CN108965346A - One kind is fallen Host Detection method - Google Patents

One kind is fallen Host Detection method Download PDF

Info

Publication number
CN108965346A
CN108965346A CN201811175949.XA CN201811175949A CN108965346A CN 108965346 A CN108965346 A CN 108965346A CN 201811175949 A CN201811175949 A CN 201811175949A CN 108965346 A CN108965346 A CN 108965346A
Authority
CN
China
Prior art keywords
host
early warning
log
warning platform
falling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811175949.XA
Other languages
Chinese (zh)
Inventor
李荣正
孙玮泽
袁鹏
闫旭东
陈学军
戴国银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Engineering Science
Original Assignee
Shanghai University of Engineering Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Engineering Science filed Critical Shanghai University of Engineering Science
Priority to CN201811175949.XA priority Critical patent/CN108965346A/en
Publication of CN108965346A publication Critical patent/CN108965346A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

It falls Host Detection method the invention discloses one kind, include the following steps: log uploading step: each security boundary probe class equipment will be as caused by flow between each security domain, and the daily record data including application access log, URL access log, file transmission log, threat log uploads secure cloud early warning platform;Data extraction step: the daily record data that security boundary probe class equipment reports is converged to cloud big data analysis engine by secure cloud early warning platform; cloud big data analysis engine excavates user's abnormal behaviour that host in network deviates normal baseline; abnormal behaviour data are generated, and will threaten log aggregation is to threaten information;Data Matching step: secure cloud early warning platform will threaten user's abnormal behaviour that host deviates normal baseline in information and network to carry out matching head-on collision by cloud big data analysis engine, predict suspicious host of falling.

