Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APT monitoring and defending system based on big data analysis

A defense system and big data technology, applied in the direction of digital transmission system, transmission system, data exchange network, etc., can solve problems such as incalculable harm, achieve the effect of resisting network APT attacks and improving the overall improvement

Inactive Publication Date: 2017-10-13
CHENGDU GOLDTEL IND GROUP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially for our country, which is in a period of rapid development, once a hostile force or organization spends a high cost to carry out a targeted APT attack against our country's important information system and succeeds, the harm caused will be incalculable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APT monitoring and defending system based on big data analysis
  • APT monitoring and defending system based on big data analysis
  • APT monitoring and defending system based on big data analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0021] Such as figure 1 shown and figure 2 As shown, an APT monitoring and defense system based on big data analysis includes a data collection layer, a security information transmission layer, deployment control rules and information source management layer, an information preprocessing layer, a comprehensive analysis and data storage layer, a presentation layer and an alarm database .

[0022] Data collection layer: The data collection layer realizes the collection of various data required by the active defense-based forensics system for network information. The data acquisition layer is realized by various technical detectors and host agent software. The data collected by the data acquisition layer is transmitted to the information r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an APT (Advanced Persistent Threat) monitoring and defending system based on big data analysis, comprising a data acquisition layer, an information preprocessing layer, a comprehensive analysis and data storage layer, and a presentation layer. The data acquisition layer is connected with the information preprocessing layer, the information preprocessing layer is connected with the comprehensive analysis and data storage layer, and the comprehensive analysis and data storage layer is connected with the presentation layer. The data acquisition layer acquires local data of terminals and network data. The APT monitoring and defending system can be used to defend the security of information networks in finance, commerce, tax, party and government, and the like, ensure legitimate communication of normal business application systems, and resist network APT attacks, so as to protect the information security infrastructures and the important network information systems in our country. The APT monitoring and defending system has multiple functions such as information flow detection and alarm, operation process supervision and auditing, and data restoration and recovery support.

Description

technical field [0001] The invention relates to the field of network monitoring and defense, in particular to an APT monitoring and defense system based on big data analysis. Background technique [0002] With the in-depth development of informatization in various fields of the national economy and society, the corresponding security issues have become more prominent. Currently, cyber attacks have been regarded as one of the major security threats facing the world. Problems such as cyber theft, abuse of personal privacy, and ideological infiltration by hostile forces using the Internet are becoming more and more prominent. After the information system is damaged, the damage to national security, social order, and public interest will be more serious. [0003] In recent years, APT (Advanced Persistent Threat) attacks have become a focus of attention and discussion in the industry. APT attacks generally refer to the continuous intrusion and penetration of government agencies...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/042H04L63/14H04L63/1441H04L63/20
Inventor 彭光辉屈立笳陶磊苏礼刚林伟何羽霏
Owner CHENGDU GOLDTEL IND GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products