CN110266670A - A kind of processing method and processing device of terminal network external connection behavior - Google Patents

A kind of processing method and processing device of terminal network external connection behavior Download PDF

Info

Publication number
CN110266670A
CN110266670A CN201910493269.0A CN201910493269A CN110266670A CN 110266670 A CN110266670 A CN 110266670A CN 201910493269 A CN201910493269 A CN 201910493269A CN 110266670 A CN110266670 A CN 110266670A
Authority
CN
China
Prior art keywords
threat
daily record
data
information
record data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910493269.0A
Other languages
Chinese (zh)
Inventor
史振辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN201910493269.0A priority Critical patent/CN110266670A/en
Publication of CN110266670A publication Critical patent/CN110266670A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The present invention relates to financial technology fields, and disclose a kind of processing method and processing device of terminal network external connection behavior, this method includes obtaining the daily record data and the threat information data for threatening information platform to send that terminal is sent, threatening information data includes the corresponding threat menace level of each data, by the daily record data and information data is threatened to carry out alarm regulation matching, if successful match, by the daily record data of successful match according to its corresponding processing for threatening menace level to carry out external connection behavior.In conjunction with threatening the threat information data of information platform to be associated analysis to daily record data, the processing of external connection behavior is carried out to matched daily record data, to realize the automatic interception to hostile network external connection flow.