Description

One kind is fallen Host Detection method
Technical field
It falls Host Detection method the present invention relates to one kind of network safety filed.
Background technique
Passing, most of attacker often entertains the phychology of " opportunism " when selecting target of attack, can be with " everywhere Bloom " form scan that there are the targets of known bugs to be permeated extensively.Theoretically, the protection intensity of enterprise is more than average It is horizontal, so that it may to obtain opposite safety, the system of safeguard procedures weakness is often found and captured by attacker prior to them.
Therefore, traditional network safety is followed P2DR strategy always, is established protection-detection-response centered on " prevention " Model, i.e., first fully assess the risk of information system, then formulates corresponding prevention policies, comprising: in crucial wind Danger point deployment access control apparatus, such as firewall, IPS, Certificate Authority etc., repair system loophole correctly configure system, periodically rise Grade maintenance, education proper use of system of user etc..Detection is in response to and reinforces the foundation of protection, passes through detection network flow and row To be matched with preset strategy, if triggering prevention policies, then it is assumed that network attack has occurred, response system is carried out pre- If movement prevents attack, and carries out alarm and recovery processing.
It is corresponding, conventional security product, such as terminal antivirus, firewall, IPS, Web application firewall, it is base It organizes work in known features and preset rules, theoretical foundation is equally P2DR Protection Model, this is a kind of static, passive , defence thinking security model.
However, the security incident exposed in recent years constantly proves, hacker attack means are evolved to from traditional general attack Advanced threat.It using the 0-day loophole of system, can not defend, with clearly defined objective, directional attack, lose huge, it is difficult to draw in advance It returns.
With attack process gradually deeply, will be undergone by the destination host that attacker locks by invading, controlled System initiates several stages such as malicious act.In " invasion " stage, destination host is often by phishing, loophole benefit With the attack of the forms such as, Brute Force;Once success if will enter " being controlled " stage, this phase targets host will with it is remote The C&C server at end establishes connection, and continues the control of person under attack;It after destination host is controlled, will start " to initiate malice row For " stage, the target expanded sweep that destination host is often used as springboard new to Intranet or outer net is attacked, refusal services (DoS/ DDoS a series of) activities such as attack, the access of malice network address, loophole invasion, spyware implantation, data theft." host of falling " Refer to and successfully invaded by attacker, behavioural characteristic meets the host of above-mentioned " being controlled " or " initiating malicious act " stage.
Summary of the invention
The purpose of the invention is to overcome the deficiencies of the prior art and provide one kind to fall Host Detection method, complete It ensure that internet security and macrocyclic visibility in office, realize to fall and Host Detection and fight with other and Advanced threat Ability.
Realizing a kind of technical solution of above-mentioned purpose is: one kind is fallen Host Detection method, is included the following steps:
Log uploading step: each security boundary probe class equipment will be as caused by flow between each security domain, including applies Access log, file transmission log, threatens the daily record data including log to upload secure cloud early warning platform at URL access log;
Data extraction step: the daily record data that security boundary probe class equipment reports is converged to cloud by secure cloud early warning platform Big data analysis engine is held, cloud big data analysis engine excavates user's abnormal behaviour that host in network deviates normal baseline, User's abnormal behaviour data are generated, and will threaten log aggregation is to threaten information;
Data Matching step: secure cloud early warning platform will be threatened main in information and network by cloud big data analysis engine User's abnormal behaviour that machine deviates normal baseline carries out matching head-on collision, predicts suspicious host of falling.
Further, threaten information come be also from secure cloud early warning platform cloud sand table and with secure cloud early warning platform Connected third party's intelligence sharing platform.
Further, the generation of user's abnormal behaviour data is visited according to Unified Threat Management in security boundary probe class equipment The daily record data of needle acquisition threatens the generation of log according to the log of gas defence safety probe acquisition in security boundary probe class equipment Data.
Further, threatening information includes the source IP of attack, Target IP, the domain address used, the attack taken Means.
Further, there are also results to show step, the shape counted by secure cloud early warning platform after Data Matching step Formula is presented host subscriber's abnormal behaviour data in network and clashes with matching for information is threatened as a result, then determining suspicious master of falling Machine.
Further, as a result show in step, by secure cloud early warning platform, with information map view show it is entire because Security postures in spy's net.
Further, it as a result shows in step, for secure cloud early warning platform by cloud big data analysis engine, judgement can Doubtful host of falling is in by invading, be controlled, initiate to internal attack, initiate possible stage in malicious act, to sentence Break the certainty of falling of suspicious host of falling.
Further, the result shows host analysis step of also falling after step, and secure cloud early warning platform passes through Scenario analysis and blog search analyze selected suspicious host of falling, and the suspicious host of falling is presented selected Specific user's abnormal behaviour in period.
Further, statistics overview and association analysis are carried out in scenario analysis;
The network for the host of falling that this is suspicious in seclected time period is presented in statistics overview in the form of histogram or cake chart Attack the statistical result of information;
The related information of the attack of the suspicious host of falling is presented to manager for association analysis.
Further, there are also back feeding step after Data Matching step, secure cloud early warning platform distributes prestige in network-wide basis Information is coerced, back feeding is located at the firewall on boundary and the threat characteristics library of each security boundary probe class equipment.
Using a kind of technical solution of Host Detection method of falling of the invention, include the following steps: that log uploads step Rapid: each security boundary probe class equipment will be as caused by flow between each security domain, including application access log, URL access day Will, threatens the daily record data including log to upload secure cloud early warning platform at file transmission log;Data extraction step: secure cloud The daily record data that security boundary probe class equipment reports is converged to cloud big data analysis engine, cloud big data by early warning platform Analysis engine excavates user's abnormal behaviour that host in network deviates normal baseline, generates abnormal behaviour data, and will threaten day Will convergence is threat information;Data Matching step: secure cloud early warning platform will threaten information by cloud big data analysis engine The user's abnormal behaviour for deviateing normal baseline with host in network carries out matching head-on collision, predicts suspicious host of falling.Its technology Effect is: flat by secure cloud early warning using the strategy of secure cloud early warning platform and security boundary probe class equipment real-time collaborative Platform provide cloud big data analysis, quick-searching and magnanimity cloud storage, further ensure that in the overall situation internet security and Macrocyclic visibility realizes fall Host Detection and the ability with other and Advanced threat confrontation.
Detailed description of the invention
Fig. 1 is a kind of knot flow chart of Host Detection method of falling of the invention.
Specific embodiment
Referring to Fig. 1, the present inventor in order to preferably understand technical solution of the present invention, is led to below Specifically embodiment is crossed, and will be described in detail with reference to the accompanying drawings:
One kind of the invention Host Detection method of falling includes the following steps:
