Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network attack display method and device

A network attack and attack source technology, applied in the field of information security, can solve problems such as unfavorable analysis, and achieve the effect of facilitating security analysis to discover security threat attacks

Inactive Publication Date: 2020-04-07
BEIJING GRIDSUM TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, SOC only analyzes and displays the security alarm event itself, which is not conducive to the analysis of the specific reasons for the occurrence of security alarm events and the timely detection of security threats and attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack display method and device
  • Network attack display method and device
  • Network attack display method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0049] For ease of understanding, a number of technical terms involved in the embodiments of the present application are firstly introduced below.

[0050] Security threat attacks refer to attacks aimed at the target network or the network boundary of the target network that threaten network security, such as abnormal host login, port and network scanning, botnets, worm propagation, account brute force cracking, etc. In an example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack display method and device, and the method comprises the steps: obtaining event basic information of a security alarm event, wherein the event basic informationcomprises the address of an event generation place, the address of an attack source, and the address of an attack target; according to the event basic information, determining an attack path from theattack source to the attack target through an event occurrence site corresponding to the security alarm event; and displaying the attack path in the form of a visual link. According to the embodimentof the invention, causes and effects of the security alarm event is displayed to an operator, so that security-related personnel can perform security analysis more conveniently to discover a securitythreat attack.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a network attack display method and device. Background technique [0002] With the rapid rise of emerging technologies such as cloud computing, big data, and mobile Internet, the information security environment has become more complex, and the challenges of enterprise information security have become more prominent. [0003] Today's global hacker community is creating advanced malware and infiltrating organizations through various attack vectors. This multifaceted, targeted attack can evade even the best point-in-time detection tools. These optimal point-in-time detection tools inspect traffic and files at the point of entry, but struggle to detect threat activity that seeks to evade initial inspection. This leaves security professionals in the dark about the extent of a potential compromise and unable to quickly respond and contain malware before it cau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/0631H04L43/045H04L63/1416H04L63/1441
Inventor 纪朕
Owner BEIJING GRIDSUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products