Description

A kind of processing method and processing device of terminal network external connection behavior
Technical field
The present embodiments relate to the financial technology field (Fintech) more particularly to a kind of terminal network external connection behaviors Processing method and processing device.
Background technique
With the development of computer technology, more and more technical applications are in financial field, and traditional financial industry is gradually To financial technology (Fintech) change, message memory technology is no exception, but due to finance, payment industry safety, in real time Property require, also to technology propose higher requirement.
Currently, the office terminal in enterprise faces the threat from outer net often, such as the automatic mutation hidden in computer Rogue program etc. can be periodically attached with hacker's control server of outer net around the inspection of local antivirus software, thus by Hacker's control, and then launch a offensive behavior to corporate intranet or other outer nets.
The root of malicious network traffic external connection can not be often found out by the interception of network level, rogue program may connect IP, the domain name not being intercepted to other are to continue to do evil, therefore, it is impossible to block to having found that malicious network traffic automate It cuts.
Summary of the invention
The embodiment of the present invention provides a kind of processing method and processing device of terminal network external connection behavior, to find out hostile network The root of flow external connection, to realize the automatic interception to malicious network traffic.
In a first aspect, a kind of processing method of terminal network external connection behavior provided in an embodiment of the present invention, comprising:
Obtain the daily record data and the threat information data for threatening information platform to send that terminal is sent;The threat information number According to including the corresponding threat menace level of each data;
The daily record data and the threat information data are subjected to alarm regulation matching, it, will matching if successful match Successful daily record data is according to its corresponding processing for threatening menace level to carry out external connection behavior.
In above-mentioned technical proposal, analysis is associated to daily record data in conjunction with the threat information data of threat information platform, The processing of external connection behavior is carried out to matched daily record data, to realize the automatic interception to hostile network external connection flow.
Optionally, after obtaining the threat information data for threatening information platform to send, further includes:
The threat information data is classified according to preset format, and is indexed filing;
Wherein, the preset format may include one of following information or any combination:
It was found that date, threat information beacon, threat types, threat menace level.
Optionally, the daily record data that the terminal is sent is that the log server in the terminal is received according to preset log What collection rule was sent after collecting.
It is optionally, described that the daily record data and the threat information data are subjected to alarm regulation matching, comprising:
By the daily record data and the threat information data according to the threat keyword progress in the alarm regulation Match;Wherein, the threat keyword in the alarm regulation is to threaten information data to determine according to history.
Optionally, the daily record data by successful match carries out external connection behavior according to its corresponding threat menace level Processing, comprising:
If the corresponding threat menace level of the daily record data of the successful match is serious or high-risk grade, outside surrounding edge Boundary's firewall sends a warning message and Security Officer is notified to handle, and the warning information includes outlet IP, domain name or network address Link, so that the peripheral boundary firewall is intercepted according to the warning information;
If the corresponding threat menace level of the daily record data of the successful match is middle danger or low danger grade, described in notice Security Officer is handled.
Second aspect, the embodiment of the invention provides a kind of processing units of terminal network external connection behavior, comprising:
Acquiring unit, the threat information data for obtaining the daily record data of terminal transmission and information platform being threatened to send; The threat information data includes the corresponding threat menace level of each data;
Processing unit, for the daily record data and the threat information data to be carried out alarm regulation matching, if matching Success, then by the daily record data of successful match according to its corresponding processing for threatening menace level to carry out external connection behavior.
Optionally, the processing unit is also used to:
After obtaining the threat information data for threatening information platform to send, according to preset format by the threat feelings Count off is indexed filing according to classifying;
Wherein, the preset format may include one of following information or any combination:
It was found that date, threat information beacon, threat types, threat menace level.
Optionally, the daily record data that the terminal is sent is that the log server in the terminal is received according to preset log What collection rule was sent after collecting.
Optionally, the processing unit is specifically used for:
By the daily record data and the threat information data according to the threat keyword progress in the alarm regulation Match;Wherein, the threat keyword in the alarm regulation is to threaten information data to determine according to history.
Optionally, the processing unit is specifically used for:
If the corresponding threat menace level of the daily record data of the successful match is serious or high-risk grade, outside surrounding edge Boundary's firewall sends a warning message and Security Officer is notified to handle, and the warning information includes outlet IP, domain name or network address Link, so that the peripheral boundary firewall is intercepted according to the warning information;
If the corresponding threat menace level of the daily record data of the successful match is middle danger or low danger grade, described in notice Security Officer is handled.
The third aspect, the embodiment of the invention also provides a kind of calculating equipment, comprising:
Memory, for storing program instruction;
Processor executes above-mentioned terminal according to the program of acquisition for calling the program instruction stored in the memory The processing method of network external connection behavior.
Fourth aspect, the embodiment of the invention also provides a kind of computer-readable non-volatile memory mediums, including calculate Machine readable instruction, when computer is read and executes the computer-readable instruction, so that computer executes above-mentioned terminal network The processing method of external connection behavior.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of schematic diagram of system architecture provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the processing method of terminal network external connection behavior provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of the processing method of terminal network external connection behavior provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of the processing unit of terminal network external connection behavior provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
Fig. 1 illustratively shows a kind of system architecture that the embodiment of the present invention is applicable in, which can be clothes Business device 100, including processor 110, communication interface 120 and memory 130.The server 100 can be data analytics server.
Wherein, communication interface 120 is used to be communicated with terminal and threat information platform, receives and dispatches the terminal and threatens information The information of platform transmission, realizes communication.
Processor 110 is the control centre of server 100, connects entire server 100 with route using various interfaces Various pieces by running or execute the software program/or module that are stored in memory 130, and are called and are stored in storage Data in device 130, the various functions and processing data of execute server 100.Optionally, processor 110 may include one Or multiple processing units.
Memory 130 can be used for storing software program and module, and processor 110 is stored in memory 130 by operation Software program and module, thereby executing various function application and data processing.Memory 130 can mainly include storage journey Sequence area and storage data area, wherein storing program area can application program needed for storage program area, at least one function etc.; Storage data area can store the data etc. created according to business processing.In addition, memory 130 may include high random access Memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other are volatile Property solid-state memory.
It should be noted that above-mentioned structure shown in FIG. 1 is only a kind of example, it is not limited in the embodiment of the present invention.
Based on foregoing description, Fig. 2 illustratively shows a kind of terminal network external connection behavior provided in an embodiment of the present invention Processing method process, which can be executed by the processing unit of terminal network external connection behavior, which can be in Fig. 1 Shown in server 100, or be located at server 100 in.
As shown in Fig. 2, the process specifically includes:
Step 201, the daily record data and the threat information data for threatening information platform to send that terminal is sent are obtained.
In embodiments of the present invention, the threat information data for threatening information platform to send is being received, it can also be according to pre- If format classifies the threat information data, and is indexed filing.The preset format may include following information it One or any combination: the discovery date threatens information beacon, threat types, threatens menace level etc. information.Threaten information beacon It refers to being applied to computer forensics, refers to observable in a network or system and high confidence level the computer intrusion that shows Workpiece, such as IP address, domain name, hash malicious file, virus signature etc..It, can be according to database when being indexed filing Indexed mode is filed, and the modes such as concordance list are established.The threat information platform can (malware information be shared flat for MISP Platform).
