CN107294971A - 服务器攻击源的威胁度排序方法 - Google Patents
服务器攻击源的威胁度排序方法 Download PDFInfo
- Publication number
- CN107294971A CN107294971A CN201710488361.9A CN201710488361A CN107294971A CN 107294971 A CN107294971 A CN 107294971A CN 201710488361 A CN201710488361 A CN 201710488361A CN 107294971 A CN107294971 A CN 107294971A
- Authority
- CN
- China
- Prior art keywords
- attack
- threat
- server
- stage
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710488361.9A CN107294971B (zh) | 2017-06-23 | 2017-06-23 | 服务器攻击源的威胁度排序方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710488361.9A CN107294971B (zh) | 2017-06-23 | 2017-06-23 | 服务器攻击源的威胁度排序方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107294971A true CN107294971A (zh) | 2017-10-24 |
CN107294971B CN107294971B (zh) | 2020-05-26 |
Family
ID=60098222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710488361.9A Active CN107294971B (zh) | 2017-06-23 | 2017-06-23 | 服务器攻击源的威胁度排序方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107294971B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427882A (zh) * | 2018-03-13 | 2018-08-21 | 南京邮电大学 | 基于行为特征抽取的安卓软件动态分析检测法 |
CN108900508A (zh) * | 2018-06-29 | 2018-11-27 | 亚信科技(成都)有限公司 | 高级威胁检测方法及智能探针装置和高级威胁检测系统 |
CN109696892A (zh) * | 2018-12-21 | 2019-04-30 | 上海瀚之友信息技术服务有限公司 | 一种安全自动化系统及其控制方法 |
CN110365638A (zh) * | 2019-05-28 | 2019-10-22 | 杭州电力设备制造有限公司 | 一种泛在物联网室内分布共享上行控制监测方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1770700A (zh) * | 2004-11-01 | 2006-05-10 | 中兴通讯股份有限公司 | 计算机攻击的威胁评估方法 |
CN103748996B (zh) * | 2009-08-20 | 2011-01-12 | 北京理工大学 | 一种攻防对抗环境下的网络安全态势评估方法 |
US20160014148A1 (en) * | 2014-07-10 | 2016-01-14 | Soteria Systems Llc | Web anomaly detection apparatus and method |
CN105915536A (zh) * | 2016-05-25 | 2016-08-31 | 重庆洞见信息技术有限公司 | 用于网络靶场的攻击行为实时跟踪分析方法 |
CN106341414A (zh) * | 2016-09-30 | 2017-01-18 | 重庆邮电大学 | 一种基于贝叶斯网络的多步攻击安全态势评估方法 |
-
2017
- 2017-06-23 CN CN201710488361.9A patent/CN107294971B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1770700A (zh) * | 2004-11-01 | 2006-05-10 | 中兴通讯股份有限公司 | 计算机攻击的威胁评估方法 |
CN103748996B (zh) * | 2009-08-20 | 2011-01-12 | 北京理工大学 | 一种攻防对抗环境下的网络安全态势评估方法 |
US20160014148A1 (en) * | 2014-07-10 | 2016-01-14 | Soteria Systems Llc | Web anomaly detection apparatus and method |
CN105915536A (zh) * | 2016-05-25 | 2016-08-31 | 重庆洞见信息技术有限公司 | 用于网络靶场的攻击行为实时跟踪分析方法 |
CN106341414A (zh) * | 2016-09-30 | 2017-01-18 | 重庆邮电大学 | 一种基于贝叶斯网络的多步攻击安全态势评估方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108427882A (zh) * | 2018-03-13 | 2018-08-21 | 南京邮电大学 | 基于行为特征抽取的安卓软件动态分析检测法 |
CN108900508A (zh) * | 2018-06-29 | 2018-11-27 | 亚信科技(成都)有限公司 | 高级威胁检测方法及智能探针装置和高级威胁检测系统 |
CN109696892A (zh) * | 2018-12-21 | 2019-04-30 | 上海瀚之友信息技术服务有限公司 | 一种安全自动化系统及其控制方法 |
CN110365638A (zh) * | 2019-05-28 | 2019-10-22 | 杭州电力设备制造有限公司 | 一种泛在物联网室内分布共享上行控制监测方法 |
CN110365638B (zh) * | 2019-05-28 | 2021-07-09 | 杭州电力设备制造有限公司 | 一种泛在物联网室内分布共享上行控制监测方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107294971B (zh) | 2020-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Delving into internet DDoS attacks by botnets: characterization and analysis | |
CN106411578B (zh) | 一种适应于电力行业的网站监控系统及方法 | |
CN106960269B (zh) | 基于层次分析法的安全应急处置方法及系统 | |
Javed et al. | Detecting stealthy, distributed SSH brute-forcing | |
Le Sceller et al. | Sonar: Automatic detection of cyber security events over the twitter stream | |
Bryant et al. | A novel kill-chain framework for remote security log analysis with SIEM software | |
CN108471429B (zh) | 一种网络攻击告警方法及系统 | |
CN107579956B (zh) | 一种用户行为的检测方法和装置 | |
CN107294971A (zh) | 服务器攻击源的威胁度排序方法 | |
CN106790023A (zh) | 网络安全联合防御方法和装置 | |
JP2018530066A (ja) | 低信頼度のセキュリティイベントによるセキュリティインシデントの検出 | |
Bryant et al. | Improving SIEM alert metadata aggregation with a novel kill-chain based classification model | |
Ahmed et al. | Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection | |
CN103905459A (zh) | 基于云端的智能安全防御系统及防御方法 | |
EP3794481A1 (en) | Creation and verification of behavioral baselines for the detection of cybersecurity anomalies using machine learning techniques | |
Agrafiotis et al. | A tripwire grammar for insider threat detection | |
Gafny et al. | Detecting data misuse by applying context-based data linkage | |
WO2023087554A1 (zh) | 一种资产风险处置方法、装置、设备及存储介质 | |
Kersten et al. | 'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center | |
Lu et al. | A new method of data preprocessing for network security situational awareness | |
Kern et al. | Strategic selection of data sources for cyber attack detection in enterprise networks: A survey and approach | |
Islam et al. | {Araña}: Discovering and Characterizing Password Guessing Attacks in Practice | |
Chrun et al. | On the use of security metrics based on intrusion prevention system event data: An Empirical Analysis | |
CN101989230B (zh) | 基于剖面划分的软件安全性测试需求提取与行为描述方法 | |
Yao et al. | A Data Fusion Framework of Multi-Source Heterogeneous Network Security Situational Awareness Based on Attack Pattern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Threat ranking method of server attack sources Effective date of registration: 20211126 Granted publication date: 20200526 Pledgee: Xi'an investment and financing Company limited by guarantee Pledgor: XI'AN JIAOTONG UNIVERSITY JUMP NETWORK TECHNOLOGY Co.,Ltd. Registration number: Y2021610000367 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Date of cancellation: 20221207 Granted publication date: 20200526 Pledgee: Xi'an investment and financing Company limited by guarantee Pledgor: XI'AN JIAOTONG UNIVERSITY JUMP NETWORK TECHNOLOGY Co.,Ltd. Registration number: Y2021610000367 |
|
PC01 | Cancellation of the registration of the contract for pledge of patent right |