Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device carrying out path backtracking for system attack

A technology for systems and paths, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems affecting the timeliness of attack response processing, analysis of paths that cannot attack traffic, etc., to improve emergency response processing efficiency and high intelligence , Solve the effect of low degree of automation

Active Publication Date: 2016-02-17
CHINA TELECOM CORP LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the existing traceability system is applied to attack traceability and investigation on the live network, it relies more on the manual analysis of security experts, and cannot analyze the path of attack traffic, which seriously affects the processing time of attack response.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device carrying out path backtracking for system attack
  • Method and device carrying out path backtracking for system attack
  • Method and device carrying out path backtracking for system attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present disclosure will be described below with reference to the accompanying drawings. It is to be noted that the following description is merely explanatory and exemplary in nature, and in no way serves as any limitation of the present disclosure, its application or uses. Relative arrangements of components and steps and numerical expressions and numerical values ​​set forth in the embodiments do not limit the scope of the present disclosure unless otherwise specifically stated. Additionally, techniques, methods and devices known to those skilled in the art may not be discussed in detail but are intended to be part of the description where appropriate.

[0040] The following embodiments of the present disclosure address the problems of insufficient attack traceability and the inability to analyze the path of attack traffic in the existing technical means, and propose a technical solution for system attack path backtracking, which can effectively improve Internet a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device carrying out path backtracking for system attack. The method comprises steps that, Netflow data, routing topology data and router information are acquired; a system attack safety event is acquired; on the basis of the system attack safety event and the acquired Netflow data, the routing topology data and the router information, path backtracking for the system attack is carried out by utilizing a breadth transversal method. Through the method, Internet attack emergency response processing efficiency can be effectively improved.

Description

technical field [0001] The present disclosure relates to the technical field of network and information security, and in particular, relates to a method and device for backtracking a system attack path. Background technique [0002] In order to cope with the increasingly rampant DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks, it is necessary to monitor and analyze the attack traffic; currently there are three main methods of traffic monitoring and analysis: monitoring technology based on full mirroring of network traffic, based on SNMP (Simple Network Management Protocol, Simple Network Management Protocol) monitoring technology and Netflow-based monitoring technology. [0003] Through comparison, it is found that Netflow-based monitoring technology is more suitable for large networks. China Telecom has deployed a Netflow-based abnormal traffic monitoring system and attack traceability analysis system for real-time abnormal traffic attack monitor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
Inventor 史国水汪来富罗志强沈军
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products