CN108900516A - A kind of cyberspace loophole merger platform distribution service system - Google Patents
A kind of cyberspace loophole merger platform distribution service system Download PDFInfo
- Publication number
- CN108900516A CN108900516A CN201810746271.XA CN201810746271A CN108900516A CN 108900516 A CN108900516 A CN 108900516A CN 201810746271 A CN201810746271 A CN 201810746271A CN 108900516 A CN108900516 A CN 108900516A
- Authority
- CN
- China
- Prior art keywords
- server
- loophole
- firewall
- unit
- distribution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0663—Performing the actions predefined by failover planning, e.g. switching to standby network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
Abstract
The invention discloses a kind of cyberspace loophole merger platform distribution service systems, including distribution server, database server and backup server, the input terminal of the distribution server is connected with database server and output end is connected with backup server, it is connected by local area network between the distribution server, database server and backup server, wherein:The database server can be used for collecting user data and provide inquiry and calling function, and the distribution server can carry out distribution scanning, attack to the task that system user is submitted.The present invention carries out distribution scanning by using submitting to system user for task, the mode of attack is scanned task, solving existing cyberspace is often after starting a leak, relevant patch is repaired again, is be easy to cause because loophole finds to cause to this source data the problem of being affected not in time.
Description
Technical field
The present invention relates to cyberspace loophole merger platform field, in particular to a kind of cyberspace loophole merger platform point
Cloth service system.
Background technique
With the rapid development of information technology, computer network is widely applied, network rings open extensively are utilized
Border carries out the trend that global communication has become era development, and the daily economic and social life of people is also increasingly dependent on interconnection
Net.
Human society progressed by digitlization, networking and it is intelligent characterized by information age, information it is quick-fried
Fried formula increases the arriving for further causing big data era.Search engine, social networks, E-Government, electronic banking, electronics
The various information systems such as commercial affairs, intelligent transportation, intelligent plant emerge like the mushrooms after rain, quietly by obtaining magnanimity number
According to perceiving, managing and regulating and controlling real physical environment and different social sectors, provide for organization and individual family
Various convenient and fast services, greatly change the life, production and way to manage of human society.These data, information and it is
System describes the virtual image of physical world and human society from multiple dimensions, constitutes a corresponding information space.
Especially, the development of mobile Internet and technology of Internet of things allow anyone, thing, object whenever and wherever possible, active-passive real estate
It is raw or obtain information, widely shared information and interrelated and influence each other.This diversified, group feature information Perception mould
Formula merges information space gradually with physical world and human society, depth is associated with and interacts, and foring one has closed loop
Organic whole-" information-physics-society " ternary space of feedback loop.
But existing cyberspace is often repaired after starting a leak, then to relevant patch, is be easy to cause
Because loophole finds to cause to be affected to this source data not in time.
Therefore, it is necessary to solve the above problems to invent a kind of cyberspace loophole merger platform distribution service system.
Summary of the invention
The purpose of the present invention is to provide a kind of cyberspace loophole merger platform distribution service system, by using to being
The task that system user submits carries out distribution scanning, the mode of attack is scanned task, to solve to mention in above-mentioned background technique
Existing cyberspace out is often repaired after starting a leak, then to relevant patch, is be easy to cause because of loophole
It was found that causing not in time to this source data the problem of being affected.
To achieve the above object, the present invention provides the following technical solutions:A kind of cyberspace loophole merger platform distribution clothes
Business system, including distribution server, database server and backup server, the input terminal of the distribution server are connected with number
Backup server, the distribution server, database server and backup server are connected with according to library server and output end
Between be connected by local area network, wherein:
The database server can be used for collecting user data and provide inquiry and calling function;
The distribution server can carry out distribution scanning, attack to the task that system user is submitted;
The backup server can back up completely the data association message of distribution server before and after the processing, to accelerate to be distributed
Server to system user repeat submit task identification speed, thus quickly excitation firewall come to cyberspace loophole into
Row attack, it is ensured that the stable operation of merger platform;
The distribution server includes data acquisition unit, and the data acquisition unit connecting pin is connected with query unit, institute
It states query unit connecting pin and is connected with detection unit, the detection unit connecting pin is connected with data processing unit, the data
Processing unit connecting pin is connected with management and running unit, and management and running unit connecting pin is connected with safety guard unit, and
Safety guard unit is arranged at the connectivity port between data acquisition unit and query unit.