The daily record data that terminal is sent is sent out after the log server in terminal is collected according to preset log collection rule It send.The default log collection rule can empirically be arranged either human configuration, for example, can for sampling prescription, on Class's typing rule etc..Log server can be Microsoft's log server WEC.
It in the specific implementation process, can be by installing Microsoft log collection program Sysmon and default log at the terminal Collection Rules, by terminal process creation log and process network external connection log upload to Microsoft's log collecting server in real time WEC, the log transmission that Microsoft's log server WEC in real time receives terminal later to data analytics server Splunk carry out rope Draw filing.
Step 202, the daily record data and the threat information data are subjected to alarm regulation matching, if successful match, Then by the daily record data of successful match according to its corresponding processing for threatening menace level to carry out external connection behavior.
After receiving daily record data and threatening information data, so that it may alarm regulation matching is carried out, specifically, can be with By daily record data and information data is threatened to match according to the threat keyword in alarm regulation.It should be noted that the announcement Police regulations then in threat keyword be according to history threaten information data determine.For example, a certain have the IP threatened, a certain prestige Side of body type, website links of a certain threat etc. can be determined as keyword.Only when all keywords all successful match Show alarm regulation successful match, be otherwise exactly match it is unsuccessful.When carrying out alarm regulation matching, white name can also be set Single, corresponding daily record data is without processing in white list.
After confirming alarm regulation successful match, so that it may by the daily record data of successful match according to its corresponding threat The processing of menace level progress external connection behavior.
Specifically, when the corresponding threat menace level of the daily record data of successful match is serious or high-risk grade, outward It encloses perimeter firewall to send a warning message and Security Officer is notified to handle, which includes outlet IP, domain name or net Location link, so that peripheral boundary firewall is intercepted according to the warning information.
When the corresponding threat menace level of the daily record data of successful match is middle danger or low danger grade, Security Officer is notified It is handled.
Embodiment in order to preferably explain the present invention will describe terminal network external connection under specific implement scene below The process of the processing of behavior.
The process can be divided into following part and is described by process as shown in Figure 3:
First part threatens information acquisition: threatening the threat information data in the information platform periodic synchronization whole world (can flexibly match Set commercial or open source), by the threats information data received carry out unified format data classification (format is " it was found that date ", " threatening information beacon ", " threat types ", " threatening menace level " etc.), and real-time data transmission will be collected into and analyzed to data Server S plunk is indexed filing.
Second part, terminal log collection: by installing Microsoft's log collection programming system monitor at the terminal (Sysmon) and configuration log Collection Rules, by terminal process creation log and process network external connection log upload in real time Microsoft log collecting server WEC, the log transmission that Microsoft's log server WEC in real time receives terminal later to data are analyzed Server S plunk is indexed filing.
Part III, data analysis: data analytics server Splunk is responsible for the threat information data collection and end that will be received It holds log data set to carry out accurate alarm regulation matching, risk is carried out according to threat menace level after matching alarm regulation and is commented Grade directs out net perimeter firewall and sends interception order and notify safe fortune when risk rating is serious or high-risk grade Battalion personnel do not notify firewall to intercept when risk rating is middle danger or low danger grade, directly notice safe operation personnel.
Part IV, outer net perimeter firewall intercept automatically: when outer net perimeter firewall is received from data analysis service The warning information of device Splunk and be serious, high-risk threat menace level when, automatically create intercept warning information in outlet IP, domain name or website links notify safe operation personnel processing later.
Part V, safe operation personnel operation: when safe operation personnel receive from data analytics server Splunk Alarm when, can precise positioning initiate hostile network external connection terminal process or process recalls information, to be deleted, be unloaded Hidden danger is eliminated in equal operations.
Above-described embodiment obtains the process creations of all terminals of Intranet by Sysmon log collection tool, outside process network The logs such as connection, then information log is threatened by threatening shared platform MISP to collect whole world open source, then the log on both sides is put in storage It is associated the matching analysis to big data platform Splunk, when hitting alarm regulation, result is fed back into the fire prevention of outer net boundary Wall carries out automation interception, finally safe operation personnel is notified to carry out safety inspection to terminal.It realizes to need to be deep into terminal In equipment, the process and process recalls information for initiating hostile network external connection are found, to pull the grass up by its roots, eliminates security risk.
The embodiment of the present invention can be applied to the field financial technology (Fintech), and financial technology field refers to information skill After art incorporates financial field, it is a kind of new Creative Science and Technology Co. Ltd of financial field bring, is assisted by using advanced information technology It realizes that financial operation, transaction execute and financial system is improved, treatment effeciency, the business scale of financial system can be promoted, and Cost and financial risks can be reduced.
The embodiment of the present invention shows to obtain the daily record data and the threat information number for threatening information platform to send that terminal is sent According to threatening information data includes the corresponding threat menace level of each data, by the daily record data and information data is threatened to carry out Alarm regulation matching, it is if successful match, the daily record data of successful match is outer according to its corresponding threat menace level progress The processing of connection behavior.In conjunction with threatening the threat information data of information platform to be associated analysis to daily record data, to matched day Will data carry out the processing of external connection behavior, to realize the automatic interception to hostile network external connection flow.
Based on the same technical idea, Fig. 4 is illustratively shown outside a kind of terminal network provided in an embodiment of the present invention The structure of the processing unit of connection behavior, the device can execute the process of the processing of terminal network external connection behavior.The device can be with For server 100 shown in Fig. 1, or it is located in server 100.
As shown in figure 4, the device specifically includes:
Acquiring unit 401, the threat information number for obtaining the daily record data of terminal transmission and information platform being threatened to send According to;The threat information data includes the corresponding threat menace level of each data;
Processing unit 402, for the daily record data and the threat information data to be carried out alarm regulation matching, if With success, then by the daily record data of successful match according to its corresponding processing for threatening menace level to carry out external connection behavior.
Optionally, the processing unit 402 is also used to:
After obtaining the threat information data for threatening information platform to send, according to preset format by the threat feelings Count off is indexed filing according to classifying;
Wherein, the preset format may include one of following information or any combination:
It was found that date, threat information beacon, threat types, threat menace level.
Optionally, the daily record data that the terminal is sent is that the log server in the terminal is received according to preset log What collection rule was sent after collecting.
Optionally, the processing unit 402 is specifically used for:
By the daily record data and the threat information data according to the threat keyword progress in the alarm regulation Match;Wherein, the threat keyword in the alarm regulation is to threaten information data to determine according to history.
Optionally, the processing unit 402 is specifically used for:
If the corresponding threat menace level of the daily record data of the successful match is serious or high-risk grade, outside surrounding edge Boundary's firewall sends a warning message and Security Officer is notified to handle, and the warning information includes outlet IP, domain name or network address Link, so that the peripheral boundary firewall is intercepted according to the warning information;
If the corresponding threat menace level of the daily record data of the successful match is middle danger or low danger grade, described in notice Security Officer is handled.
Based on the same technical idea, the embodiment of the invention also provides a kind of calculating equipment, comprising:
Memory, for storing program instruction;
Processor executes above-mentioned terminal according to the program of acquisition for calling the program instruction stored in the memory The processing method of network external connection behavior.
Based on the same technical idea, the embodiment of the invention also provides a kind of computer-readable non-volatile memories to be situated between Matter, including computer-readable instruction, when computer is read and executes the computer-readable instruction, so that computer executes State the processing method of terminal network external connection behavior.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (12)

