Zero-day attack detection, analysis and response system and method based on mimic defense architecture
An attack detection and attacker technology, applied in the field of network security, can solve problems such as increased defense cost, error consistent output, lack of response means, etc., to achieve the effect of improving mimic defense efficiency, ensuring robustness, and reducing defense cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] Embodiment one, see figure 1 As shown, a zero-day attack detection, analysis and response system based on the mimic defense architecture includes an input agent unit, a zero-day attack detection unit, a dynamic online execution body set, a voting and meta-function inspection unit, a dynamic scheduling and management unit, Execution body pool, exception statistics and analysis unit, among which,
[0036] The input proxy unit conducts a preliminary inspection of the request data packet, including: processing the request data packet according to the requirements of the intrusion response, and dynamically changing the network attributes and configuration at the same time;
[0037] The zero-day attack detection unit detects, analyzes and abnormally determines the request data packet according to the zero-day attack database. If there is data in the request data packet that meets the rules in the zero-day attack database, it is determined that the request data packet is an abno...
Embodiment 2
[0045] Embodiment 2 is basically the same as Embodiment 1, the difference is that it also includes a vulnerability discovery and repair unit, which analyzes the attacker’s attack process according to the abnormal statistical analysis results, digs out the cause of the abnormal output, and feeds back the found zero-day attack Go to the dynamic scheduling and management unit, and repair the related execution bodies in the execution body pool.
[0046] As mentioned above, the meta-function inspection checks whether the output of the executive body conforms to its design function, checks and blocks the output of non-meta-functions; the honeypot type executive body intentionally leaks the information of the executive body to lure attackers to attack it, At the same time, the detected abnormal input is analyzed to obtain attacker information.
Embodiment 3
[0047] Embodiment three, see Figure 1~2 As shown, a zero-day attack detection, analysis and response method based on the zero-day attack detection, analysis and response system based on the mimic defense architecture described in Embodiment 1 includes the following steps:
[0048] Step 1. Perform a preliminary inspection of the data packet on the input request of the input agent, including: perform preliminary processing on the input request according to the intrusion response requirements, and dynamically change network attributes and configurations at the same time;
[0049] Step 2. The input request is detected according to the zero-day attack database. If there is data in the input request that conforms to the rules in the zero-day attack database, it is determined that the input request is an abnormal input, and abnormal processing is performed on it, and other input requests are treated as Normal input, assigning normal input to all the execution bodies of the dynamic o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com