Log uploading step: each security boundary probe class equipment will be as caused by flow between each security domain, including applies Access log, file transmission log, threatens the daily record data including log to upload secure cloud early warning platform at URL access log.Side The effect of boundary's safety probe class equipment is: based on its own sensing capability to user behavior in network, threat information, will have The daily record data of value, which continually uploads, to summarize to secure cloud early warning platform.
Data extraction step: secure cloud early warning platform converges to the daily record data that each security boundary probe class equipment reports Cloud big data analysis engine, cloud big data analysis engine extract user's abnormal behaviour data of host in network;Excavate net Host deviates user's abnormal behaviour of normal baseline in network, and threatens information from threatening to extract in log.
Since security boundary probe class equipment can at least be divided into Threat Management probe and gas defence safety probe:
By having the Threat Management probe of application layer message recognition capability, see clearly user in network flow, using and Content, analysis record user's abnormal behaviour of host in network, are uploaded to secure cloud early warning platform.Threat Management probe is in tradition On the basis of identification technology, extends using mechanism such as behavioral value, application source infomation detections, promoted in network flow Using, user, the accuracy of identification and range of terminal, content.Threat Management probe is based on to network flow application type, Yong Huxin Breath and content, such as the depth recognition of URL, file type, file content carry out insight to user network behavior, to lose The analysis of user's abnormal behaviour necessary to Host Detection is fallen into lay a good foundation.
The activity for being attacked and being implanted into spyware using loophole is identified by gas defence safety probe, based on to virus plant Enter, malice network address access, vulnerability exploit attack, spyware movable perception, by the network attack log of generation it is real-time on Secure cloud early warning platform is passed, is generated for secure cloud early warning platform and threatens information.
Data Matching step: secure cloud early warning platform will be threatened main in information and network by cloud big data analysis engine User's abnormal behaviour that machine deviates normal baseline carries out matching head-on collision, and the doubtful master of falling that may be fallen is predicted from multiple dimensions Machine.
Threaten information in addition to being also from the cloud sand table and and secure cloud in secure cloud early warning platform from log is threatened The connected third party's intelligence sharing platform of early warning platform.
Threatening information includes the source IP of attack, Target IP, the domain address used, the attack means taken.
As a result show step: secure cloud early warning platform is presented host subscriber's abnormal behaviour data in network and threatens information Matching head-on collision as a result, inform manager in the form of statistics, in network in the network behavior of host how many with it is fixed Malicious act is related, then quickly determines suspicious host of falling.
The step is converged the attack that each security boundary probe class equipment is reported by " information map ", and It wins wherein tens of points one to be presented on a global map, for illustrating the security postures of current Internet to manager.
The step can also provide fall host overall qualitative index and threat two indexs of sex index really simultaneously.Certainty refers to Number embodies the suspicious degree that the host has been fallen, which is up to 100, and the value the high, means that it determines the assurance fallen Degree is bigger, and sex index is threatened to embody the menace degree of the host, which is up to 100, and the value the high, means it really It is fixed bigger by Threat.
It falls host analysis step:, selected suspicious host of falling is analyzed by secure cloud early warning platform, is in Host specific user's abnormal behaviour in seclected time period that now this was suspicious fall.Be substantially carried out: scenario analysis and log are searched Rope.
Scenario analysis: secure cloud early warning platform provides further contextual information to selected suspicious host of falling and drills through And association analysis, the behavior and motivation of attacker are portrayed, scenario analysis includes " statistics overview " and " association analysis " two parts.
The net for the suspicious host of falling selected in seclected time period is presented in statistics overview in the form of histogram, cake chart Network attacks the statistical result of information, and the IP including being saturated attack ranks, is saturated the event seniority among brothers and sisters of attack, spyware behavior IP seniority among brothers and sisters, spyware behavior event seniority among brothers and sisters, access malice URL IP seniority among brothers and sisters, access URL event seniority among brothers and sisters, downloading disease The IP seniority among brothers and sisters of malicious spyware, the event seniority among brothers and sisters for downloading viral spyware.
The related information of the attack of selected suspicious host of falling is presented to manager for association analysis.For example, seeping The attack source of attack IP, attack pattern, application vector download source IP address, purpose IP address, application vector of certain virus etc. thoroughly.
Blog search is based on search result convenient for manager and quickly traces to the source attack, comprising:
Safety message, secure cloud early warning platform by the daily record data reported converge after with a variety of custom formats output safety reports It accuses.Safety message can be about in advance daily paper, weekly, monthly magazine etc., and periodically automatically generate.
In default template, safety message includes assets security analysis, threat analysis, application risk analysis, virus and dislikes The URL that anticipates is analyzed.
Assets security analysis in, in graphical form respectively present network in server and terminal by attack the case where And specifying information.
In threat analysis, mainly using threat types as visual angle, most popular attack type, newly-increased is presented in graphical form Attack type and attack concrete principle, the statistics of related IP and number.
In application risk analysis, ranking mainly is carried out to the application of maximum flow in network, and successively analyze various applications Purposes, risk and related IP.
Virus counts the situation of the whole network host access malice URL, downloading virus with malice URL analysis.
Back feeding step: secure cloud early warning platform will threaten information to distribute rapidly in network-wide basis, and back feeding is located at boundary The threat characteristics library of firewall and each security boundary probe class equipment.
One kind of the invention is fallen Host Detection method, the application having using security boundary probe class equipment, terminal, User, content recognition ability and threat sensing capability, powerful guarantee accurately know full the whole network behavior, movable insight clearly Net behavior provides precondition for the analysis of subsequent user's abnormal behaviour, threat information detection etc., guarantees Host Detection of falling Accuracy.
Since security boundary probe class equipment can be deployed in any position in network in a variety of forms, and have in itself super Strong application control, application layer threat-protection capability can carry out high-performance interception for application abuse, known threaten etc.;Therefore One kind of the invention is fallen Host Detection method, is not being changed the network architecture convenient for user, is not being increased network availability risk In the case of, improve the accuracy for Host Detection of falling.
By the cloud filtering of secure cloud early warning platform, cloud killing, threaten information distribution back feeding that security boundary probe class is helped to set Standby work enables a kind of Host Detection method of falling of the invention to guarantee the safety of network boundary.
One kind of the invention Host Detection method of falling is real using secure cloud early warning platform and security boundary probe equipment The strategy of Shi Xietong, by cloud big data analysis, quick-searching and magnanimity cloud storage that secure cloud early warning platform provides, into one Step ensure that internet security and macrocyclic visibility in the overall situation, realization fall Host Detection and with other and Advanced threat The ability of confrontation brings safety for user.
Those of ordinary skill in the art it should be appreciated that more than embodiment be intended merely to illustrate the present invention, And be not used as limitation of the invention, as long as the change in spirit of the invention, to embodiment described above Change, modification will all be fallen within the scope of claims of the present invention.