1. a kind of processing method of terminal network external connection behavior characterized by comprising
Obtain the daily record data and the threat information data for threatening information platform to send that terminal is sent;The threat information data packet Include the corresponding threat menace level of each data;
The daily record data and the threat information data are subjected to alarm regulation matching, if successful match, by successful match Daily record data according to its it is corresponding threaten menace level carry out external connection behavior processing.
2. the method as described in claim 1, which is characterized in that obtaining the threat information number for threatening information platform to send According to later, further includes:
The threat information data is classified according to preset format, and is indexed filing;
Wherein, the preset format may include one of following information or any combination:
It was found that date, threat information beacon, threat types, threat menace level.
3. the method as described in claim 1, which is characterized in that the daily record data that the terminal is sent is the day in the terminal What will server was sent after being collected according to preset log collection rule.
4. the method as described in claim 1, which is characterized in that it is described by the daily record data and the threat information data into The matching of row alarm regulation, comprising:
The daily record data and the threat information data are matched according to the threat keyword in the alarm regulation;Its In, the threat keyword in the alarm regulation is to threaten information data to determine according to history.
5. the method as described in claim 1, which is characterized in that the daily record data by successful match is according to its corresponding prestige Coerce the processing that menace level carries out external connection behavior, comprising:
If the corresponding threat menace level of the daily record data of the successful match is serious or high-risk grade, boundary is anti-to the periphery Wall with flues sends a warning message and Security Officer is notified to handle, and the warning information includes exporting IP, domain name or website links, So that the peripheral boundary firewall is intercepted according to the warning information;
If the corresponding threat menace level of the daily record data of the successful match is middle danger or low danger grade, the safety is notified Personnel are handled.
6. a kind of processing unit of terminal network external connection behavior characterized by comprising
Acquiring unit, the threat information data for obtaining the daily record data of terminal transmission and information platform being threatened to send;It is described Threatening information data includes the corresponding threat menace level of each data;
Processing unit, for the daily record data and the threat information data to be carried out alarm regulation matching, if successful match, Then by the daily record data of successful match according to its corresponding processing for threatening menace level to carry out external connection behavior.
7. device as claimed in claim 6, which is characterized in that the processing unit is also used to:
After obtaining the threat information data for threatening information platform to send, according to preset format by the threat information number According to classifying, and it is indexed filing;
Wherein, the preset format may include one of following information or any combination:
It was found that date, threat information beacon, threat types, threat menace level.
8. device as claimed in claim 6, which is characterized in that the daily record data that the terminal is sent is the day in the terminal What will server was sent after being collected according to preset log collection rule.
9. device as claimed in claim 6, which is characterized in that the processing unit is specifically used for:
The daily record data and the threat information data are matched according to the threat keyword in the alarm regulation;Its In, the threat keyword in the alarm regulation is to threaten information data to determine according to history.
10. device as claimed in claim 6, which is characterized in that the processing unit is specifically used for:
If the corresponding threat menace level of the daily record data of the successful match is serious or high-risk grade, boundary is anti-to the periphery Wall with flues sends a warning message and Security Officer is notified to handle, and the warning information includes exporting IP, domain name or website links, So that the peripheral boundary firewall is intercepted according to the warning information;
If the corresponding threat menace level of the daily record data of the successful match is middle danger or low danger grade, the safety is notified Personnel are handled.
11. a kind of calculating equipment characterized by comprising
Memory, for storing program instruction;
Processor requires 1 to 5 according to the program execution benefit of acquisition for calling the program instruction stored in the memory Described in any item methods.
12. a kind of computer-readable non-volatile memory medium, which is characterized in that including computer-readable instruction, work as computer When reading and executing the computer-readable instruction, so that computer executes such as method described in any one of claim 1 to 5.
CN201910493269.0A 2019-06-06 2019-06-06 A kind of processing method and processing device of terminal network external connection behavior Pending CN110266670A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910493269.0A CN110266670A (en) 2019-06-06 2019-06-06 A kind of processing method and processing device of terminal network external connection behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910493269.0A CN110266670A (en) 2019-06-06 2019-06-06 A kind of processing method and processing device of terminal network external connection behavior

