Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network threat intelligence sharing platform based on blockchain smart contract

A smart contract and shared platform technology, applied in the field of APT detection under threat intelligence sharing, can solve the problems of only focusing on border defense and reducing difficulty

Pending Publication Date: 2021-03-23
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the well-known APT incidents that have been exposed so far, social attacks, 0day exploits, and physical ferrying emerge in an endless stream, while traditional detection often only focuses on border defense. Once the system border is bypassed, the difficulty of implementing subsequent attack steps will be greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat intelligence sharing platform based on blockchain smart contract
  • Network threat intelligence sharing platform based on blockchain smart contract
  • Network threat intelligence sharing platform based on blockchain smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions of the embodiments of the present invention in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the described embodiments of the present invention belong to the protection scope of the present invention.

[0030] The present invention proposes a network threat intelligence sharing platform based on blockchain smart contracts, such as figure 1 As shown, the platform relies on the underlying architecture of Ethereum, uses network threat intelligence data as data assets, processes network threat intelligence data through a trusted threat intelligence processing module, utilizes the distributed d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network threat intelligence sharing platform based on a blockchain smart contract, which is based on an Ethereum underlying architecture, takes network threat intelligence data as data assets, processes the network threat intelligence data through a trustworthy threat intelligence processing module, and with distributed data storage of a blockchain system, through intelligent contract development and design, intelligence sharing of network threat intelligence data on an autonomous peer-to-peer data platform by a data provider and a data purchaser is realized. Threat intelligence credibility evaluation in a unified security sharing network space of network threat intelligence data is realized, the problem of low multi-source data integration quality faced by threatintelligence sharing in the prior art is solved, the satisfaction degree of sharing platform users is increased, and the false alarm rate of threat intelligence security application is reduced.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically, relates to an APT detection method based on smart contract-based threat intelligence sharing. Background technique [0002] Advanced Persistent Threat (APT, Advanced Persistent Thread) refers to a long-term persistent attack on a specific target. NIST defines APT as: Attackers with massive manpower, technology, equipment and other resources aim at specific targets and use a variety of different attack methods (including technology, physics, fraud, etc.) to seek or actively create opportunities to achieve their attack goals. Attack goals generally include establishing and maintaining backdoors in the IT infrastructure of the victim organization, digging, stealing, tampering with specific critical information, or lurking in a low-key manner to carry out attacks in the future. It is not difficult to see from the statistical data that cyber attacks are becoming more and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCH04L63/14H04L63/083H04L67/1097H04L61/4511
Inventor 刘冬兰张昊王睿刘新马雷王勇常英贤陈剑飞于灏苏冰赵勇吕国栋王晓峰井俊双姚洪磊王文婷刘鑫赵洋赵晓红
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products