Claims (10)

1. one kind is fallen, Host Detection method, includes the following steps:
Log uploading step: each security boundary probe class equipment will be as caused by flow between each security domain, including application access Log, file transmission log, threatens the daily record data including log to upload secure cloud early warning platform at URL access log;
Data extraction step: it is big that the daily record data that security boundary probe class equipment reports is converged to cloud by secure cloud early warning platform Data analysis engine, cloud big data analysis engine excavate user's abnormal behaviour that host in network deviates normal baseline, generate User's abnormal behaviour data, and will threaten log aggregation is to threaten information;
Data Matching step: secure cloud early warning platform will threaten information and host in network inclined by cloud big data analysis engine User's abnormal behaviour from normal baseline carries out matching head-on collision, predicts suspicious host of falling.
The Host Detection method 2. one kind according to claim 1 is fallen, it is characterised in that: information is threatened to be also from peace The cloud sand table of full cloud early warning platform and the third party's intelligence sharing platform being connected with secure cloud early warning platform.
The Host Detection method 3. one kind according to claim 1 is fallen, it is characterised in that: the life of user's abnormal behaviour data At the daily record data according to Unified Threat Management probe collection in security boundary probe class equipment, threaten the generation of log according to side The daily record data that gas defence safety probe acquires in boundary's safety probe class equipment.
The Host Detection method 4. one kind according to claim 1 is fallen, it is characterised in that: threatening information includes attack Source IP, Target IP, the domain address used, the attack means taken.
The Host Detection method 5. one kind according to claim 1 is fallen, it is characterised in that: there are also tie after Data Matching step Fruit shows step, and host subscriber's abnormal behaviour data in network are presented in the form of counting secure cloud early warning platform and threaten The matching of information is clashed as a result, then determining suspicious host of falling.
The Host Detection method 6. one kind according to claim 5 is fallen, it is characterised in that: result is shown in step, is passed through Secure cloud early warning platform shows the security postures in entire internet with information map view.
The Host Detection method 7. one kind according to claim 5 is fallen, it is characterised in that: result is shown in step, safe Cloud early warning platform judges that suspicious host of falling is in by invading, be controlled, initiate by cloud big data analysis engine It internals attack, initiate possible stage in malicious act, to judge the certainty of falling of suspicious host of falling.
The Host Detection method 8. one kind according to claim 5 is fallen, it is characterised in that: the result is gone back after showing step It falls host analysis step, secure cloud early warning platform is by scenario analysis and blog search, to selected suspicious master of falling Machine is analyzed, and suspicious host specific user's abnormal behaviour in seclected time period of falling is presented.
The Host Detection method 9. one kind according to claim 8 is fallen, it is characterised in that: carry out counting total in scenario analysis It lookes at and association analysis;
The network attack for the host of falling that this is suspicious in seclected time period is presented in statistics overview in the form of histogram or cake chart The statistical result of information;
The related information of the attack of the suspicious host of falling is presented to manager for association analysis.
The Host Detection method 10. one kind according to claim 1 is fallen, it is characterised in that: after Data Matching step also Back feeding step, secure cloud early warning platform distribute in network-wide basis threaten information, back feeding be located at boundary firewall and each boundary The threat characteristics library of safety probe class equipment.
CN201811175949.XA 2018-10-10 2018-10-10 One kind is fallen Host Detection method Pending CN108965346A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811175949.XA CN108965346A (en) 2018-10-10 2018-10-10 One kind is fallen Host Detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811175949.XA CN108965346A (en) 2018-10-10 2018-10-10 One kind is fallen Host Detection method