Publications (1)

Publication Number Publication Date
CN110266670A true CN110266670A (en) 2019-09-20

Family

ID=67917249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910493269.0A Pending CN110266670A (en) 2019-06-06 2019-06-06 A kind of processing method and processing device of terminal network external connection behavior

Country Status (1)

Country Link
CN (1) CN110266670A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912889A (en) * 2019-11-22 2020-03-24 上海交通大学 Network attack detection system and method based on intelligent threat intelligence
CN111277585A (en) * 2020-01-16 2020-06-12 深信服科技股份有限公司 Threat processing method, device, equipment and readable storage medium
CN111740855A (en) * 2020-05-06 2020-10-02 首都师范大学 Risk identification method, device and equipment based on data migration and storage medium
CN112165451A (en) * 2020-08-31 2021-01-01 新浪网技术(中国)有限公司 APT attack analysis method, system and server
CN113672939A (en) * 2021-08-23 2021-11-19 杭州安恒信息技术股份有限公司 Method, device, equipment and medium for analyzing terminal behavior alarm traceability
CN113904920A (en) * 2021-09-14 2022-01-07 上海纽盾科技股份有限公司 Network security defense method, device and system based on lost equipment
CN114006723A (en) * 2021-09-14 2022-02-01 上海纽盾科技股份有限公司 Network security prediction method, device and system based on threat intelligence
CN114338237A (en) * 2022-03-01 2022-04-12 中国工商银行股份有限公司 Terminal behavior monitoring method, device, equipment, medium and computer program product
CN114598513A (en) * 2022-02-24 2022-06-07 烽台科技(北京)有限公司 Industrial control threat event response method and device, industrial control equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131078A (en) * 2016-08-29 2016-11-16 联动优势科技有限公司 A kind of method and device processing service request
CN107819783A (en) * 2017-11-27 2018-03-20 深信服科技股份有限公司 A kind of network security detection method and system based on threat information
CN108460278A (en) * 2018-02-13 2018-08-28 北京奇安信科技有限公司 A kind of threat information processing method and device
CN108763031A (en) * 2018-04-08 2018-11-06 北京奇安信科技有限公司 A kind of threat information detection method and device based on daily record