Preferably, the query unit is anti-by inquiry of the domain name subdomain functional module, inquiry of the domain name IP functional module and IP
The form looking into domain name module to be constituted, and being worked independently between each portion using formula submits domain name when task to system user
It is inquired with IP address, quickly to be positioned to the loophole of cyberspace.
Preferably, the detection unit is by port scan and service detection module, operating system detection module and WEB service
Device detection module is constituted, and the task and operation submitted using the form that formula works independently to system user between each portion
System is detected, to find relevant loophole in time.
Preferably, the data processing unit is by the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module
And WEB service component judgment module is constituted, and the data of task can be submitted to carry out analytical integration to system user.
Preferably, the management and running unit is made of distribution task communication module and distributed attacks module, combinable
Data information after analytical integration carries out distributed attacks to the loophole of appearance to be distributed to task.
Preferably, the safety guard unit includes the storage server of multiple subsystems, the machine firewall, region fire prevention
Wall, hardware firewall, software firewall and remote firewall, the remote firewall include remote software firewall and long-range hard
Part firewall.
Preferably, the storage server of the subsystem is connected with the machine firewall, the machine firewall and region
Firewall connection, and be connected with each other between the firewall of subsystems.
Technical effect and advantage of the invention:
1, carry out distribution scanning by using submitting to system user for task, the mode of attack is scanned task, can and
Loophole in Shi Faxian submission task, and safety guard net is established rapidly, to avoid occurring finding to cause not in time because of loophole
To this source data the problem of being affected;
2, by being equipped with backup server, it can be used for collecting user data and inquiry and calling function be provided, simultaneously, additionally it is possible to keep away
Exempt from the case where this source data is damaged;
3, inserting knot to each area can be solved into loophole, scanning speed caused by network factors etc. using distributed computing technology
Security evaluation problem is influenced, meanwhile, task distribution can be carried out specific aim assessment into each node by distributed computing technology.
Detailed description of the invention
Fig. 1 is distributed server deployment scheme schematic diagram of the invention;
Fig. 2 is system construction drawing of the invention;
Fig. 3 is query unit structural schematic diagram of the invention;
Fig. 4 is detection unit structural schematic diagram of the invention;
Fig. 5 is data processing unit structural schematic diagram of the invention;
Fig. 6 is management and running cellular construction schematic diagram of the invention;
Fig. 7 is safety guard cellular construction schematic diagram of the invention;
In figure:1 distribution server, 11 data acquisition units, 12 query units, 13 detection units, 14 data processing units, 15 are adjusted
Spend administrative unit, 16 safety guard units, 2 database servers, 3 backup servers.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment 1:
The present invention provides a kind of cyberspace loophole merger platform distribution service systems as shown in figs. 1-7, including distribution clothes
Be engaged in device 1, database server 2 and backup server 3, the input terminal of the distribution server 1 be connected with database server 2 with
And output end is connected with backup server 3, it is logical between the distribution server 1, database server 2 and backup server 3
Local area network is crossed to be connected, wherein:
The database server 2 can be used for collecting user data and provide inquiry and calling function;
The distribution server 1 can carry out distribution scanning, attack to the task that system user is submitted;
The backup server 3 can back up completely the data association message of distribution server 1 before and after the processing, to accelerate to divide
The identification speed for the task that cloth server 1 repeats to submit to system user, so that quickly excitation firewall to leak cyberspace
Hole is attacked, it is ensured that the stable operation of merger platform;
The distribution server 1 includes data acquisition unit 11, and 11 connecting pin of data acquisition unit is connected with cargo tracer
Member 12,12 connecting pin of query unit is connected with detection unit 13, and 13 connecting pin of detection unit is connected with data processing
Unit 14,14 connecting pin of data processing unit are connected with management and running unit 15,15 connecting pin of management and running unit
It is connected with safety guard unit 16, and the company between data acquisition unit 11 and query unit 12 is arranged in safety guard unit 16
It connects at port.
Above-mentioned technical proposal has the beneficial effect that:By by distribution server 1, database server 2 and backup server 3
By LAN connection to together, to be carried out using backup server 3 to the data association message of distribution server 1 before and after the processing
Backup completely to accelerate the identification speed for the task that distribution server 1 repeats to submit to system user, and then quickly excites anti-
Wall with flues attacks cyberspace loophole, it is ensured that the stable operation of merger platform.
