reduce area road network traffic risk factor and prevent major and extraordinarily serious road traffic accidents.
Owner:TONGJI UNIV

Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms

A method of detecting an intrusion into (or an anomaly in a behavior of) a target software system begins by instrumenting the target software system to generate behavior data representing a current observation or observation aggregate. The method then determines whether the current observation or observation aggregate warrants a second level examination; preferably, this determination is made by processing the current observation or observation aggregate through a first level detection algorithm that provides a first, provisional indication of a possible intrusion. If a result of executing the first level detection algorithm indicates that the current observation or observation aggregate warrants a second level examination, the method continues by processing the current observation or observation aggregate through at least one or more second level detection algorithms to provide a second, more definite, fine grain indication of a possible intrusion. The observation aggregates used by the first and second level detection algorithms may be the same or different. The first and second level detection algorithms may be executed in the same or different systems, machines or processors. The target software system operation may be suspended as the current observation or observation aggregate is processed through the one or more second level detection algorithms. A given action (e.g., sending an alert, logging the event, activating a countermeasure, or the like) may be taken if the result of the second level examination indicates a possible intrusion. Multiple algorithms may be executed together within a single examination level, with the individual results then analyzed to obtain a composite result or output indicative of intrusive or anomalous behavior.
Owner:STRATACLOUD

Attack-oriented network security situation prediction method, device and system

ActiveCN108494810ARealize dynamic associationIn line with the actual environmentData switching networksSecuring communicationCountermeasureAttack graph
The invention belongs to the technical field of network security and particularly relates to an attack-oriented network security situation prediction method, device and system. The method comprises the following steps: detecting and collecting alarm data and network environment operation and maintenance information in a network countermeasure environment, obtaining an element set required by network security situation prediction, wherein the element set comprises three types of information of an attacker, a defense party and a network environment; evaluating the attacker capability and the level of the defense party, establishing a dynamic Bayesian attack graph, and calculating an attack phase number and an attack state occurrence probability vector; and combining a vulnerability scoring standard and network asset information, and performing time-space dimension quantification on the network security situation value. According to the method, dynamic association of the situation elements of the defense party, the attacker, the environment information and the like is achieved, the actual environment of the network is better conformed to, the future situation and the attack occurrencetime can be accurately predicted, higher prediction efficiency is achieved, and storage scale and timeliness of network security situation awareness are optimized, so as to provide more effective guidance for network protection.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products