Threat intelligence access toolbox based on Tor network service

A toolbox and intelligence technology, applied in the field of network security, can solve problems such as lowering the learning threshold and difficulty in obtaining business intelligence, and achieve the effects of lowering the learning threshold, improving efficiency, and reducing time costs

Pending Publication Date: 2021-03-16
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem of difficulty in obtaining business intelligence in the dark network, and propose a threat intelligence access toolbox based on Tor network services, and build a dark network business toolbox by integrating modules such as passive information sources and active information collection tools. A toolbox for dramatically lowering the learning curve for obtaining business intelligence on the dark web

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence access toolbox based on Tor network service
  • Threat intelligence access toolbox based on Tor network service
  • Threat intelligence access toolbox based on Tor network service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make those skilled in the art better understand the technical solutions of the present invention, the present invention will be further elaborated below with reference to the accompanying drawings.

[0029] refer to figure 1 , the toolbox is implemented collaboratively by the user terminal and the remote central server figure 2 Medium function. The user first enters the special account password in the terminal to connect to the remote central server through the access control verification of the access module. Then, the central server provides the darknet link connection and passive information source of the toolbox, active collection tools, anonymity tools, and virtual identity management functions. At the same time, the access module begins to record user access operations to achieve auditing. During the user's use, the passive information source module will read the user's special information from the database for display, and the data generated by the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threat intelligence access toolbox based on Tor network service, and mainly solves the problems that a dark network researcher is unsafe to access a dark network, is difficult to manage, intervenes in a dark network community and is high in intelligence information collection time cost. The toolbox comprises an access module, an active information collection unit for obtaining information of an information source, a passive information source unit for processing the information source, an anonymous tool unit and a virtual identity management unit, wherein the virtualidentity management unit provides an identity account list for the anonymous tool unit and the access module, and provides an automatic login list of key service information sites for the active information collection unit; according to the method and the system, an anonymous tool necessary for obtaining the Tor network service intelligence is integrated by combining manual research experience, and key preference information is provided for the terminal in a passive accessible and active collection capability form, so that the dark network service intelligence is efficiently and conveniently obtained, and the right to know and the right to control of a service manager are ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, and further relates to Tor network business intelligence of onion routing, in particular to a threat intelligence access toolbox based on Tor network business, which can be used to intervene dark net business intelligence in a low-cost controllable environment. Background technique [0002] Today's Internet has long become a free and open new world that connects all parts of the world. However, under this world, there is still an unknown and more mysterious underground world - the dark web. [0003] There are a large number of black businesses in the dark web, which are the real source of threats on the dark web. Studying the behavior patterns, transaction patterns, and living environments of these businesses can greatly promote the analysis of dark web threat intelligence and the optimization of monitoring programs. Effectively improve the accuracy and efficiency of the analysis and mon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F16/951
CPCG06F16/951H04L63/0421H04L63/083H04L63/10
Inventor 王子龙任鹏远
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products