Publications (1)

Publication Number Publication Date
CN108965346A true CN108965346A (en) 2018-12-07

Family

ID=64471525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811175949.XA Pending CN108965346A (en) 2018-10-10 2018-10-10 One kind is fallen Host Detection method

Country Status (1)

Country Link
CN (1) CN108965346A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525611A (en) * 2019-01-11 2019-03-26 新华三信息安全技术有限公司 A kind of abnormal outgoing behavioral value method and device of Intranet user
CN109862003A (en) * 2019-01-24 2019-06-07 深信服科技股份有限公司 Local generation method, device, system and the storage medium for threatening information bank
CN110149303A (en) * 2019-03-27 2019-08-20 李登峻 A kind of network safety pre-warning method and early warning system of Party school
CN110708315A (en) * 2019-10-09 2020-01-17 杭州安恒信息技术股份有限公司 Asset vulnerability identification method, device and system
CN110708296A (en) * 2019-09-19 2020-01-17 中国电子科技网络信息安全有限公司 VPN account number collapse intelligent detection model based on long-time behavior analysis
CN110719291A (en) * 2019-10-16 2020-01-21 杭州安恒信息技术股份有限公司 Network threat identification method and identification system based on threat information
CN110730175A (en) * 2019-10-16 2020-01-24 杭州安恒信息技术股份有限公司 Botnet detection method and detection system based on threat information
CN110830470A (en) * 2019-11-06 2020-02-21 浙江军盾信息科技有限公司 Method, device and equipment for detecting defect-losing host and readable storage medium
CN110875928A (en) * 2019-11-14 2020-03-10 北京神州绿盟信息安全科技股份有限公司 Attack tracing method, device, medium and equipment
CN110958251A (en) * 2019-12-04 2020-04-03 中电福富信息科技有限公司 Method and device for detecting and backtracking lost host based on real-time stream processing
CN112073389A (en) * 2020-08-21 2020-12-11 苏州浪潮智能科技有限公司 Cloud host security situation awareness system, method, device and storage medium
CN112153062A (en) * 2020-09-27 2020-12-29 北京北信源软件股份有限公司 Multi-dimension-based suspicious terminal equipment detection method and system
CN112487321A (en) * 2020-12-08 2021-03-12 北京天融信网络安全技术有限公司 Detection method, detection device, storage medium and electronic equipment
CN113141335A (en) * 2020-01-19 2021-07-20 奇安信科技集团股份有限公司 Network attack detection method and device
CN113497784A (en) * 2020-03-20 2021-10-12 中国电信股份有限公司 Method, apparatus and computer readable storage medium for detecting intelligence data
CN113852615A (en) * 2021-09-15 2021-12-28 广东电力信息科技有限公司 Method and device for monitoring lost host in multi-stage DNS (Domain name System) environment
CN113904920A (en) * 2021-09-14 2022-01-07 上海纽盾科技股份有限公司 Network security defense method, device and system based on lost equipment
CN114006802A (en) * 2021-09-14 2022-02-01 上海纽盾科技股份有限公司 Situation awareness prediction method, device and system for equipment with failure
CN115021978A (en) * 2022-05-17 2022-09-06 云盾智慧安全科技有限公司 Attack path prediction method and device, electronic equipment and storage medium
CN115643120A (en) * 2022-12-26 2023-01-24 国联江森自控绿色科技(无锡)有限公司 Control system for exception self-processing of new energy management platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125547A1 (en) * 2005-10-18 2009-05-14 Norihiko Kawakami Storage System for Managing a Log of Access
CN105468737A (en) * 2015-11-24 2016-04-06 湖北大学 Web service big data analysis method, cloud computing platform and mining system
CN105915532A (en) * 2016-05-23 2016-08-31 北京网康科技有限公司 Method and device for recognizing fallen host
CN107707541A (en) * 2017-09-28 2018-02-16 小花互联网金融服务(深圳)有限公司 A kind of attack daily record real-time detection method based on machine learning of streaming

