CN114553596A - 适用于网络安全的多维度安全情况实时展现方法及系统 - Google Patents
适用于网络安全的多维度安全情况实时展现方法及系统 Download PDFInfo
- Publication number
- CN114553596A CN114553596A CN202210422964.XA CN202210422964A CN114553596A CN 114553596 A CN114553596 A CN 114553596A CN 202210422964 A CN202210422964 A CN 202210422964A CN 114553596 A CN114553596 A CN 114553596A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- test
- node
- processing
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000012545 processing Methods 0.000 claims abstract description 314
- 238000012360 testing method Methods 0.000 claims abstract description 285
- 238000012544 monitoring process Methods 0.000 claims abstract description 236
- 238000012549 training Methods 0.000 claims abstract description 54
- 238000011076 safety test Methods 0.000 claims abstract description 50
- 230000006399 behavior Effects 0.000 claims description 41
- 238000000926 separation method Methods 0.000 claims description 31
- 238000012163 sequencing technique Methods 0.000 claims description 29
- 230000001960 triggered effect Effects 0.000 claims description 26
- 230000008569 process Effects 0.000 description 17
- 238000012423 maintenance Methods 0.000 description 9
- 238000001514 detection method Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000013100 final test Methods 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000001965 increasing effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000010187 selection method Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000035622 drinking Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210422964.XA CN114553596B (zh) | 2022-04-21 | 2022-04-21 | 适用于网络安全的多维度安全情况实时展现方法及系统 |
US18/104,431 US11777982B1 (en) | 2022-04-21 | 2023-02-01 | Multidimensional security situation real-time representation method and system and applicable to network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210422964.XA CN114553596B (zh) | 2022-04-21 | 2022-04-21 | 适用于网络安全的多维度安全情况实时展现方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114553596A true CN114553596A (zh) | 2022-05-27 |
CN114553596B CN114553596B (zh) | 2022-07-19 |
Family
ID=81666985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210422964.XA Active CN114553596B (zh) | 2022-04-21 | 2022-04-21 | 适用于网络安全的多维度安全情况实时展现方法及系统 |
Country Status (2)
Country | Link |
---|---|
US (1) | US11777982B1 (zh) |
CN (1) | CN114553596B (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114756477A (zh) * | 2022-06-13 | 2022-07-15 | 南京讯优智超软件科技有限公司 | 融合客户行为回放的多维测试方法及系统 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117675523B (zh) * | 2024-02-03 | 2024-05-03 | 北京中科网芯科技有限公司 | 基于风险预测的网络通信管理方法及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231686A (zh) * | 2011-06-24 | 2011-11-02 | 北京天融信科技有限公司 | 一种实现网络安全设备自动化测试的系统和方法 |
WO2014088912A1 (en) * | 2012-12-06 | 2014-06-12 | The Boeing Company | Context aware network security monitoring for threat detection |
CN107835982A (zh) * | 2015-05-04 | 2018-03-23 | 赛义德·卡姆兰·哈桑 | 用于在计算机网络中管理安全性的方法和设备 |
WO2019060327A1 (en) * | 2017-09-20 | 2019-03-28 | University Of Utah Research Foundation | ONLINE DETECTION OF ANOMALIES IN A NEWSPAPER USING AUTOMATIC APPRENTICESHIP |
US10462170B1 (en) * | 2016-11-21 | 2019-10-29 | Alert Logic, Inc. | Systems and methods for log and snort synchronized threat detection |
CN113487010A (zh) * | 2021-05-21 | 2021-10-08 | 国网浙江省电力有限公司杭州供电公司 | 基于机器学习的电网网络安全事件分析方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220014560A1 (en) * | 2015-10-28 | 2022-01-13 | Qomplx, Inc. | Correlating network event anomalies using active and passive external reconnaissance to identify attack information |
US10542021B1 (en) * | 2016-06-20 | 2020-01-21 | Amazon Technologies, Inc. | Automated extraction of behavioral profile features |
US11520901B2 (en) * | 2018-12-26 | 2022-12-06 | Jfrog Ltd | Detecting firmware vulnerabilities |
US11481486B2 (en) * | 2019-03-27 | 2022-10-25 | Webroot Inc. | Behavioral threat detection engine |
US11080394B2 (en) * | 2019-03-27 | 2021-08-03 | Webroot Inc. | Behavioral threat detection virtual machine |
WO2020205974A1 (en) * | 2019-04-02 | 2020-10-08 | Siemens Aktiengesellschaft | User behavorial analytics for security anomaly detection in industrial control systems |
US10701096B1 (en) * | 2019-09-23 | 2020-06-30 | Adlumin, Inc. | Systems and methods for anomaly detection on core banking systems |