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131078A (en) * 2016-08-29 2016-11-16 联动优势科技有限公司 A kind of method and device processing service request
CN107819783A (en) * 2017-11-27 2018-03-20 深信服科技股份有限公司 A kind of network security detection method and system based on threat information
CN108460278A (en) * 2018-02-13 2018-08-28 北京奇安信科技有限公司 A kind of threat information processing method and device
CN108763031A (en) * 2018-04-08 2018-11-06 北京奇安信科技有限公司 A kind of threat information detection method and device based on daily record

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912889A (en) * 2019-11-22 2020-03-24 上海交通大学 Network attack detection system and method based on intelligent threat intelligence
CN110912889B (en) * 2019-11-22 2021-08-20 上海交通大学 Network attack detection system and method based on intelligent threat intelligence
CN111277585A (en) * 2020-01-16 2020-06-12 深信服科技股份有限公司 Threat processing method, device, equipment and readable storage medium
CN111740855A (en) * 2020-05-06 2020-10-02 首都师范大学 Risk identification method, device and equipment based on data migration and storage medium
CN112165451A (en) * 2020-08-31 2021-01-01 新浪网技术(中国)有限公司 APT attack analysis method, system and server
CN113672939A (en) * 2021-08-23 2021-11-19 杭州安恒信息技术股份有限公司 Method, device, equipment and medium for analyzing terminal behavior alarm traceability
CN113904920A (en) * 2021-09-14 2022-01-07 上海纽盾科技股份有限公司 Network security defense method, device and system based on lost equipment
CN114006723A (en) * 2021-09-14 2022-02-01 上海纽盾科技股份有限公司 Network security prediction method, device and system based on threat intelligence
CN114006723B (en) * 2021-09-14 2023-08-18 上海纽盾科技股份有限公司 Network security prediction method, device and system based on threat information
CN113904920B (en) * 2021-09-14 2023-10-03 上海纽盾科技股份有限公司 Network security defense method, device and system based on collapse equipment
CN114598513A (en) * 2022-02-24 2022-06-07 烽台科技(北京)有限公司 Industrial control threat event response method and device, industrial control equipment and medium
CN114338237A (en) * 2022-03-01 2022-04-12 中国工商银行股份有限公司 Terminal behavior monitoring method, device, equipment, medium and computer program product
CN114338237B (en) * 2022-03-01 2024-02-02 中国工商银行股份有限公司 Terminal behavior monitoring method, device, equipment, medium and computer program product

Similar Documents

Publication Publication Date Title
CN110266670A (en) A kind of processing method and processing device of terminal network external connection behavior
US10498744B2 (en) Integrity monitoring in a local network
US20200412767A1 (en) Hybrid system for the protection and secure data transportation of convergent operational technology and informational technology networks
US9853941B2 (en) Security information and event management
US20220224723A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
CN102594623B (en) The data detection method of fire compartment wall and device
CN111866016B (en) Log analysis method and system
CN110210213B (en) Method and device for filtering malicious sample, storage medium and electronic device
CN104509034A (en) Pattern consolidation to identify malicious activity
CN110149319B (en) APT organization tracking method and device, storage medium and electronic device
EP2936772B1 (en) Network security management
CN113810408B (en) Network attack organization detection method, device, equipment and readable storage medium
CN110149318B (en) Mail metadata processing method and device, storage medium and electronic device
CN115941317A (en) Network security comprehensive analysis and situation awareness platform
RU2481633C2 (en) System and method for automatic investigation of safety incidents
CN110224975B (en) APT information determination method and device, storage medium and electronic device
US20210377313A1 (en) Threat Mitigation System and Method
CN116089940A (en) Multi-source security threat detection method and device
CN114363053A (en) Attack identification method and device and related equipment
CN111209171A (en) Closed loop handling method and device for security risk and storage medium
CN112769599B (en) Automatic resource access method, system and readable storage medium
US20240064163A1 (en) System and method for risk-based observability of a computing platform
CN117061159A (en) Fishing mail interception method and device
CN115994356A (en) Attack identification method and related equipment
CN112953954A (en) Industrial internet security capability arranging method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination