Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Deceptive defense system, construction method and full-link defense implementation method based on att&ck

An ATT&CK, defense system technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of inability to cover attackers, difficult to achieve high-performance trapping of attackers, etc., and achieve the effect of efficient trapping and early warning

Active Publication Date: 2022-08-02
北京经纬信安科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing spoofing technology cannot cover the attacker's full-link attack behavior, and it is difficult to achieve high-performance trapping of the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deceptive defense system, construction method and full-link defense implementation method based on att&ck
  • Deceptive defense system, construction method and full-link defense implementation method based on att&ck
  • Deceptive defense system, construction method and full-link defense implementation method based on att&ck

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as recited in the appended claims.

[0073] Name explanation: ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a model and knowledge base that reflects the attack behavior of each attack life cycle. ATT&CK helps understand known attacker behavior, techniques, tactics, prepare detection measures, and validate the effectiveness of defense infrastructure and analytics strategies. In the present invention, the ATT&CK m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a deceptive defense system based on ATT&CK, a construction method and a full-link defense implementation method, and studies the attack technology of each technical point under each tactic in the ATT&CK framework; At the level, the deception defense technology corresponding to each attack technology is given, and all deception defense technologies are divided into layers according to the different action points of the network deception technology. Network asset situation, according to the behavior of the attacker at each stage during the intrusion, select the deception defense technology from the initial database and integrate it with the current network asset situation in the three dimensions of tactics, technology, and action point to build a comprehensive deception defense. system. In the present invention, the deception technology runs through the entire life cycle of the attack link, and the TTP of the attacker is detected, defended and responded to, and active trapping is performed from the attacker's perspective.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a deceptive defense system, a construction method and a full-link defense implementation method based on the ATT&CK model for deceptive technology combination to realize honey-array trapping. Background technique [0002] Network security issues have become a common challenge faced by mankind in the information age, and domestic network security issues have become increasingly prominent. The specific manifestations are: the computer system is seriously infected and damaged by viruses; computer hacking activities have formed an important threat; the information infrastructure is facing the challenge of network security; the information system has many weak links in the ability of prediction, response, prevention and recovery. [0003] In the process of responding to attackers, it is often passive and rigid waiting for the attacker to touch the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0209H04L63/1491H04L63/20
Inventor 李春强丘国伟邓启晴
Owner 北京经纬信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products