Embodiment 2:
Further, in the technical solution of embodiment 1, the query unit 12 is by inquiry of the domain name subdomain functional module, domain name
Inquiry IP functional module and the anti-domain name module of looking into of IP are constituted, and between each portion using the form of formula autonomous working to being
System user submits domain name and IP address when task to inquire, quickly to position to the loophole of cyberspace.
Further, in the technical solution of embodiment 1, the detection unit 13 is by port scan and service detection mould
Block, operating system detection module and WEB server detection module are constituted, and the shape to be worked independently between each portion using formula
The task and operating system that formula submits system user detect, to find relevant loophole in time.
Further, in the technical solution of embodiment 1, the data processing unit 14 is creeped mould by the whole station WEB in website
Block, WEB page vulnerability scanning analysis module and WEB service component judgment module are constituted, and can be submitted and be appointed to system user
The data of business carry out analytical integration.
Further, in the technical solution of embodiment 1, the management and running unit 15 by distribution task communication module and
Distributed attacks module is constituted, and is distributed in combination with the data information after analytical integration to task, while the leakage to appearance
Hole carries out distributed attacks.
Further, in the technical solution of embodiment 1, the safety guard unit 16 includes the storage of multiple subsystems
Server, the machine firewall, region firewall, hardware firewall, software firewall and remote firewall, the remote firewall
Including remote software firewall and remote hardware firewall, the storage server of the subsystem is connected with the machine firewall,
The machine firewall is connect with region firewall, and is connected with each other between the firewall of subsystems, fault-tolerant to be formed
The complementary relationship of control makes the server cluster of entire distributed deployment connect hardware firewall, software firewall and remotely prevent
Wall with flues protects the normal operation of in house software running environment, provides security strategy for operating system.
Working principle of the present invention:
Referring to Figure of description 1, the input terminal of distribution server is connected with database server and output end is connected with backup
Server is connected by local area network, wherein database between distribution server, database server and backup server
Server can be used for collecting user data and provide inquiry and calling function, and distribution server can submit system user
Task carry out distribution scanning, attack, meanwhile, backup server can to the data association message of distribution server before and after the processing into
Row backup completely, to accelerate the identification speed for the task that distribution server repeats to submit to system user, so that quickly excitation is anti-
Wall with flues attacks cyberspace loophole, it is ensured that the stable operation of merger platform;
Referring to Figure of description 2-6, in the process of work, data acquisition unit appoints system user submission to distribution server
Business carries out the acquisition of related data, then by according to collected related data situation, by inquiry of the domain name subdomain functional module,
Inquiry of the domain name IP functional module or the anti-domain name for looking into domain name module come to system user submission task when of IP and IP address are looked into
It askes, quickly to be positioned to the loophole of cyberspace, meanwhile, utilize port scan and service detection module, operating system
Detection module and WEB server detection module detect come the task and operating system submitted to system user, so as to and
The relevant loophole of Shi Faxian, followed by the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module and WEB
Serviced component judgment module submits the data of task to carry out analytical integration system user, and is distributed task communication module and distribution
Data information of the attack module then after binding analysis integration is distributed task, while carrying out distribution to the loophole of appearance and attacking
It hits, and establishes firewall and this source data of system is protected;
Referring to Figure of description 7, safety guard unit 16 includes the storage server of multiple subsystems, the machine firewall, region
Firewall, hardware firewall, software firewall and remote firewall, and remote firewall then includes remote software firewall and remote
Journey hardware firewall, meanwhile, the storage server of subsystem is connected with the machine firewall, the machine firewall and region firewall
Connection, and be connected with each other between the firewall of subsystems, to form the complementary relationship of faults-tolerant control, make entire distribution
Server cluster connection hardware firewall, software firewall and the remote firewall of deployment, protection in house software running environment
It operates normally, provides security strategy for operating system.