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125547A1 (en) * 2005-10-18 2009-05-14 Norihiko Kawakami Storage System for Managing a Log of Access
CN105468737A (en) * 2015-11-24 2016-04-06 湖北大学 Web service big data analysis method, cloud computing platform and mining system
CN105915532A (en) * 2016-05-23 2016-08-31 北京网康科技有限公司 Method and device for recognizing fallen host
CN107707541A (en) * 2017-09-28 2018-02-16 小花互联网金融服务(深圳)有限公司 A kind of attack daily record real-time detection method based on machine learning of streaming

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王秀波: "《网络安全解决方案》", 《智能建筑》 *
网康科技有限公司: "《基于网康云和下一代防火墙的失陷主机检测解决方案(V1.1)》", 《《HTTPS://WENKU.BAIDU.COM/VIEW/AD03D8C0F78A6529657D53C1.HTML》》 *

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525611A (en) * 2019-01-11 2019-03-26 新华三信息安全技术有限公司 A kind of abnormal outgoing behavioral value method and device of Intranet user
CN109525611B (en) * 2019-01-11 2021-03-12 新华三信息安全技术有限公司 Method and device for detecting abnormal outgoing behavior of intranet user
CN109862003A (en) * 2019-01-24 2019-06-07 深信服科技股份有限公司 Local generation method, device, system and the storage medium for threatening information bank
CN109862003B (en) * 2019-01-24 2022-02-22 深信服科技股份有限公司 Method, device, system and storage medium for generating local threat intelligence library
CN110149303A (en) * 2019-03-27 2019-08-20 李登峻 A kind of network safety pre-warning method and early warning system of Party school
CN110149303B (en) * 2019-03-27 2022-07-15 李登峻 Party-school network security early warning method and early warning system
CN110708296A (en) * 2019-09-19 2020-01-17 中国电子科技网络信息安全有限公司 VPN account number collapse intelligent detection model based on long-time behavior analysis
CN110708296B (en) * 2019-09-19 2022-03-18 中国电子科技网络信息安全有限公司 VPN account number collapse intelligent detection model based on long-time behavior analysis
CN110708315A (en) * 2019-10-09 2020-01-17 杭州安恒信息技术股份有限公司 Asset vulnerability identification method, device and system
CN110730175A (en) * 2019-10-16 2020-01-24 杭州安恒信息技术股份有限公司 Botnet detection method and detection system based on threat information
CN110719291A (en) * 2019-10-16 2020-01-21 杭州安恒信息技术股份有限公司 Network threat identification method and identification system based on threat information
CN110830470A (en) * 2019-11-06 2020-02-21 浙江军盾信息科技有限公司 Method, device and equipment for detecting defect-losing host and readable storage medium
CN110830470B (en) * 2019-11-06 2022-02-01 杭州安恒信息安全技术有限公司 Method, device and equipment for detecting defect-losing host and readable storage medium
CN110875928A (en) * 2019-11-14 2020-03-10 北京神州绿盟信息安全科技股份有限公司 Attack tracing method, device, medium and equipment
CN110958251A (en) * 2019-12-04 2020-04-03 中电福富信息科技有限公司 Method and device for detecting and backtracking lost host based on real-time stream processing
CN113141335B (en) * 2020-01-19 2022-10-28 奇安信科技集团股份有限公司 Network attack detection method and device
CN113141335A (en) * 2020-01-19 2021-07-20 奇安信科技集团股份有限公司 Network attack detection method and device
CN113497784A (en) * 2020-03-20 2021-10-12 中国电信股份有限公司 Method, apparatus and computer readable storage medium for detecting intelligence data
CN112073389A (en) * 2020-08-21 2020-12-11 苏州浪潮智能科技有限公司 Cloud host security situation awareness system, method, device and storage medium
CN112073389B (en) * 2020-08-21 2023-01-24 苏州浪潮智能科技有限公司 Cloud host security situation awareness system, method, device and storage medium
CN112153062A (en) * 2020-09-27 2020-12-29 北京北信源软件股份有限公司 Multi-dimension-based suspicious terminal equipment detection method and system
CN112153062B (en) * 2020-09-27 2023-02-21 北京北信源软件股份有限公司 Multi-dimension-based suspicious terminal equipment detection method and system
CN112487321A (en) * 2020-12-08 2021-03-12 北京天融信网络安全技术有限公司 Detection method, detection device, storage medium and electronic equipment
CN114006802B (en) * 2021-09-14 2023-11-21 上海纽盾科技股份有限公司 Situation awareness prediction method, device and system for collapse equipment
CN113904920A (en) * 2021-09-14 2022-01-07 上海纽盾科技股份有限公司 Network security defense method, device and system based on lost equipment
CN114006802A (en) * 2021-09-14 2022-02-01 上海纽盾科技股份有限公司 Situation awareness prediction method, device and system for equipment with failure
CN113904920B (en) * 2021-09-14 2023-10-03 上海纽盾科技股份有限公司 Network security defense method, device and system based on collapse equipment
CN113852615A (en) * 2021-09-15 2021-12-28 广东电力信息科技有限公司 Method and device for monitoring lost host in multi-stage DNS (Domain name System) environment
CN115021978A (en) * 2022-05-17 2022-09-06 云盾智慧安全科技有限公司 Attack path prediction method and device, electronic equipment and storage medium
CN115021978B (en) * 2022-05-17 2023-11-24 云盾智慧安全科技有限公司 Attack path prediction method, device, electronic equipment and storage medium
CN115643120A (en) * 2022-12-26 2023-01-24 国联江森自控绿色科技(无锡)有限公司 Control system for exception self-processing of new energy management platform
CN115643120B (en) * 2022-12-26 2023-04-11 国联江森自控绿色科技(无锡)有限公司 Control system for exception self-processing of new energy management platform