US11133989B2 (en) * | 2019-12-20 | 2021-09-28 | Shoreline Software, Inc. | Automated remediation and repair for networked environments |
JP7255710B2 (ja) * | 2019-12-25 | 2023-04-11 | 株式会社デンソー | 攻撃監視用センター装置、及び攻撃監視用端末装置 |
US11650892B1 (en) * | 2021-04-08 | 2023-05-16 | Spirent Communications, Inc. | Resilient coordination, command, and control of widely distributed test agents |
-
2022
- 2022-04-21 CN CN202210422964.XA patent/CN114553596B/zh active Active
-
2023
- 2023-02-01 US US18/104,431 patent/US11777982B1/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231686A (zh) * | 2011-06-24 | 2011-11-02 | 北京天融信科技有限公司 | 一种实现网络安全设备自动化测试的系统和方法 |
WO2014088912A1 (en) * | 2012-12-06 | 2014-06-12 | The Boeing Company | Context aware network security monitoring for threat detection |
CN107835982A (zh) * | 2015-05-04 | 2018-03-23 | 赛义德·卡姆兰·哈桑 | 用于在计算机网络中管理安全性的方法和设备 |
US10462170B1 (en) * | 2016-11-21 | 2019-10-29 | Alert Logic, Inc. | Systems and methods for log and snort synchronized threat detection |
WO2019060327A1 (en) * | 2017-09-20 | 2019-03-28 | University Of Utah Research Foundation | ONLINE DETECTION OF ANOMALIES IN A NEWSPAPER USING AUTOMATIC APPRENTICESHIP |
CN113487010A (zh) * | 2021-05-21 | 2021-10-08 | 国网浙江省电力有限公司杭州供电公司 | 基于机器学习的电网网络安全事件分析方法 |
Non-Patent Citations (1)
Title |
---|
张文琦等: "《基于多维时序日志的异常行为可视分析》", 《计算机工程与应用》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114756477A (zh) * | 2022-06-13 | 2022-07-15 | 南京讯优智超软件科技有限公司 | 融合客户行为回放的多维测试方法及系统 |
CN114756477B (zh) * | 2022-06-13 | 2022-09-02 | 南京讯优智超软件科技有限公司 | 融合客户行为回放的多维测试方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN114553596B (zh) | 2022-07-19 |
US11777982B1 (en) | 2023-10-03 |
US20230344857A1 (en) | 2023-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111859400B (zh) | 风险评估方法、装置、计算机系统和介质 | |
CN114553596B (zh) | 适用于网络安全的多维度安全情况实时展现方法及系统 | |
US10592308B2 (en) | Aggregation based event identification | |
US7096499B2 (en) | Method and system for simplifying the structure of dynamic execution profiles | |
US7185367B2 (en) | Method and system for establishing normal software system behavior and departures from normal behavior | |
US6681331B1 (en) | Dynamic software system intrusion detection | |
US20190207981A1 (en) | Control maturity assessment in security operations environments | |
US20200042700A1 (en) | Automated threat alert triage via data provenance | |
AU2019307885B2 (en) | Systems and methods for reporting computer security incidents | |
CN108259202A (zh) | 一种ca监测预警方法和ca监测预警系统 | |
CN105825130B (zh) | 一种信息安全预警方法及装置 | |
CN117421761A (zh) | 一种数据库数据信息安全监视方法 | |
CN109478219A (zh) | 用于显示网络分析的用户界面 | |
Holm et al. | Success rate of remote code execution attacks: expert assessments and observations | |
EP3479279B1 (en) | Dynamic ranking and presentation of endpoints based on age of symptoms and importance of the endpoint in the environment | |
CN110334510A (zh) | 一种基于随机森林算法的恶意文件检测技术 | |
Petersen | Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks | |
Gizun et al. | Approaches to improve the activity of computer incident response teams | |
Pannell et al. | Anomaly detection over user profiles for intrusion detection | |
Kersten et al. | 'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center | |
KR102111136B1 (ko) | 대응지시서를 생성하고, 적용 결과를 분석하는 방법, 감시장치 및 프로그램 | |
Villarrubia et al. | Towards a Classification of Security Metrics. | |
Kai et al. | Development of qualification of security status suitable for cloud computing system | |
Acquesta et al. | Detailed Statistical Models of Host-Based Data for Detection of Malicious Activity. | |
Castro et al. | Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Qian Jin Inventor after: Chen Yuanzhong Inventor after: Xiang Xinyu Inventor after: Ni Xiabing Inventor after: Zhou Xinyue Inventor after: Li Qiangqiang Inventor after: Xu Xiaohua Inventor after: Du Mengjun Inventor after: Li Ang Inventor after: Han Rongjie Inventor after: Tu Yongwei Inventor after: Zhang Jiarui Inventor after: Xu Hanlin Inventor after: Xu Libing Inventor before: Xu Xiaohua Inventor before: Chen Yuanzhong Inventor before: Xiang Xinyu Inventor before: Ni Xiabing Inventor before: Zhou Xinyue Inventor before: Li Qiangqiang Inventor before: Du Mengjun Inventor before: Qian Jin Inventor before: Li Ang Inventor before: Han Rongjie Inventor before: Tu Yongwei Inventor before: Zhang Jiarui Inventor before: Xu Hanlin Inventor before: Xu Libing |
|
CB03 | Change of inventor or designer information |