Finally it should be noted that:The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features,
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (7)
1. a kind of cyberspace loophole merger platform distribution service system, including distribution server(1), database server(2)
And backup server(3), it is characterised in that:The distribution server(1)Input terminal be connected with database server(2)And
Output end is connected with backup server(3), the distribution server(1), database server(2)And backup server(3)It
Between be connected by local area network, wherein:
The database server(2)It can be used for collecting user data and inquiry and calling function be provided;
The distribution server(1)Distribution scanning, attack can be carried out to the task that system user is submitted;
The backup server(3)It can be to distribution server(1)Data association message before and after the processing is backed up completely, to add
Fast distribution server(1)To the identification speed for the task that system user repeats to submit, so that quickly excitation firewall comes to network
Space loophole is attacked, it is ensured that the stable operation of merger platform;
The distribution server(1)It include data acquisition unit(11), the data acquisition unit(11)Connecting pin is connected with
Query unit(12), the query unit(12)Connecting pin is connected with detection unit(13), the detection unit(13)Connecting pin
It is connected with data processing unit(14), the data processing unit(14)Connecting pin is connected with management and running unit(15), described
Management and running unit(15)Connecting pin is connected with safety guard unit(16), and safety guard unit(16)Setting is acquired in data
Unit(11)With query unit(12)Between connectivity port at.
2. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described
Query unit(12)By inquiry of the domain name subdomain functional module, inquiry of the domain name IP functional module and IP is counter looks into domain name module institute structure
At, and the form to be worked independently between each portion using formula submits domain name and IP address when task to look into system user
It askes, quickly to be positioned to the loophole of cyberspace.
3. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described
Detection unit(13)By port scan and service detection module, operating system detection module and WEB server detection module institute structure
At, and the form to be worked independently between each portion using formula the submitting to system user of the task and operating system are detected,
To find relevant loophole in time.
4. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described
Data processing unit(14)By the whole station WEB crawler module in website, WEB page vulnerability scanning analysis module and WEB service component
Judgment module is constituted, and the data of task can be submitted to carry out analytical integration to system user.
5. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described
Management and running unit(15)It is made of distribution task communication module and distributed attacks module, in combination with the data after analytical integration
Information carries out distributed attacks to the loophole of appearance to be distributed to task.
6. a kind of cyberspace loophole merger platform distribution service system according to claim 1, it is characterised in that:It is described
Safety guard unit(16)Storage server, the machine firewall, region firewall, hardware firewall including multiple subsystems,
Software firewall and remote firewall, the remote firewall include remote software firewall and remote hardware firewall.
7. a kind of cyberspace loophole merger platform distribution service system according to claim 6, it is characterised in that:It is described
The storage server of subsystem is connected with the machine firewall, and the machine firewall is connect with region firewall, and each height
It is connected with each other between the firewall of system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810746271.XA CN108900516B (en) | 2018-07-09 | 2018-07-09 | Distributed service system of network space vulnerability merging platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810746271.XA CN108900516B (en) | 2018-07-09 | 2018-07-09 | Distributed service system of network space vulnerability merging platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108900516A true CN108900516A (en) | 2018-11-27 |
CN108900516B CN108900516B (en) | 2021-06-22 |
Family
ID=64348231
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810746271.XA Active CN108900516B (en) | 2018-07-09 | 2018-07-09 | Distributed service system of network space vulnerability merging platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900516B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090418A (en) * | 2019-11-26 | 2020-05-01 | 常州工业职业技术学院 | Intelligent service enterprise labeling operation maintenance system |
CN111885094A (en) * | 2020-09-28 | 2020-11-03 | 浙江省能源集团有限公司 | Industrial control system network safety protection capability inspection and evaluation system |
CN112637119A (en) * | 2020-11-13 | 2021-04-09 | 北京大米科技有限公司 | Host scanning method and device, storage medium and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495884A (en) * | 2011-12-08 | 2012-06-13 | 中国信息安全测评中心 | Vulnerability information cloud service method based on Internet |
