Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Defense system and method for solving network threats in self-adaptive closed-loop mode

A defense system, adaptive technology, applied in transmission systems, electrical components, etc., can solve problems such as network security problems that cannot be solved, and achieve the effect of solving threats

Inactive Publication Date: 2019-10-25
南京经纬信安科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the traditional passive blocking and killing cannot solve the current network security problems, in order to overcome the problems in related technologies at least to a certain extent, the applicant provides an adaptive closed-loop system and method for solving network threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense system and method for solving network threats in self-adaptive closed-loop mode
  • Defense system and method for solving network threats in self-adaptive closed-loop mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0044] Such as figure 1 As shown, on the one hand, this embodiment provides an adaptive closed-loop system for solving network threats, including that the defense system includes a prediction module, a prevention module, a monitoring module, an analysis module and a response module; wherein

[0045] The prediction module is used to identify and classify assets in the network on the one ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a defense system and method for solving network threats in a self-adaptive closed-loop mode, and the system comprises a prediction module which is used for the recognition andclassification of asset conditions in a network on one hand, and is also used for the vulnerability scanning and weak password scanning of the network on the other hand; a prevention module which isused for repairing and perfecting vulnerability such as vulnerability risks and weak passwords detected by the prediction module in network asset management; a monitoring module which is used for simulating the key assets in the prediction module, utilizing and confusing the sight of an attacker, and monitoring the attack technology and tool of the attacker on honeypots simulating the key assets in time; an analysis module which is used for analyzing the data output by the monitoring module, and a response module which is used for automatically generating a response command for an analysis result of the analysis module. The defense system and method for solving the network threats in the self-adaptive closed-loop manner are specifically adapted to environments with different network resources and can effectively solve the threats in a network.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to an adaptive closed-loop defense system and method for solving network threats. Background technique [0002] In recent years, the threats and risks of network security have been increasing day by day, and it has become a common challenge faced by human beings in the information age. For example, hackers extorting money and obtaining wealth are still trivial matters. Some reactionary and hostile groups can also use the Internet to disrupt society, undermine national stability, and carry out high-intensity continuous attacks on target networks in an organized manner. Especially with the advent of the 5G era, the industrial Internet is also facing security threats, and the resulting network attacks often cause more serious impacts than in the past. Threats to network security can come from many sources and change over time. Its biggest feature is undec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1441H04L63/20
Inventor 李春强丘国伟郑华梅
Owner 南京经纬信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products