Similar Documents

Publication Publication Date Title
CN108965346A (en) One kind is fallen Host Detection method
CN108259449B (en) Method and system for defending against APT (android packet) attack
Ashoor et al. Importance of intrusion detection system (IDS)
CN106027559B (en) Large scale network scanning detection method based on network session statistical nature
CN105915532B (en) A kind of recognition methods of host of falling and device
US20140283064A1 (en) Network attack offensive appliance
Kumar et al. Intrusion detection systems: a review
Ramamoorthi et al. Real time detection and classification of DDoS attacks using enhanced SVM with string kernels
Chen et al. Intrusion detection
Nicholson et al. A taxonomy of technical attribution techniques for cyber attacks
Nijim et al. FastDetict: A data mining engine for predecting and preventing DDoS attacks
Bartwal et al. Security orchestration, automation, and response engine for deployment of behavioural honeypots
CN114915493B (en) Trapping deployment method based on network attack of power monitoring system
Thu Integrated intrusion detection and prevention system with honeypot on cloud computing environment
Rutherford et al. Using an improved cybersecurity kill chain to develop an improved honey community
Morozov et al. Honeypot and cyber deception as a tool for detecting cyber attacks on critical infrastructure.
Patel et al. An architecture of hybrid intrusion detection system
Hammadeh et al. Unraveling Ransomware: Detecting Threats with Advanced Machine Learning Algorithms
Beigh et al. Performance evaluation of different intrusion detection system: An empirical approach
Mehta et al. Cowrie honeypot data analysis and predicting the directory traverser pattern during the attack
Narote et al. Detection of DDoS Attacks using Concepts of Machine Learning
Beqiri Neural networks for intrusion detection systems
Gavrilovic et al. Snort IDS system visualization interface for alert analysis
Sharma et al. A Comprehensive Analysis of Exploring SDN-Enabled Honeypots for IoT Security
Gu et al. Misleading and defeating importance-scanning malware propagation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181207