CN104348829A (en) * | 2014-09-26 | 2015-02-11 | 智慧城市信息技术有限公司 | Network security situation sensing system and method |
CN105069158A (en) * | 2015-08-25 | 2015-11-18 | 携程计算机技术(上海)有限公司 | Data mining method and system |
CN106874755A (en) * | 2017-01-22 | 2017-06-20 | 中国人民解放军信息工程大学 | The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks |
CN107087001A (en) * | 2017-05-15 | 2017-08-22 | 华中科技大学 | A kind of important address spatial retrieval system in distributed internet |
US20180018463A1 (en) * | 2016-07-14 | 2018-01-18 | IronNet Cybersecurity, Inc. | Simulation and virtual reality based cyber behavioral systems |
CN108040070A (en) * | 2017-12-29 | 2018-05-15 | 北京奇虎科技有限公司 | A kind of network security test platform and method |
CN108769018A (en) * | 2018-05-29 | 2018-11-06 | 北京理工大学 | A kind of cyberspace security measure method of the more granularities of multidimensional |
-
2018
- 2018-07-09 CN CN201810746271.XA patent/CN108900516B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495884A (en) * | 2011-12-08 | 2012-06-13 | 中国信息安全测评中心 | Vulnerability information cloud service method based on Internet |
CN104348829A (en) * | 2014-09-26 | 2015-02-11 | 智慧城市信息技术有限公司 | Network security situation sensing system and method |
CN105069158A (en) * | 2015-08-25 | 2015-11-18 | 携程计算机技术(上海)有限公司 | Data mining method and system |
US20180018463A1 (en) * | 2016-07-14 | 2018-01-18 | IronNet Cybersecurity, Inc. | Simulation and virtual reality based cyber behavioral systems |
CN106874755A (en) * | 2017-01-22 | 2017-06-20 | 中国人民解放军信息工程大学 | The consistent escape error processing apparatus of majority and its method based on mimicry Prevention-Security zero-day attacks |
CN107087001A (en) * | 2017-05-15 | 2017-08-22 | 华中科技大学 | A kind of important address spatial retrieval system in distributed internet |
CN108040070A (en) * | 2017-12-29 | 2018-05-15 | 北京奇虎科技有限公司 | A kind of network security test platform and method |
CN108769018A (en) * | 2018-05-29 | 2018-11-06 | 北京理工大学 | A kind of cyberspace security measure method of the more granularities of multidimensional |
Non-Patent Citations (1)
Title |
---|
张焕国 等: "《网络空间安全综述》", 《中国科学:信息科学》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111090418A (en) * | 2019-11-26 | 2020-05-01 | 常州工业职业技术学院 | Intelligent service enterprise labeling operation maintenance system |
CN111090418B (en) * | 2019-11-26 | 2023-08-01 | 常州工业职业技术学院 | Intelligent service enterprise labeling operation maintenance system |
CN111885094A (en) * | 2020-09-28 | 2020-11-03 | 浙江省能源集团有限公司 | Industrial control system network safety protection capability inspection and evaluation system |
CN111885094B (en) * | 2020-09-28 | 2021-02-26 | 浙江省能源集团有限公司 | Industrial control system network safety protection capability inspection and evaluation system |
CN112637119A (en) * | 2020-11-13 | 2021-04-09 | 北京大米科技有限公司 | Host scanning method and device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108900516B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107659543B (en) | Protection method for APT (android packet) attack of cloud platform | |
CN109922075A (en) | Network security knowledge map construction method and apparatus, computer equipment | |
CN110324313B (en) | Honeypot system-based malicious user identification method and related equipment | |
CN108900516A (en) | A kind of cyberspace loophole merger platform distribution service system | |
CN103942639B (en) | Policy management system and its method for policy consultation service system | |
CN107800709B (en) | A kind of method and device generating network attack detection strategy | |
CN100362803C (en) | Network safety warning system based on cluster and relavance | |
CN102685145A (en) | Domain name server (DNS) data packet-based bot-net domain name discovery method | |
CN112269316B (en) | High-robustness threat hunting system and method based on graph neural network | |
CN103281333A (en) | Forwarding method and device of data flow | |
CN101873231B (en) | Network intrusion character configuration method and system | |
CN103986706A (en) | Security structure design method dealing with APT attacks | |
Cao et al. | Combating friend spam using social rejections | |
CN111510463B (en) | Abnormal behavior recognition system | |
US8117181B2 (en) | System for notification of group membership changes in directory service | |
CN113382010B (en) | Large-scale network security defense system based on cooperative intrusion detection | |
CN108833368A (en) | Network space vulnerability merging platform system | |
CN107835153B (en) | Vulnerability situation data fusion method | |
CN108377275B (en) | Network security protection method based on neural network algorithm | |
CN105915513B (en) | The lookup method and device of the malicious service supplier of composite services in cloud system | |
CN114363002A (en) | Method and device for generating network attack relation graph | |
CN100428731C (en) | Method for preventing star-shape network from invading and attacking based on intelligent exchanger | |
CN112291263A (en) | Data blocking method and device | |
CN103428029B (en) | Search authentication processing method and device | |
Xu et al. | NetworkTrace: probabilistic relevant pattern recognition approach to attribution trace analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |