Network active defense method and device based on deceptive artificial intelligence

A technology of active defense and artificial intelligence, applied in electrical components, transmission systems, etc., can solve the problems of data security is difficult to guarantee, network attack defense cannot play a good effect, etc., to improve security and avoid system obstruction. stagnation, the effect of ensuring safety

Active Publication Date: 2021-12-10
湖南省金盾信息安全等级保护评估中心有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] It uses network topology analysis to identify network attacks, but traditional means are still used to respond to network attacks, making it difficult to achieve good results in defense against network attacks, and it is difficult to guarantee data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network active defense method and device based on deceptive artificial intelligence
  • Network active defense method and device based on deceptive artificial intelligence
  • Network active defense method and device based on deceptive artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 As shown, the network active defense method based on deceptive artificial intelligence, the method performs the following steps:

[0036] Step 1: Based on the local data storage space, set multiple mirror data spaces, each mirror data space is a complete mirror image of the local data storage space;

[0037] Step 2: When the source data storage enters the local data storage space, generate spoofed data in each mirrored data space based on the source data; the intersection of the spoofed data and the source data accounts for 1% of the total sum of the two data to 5%;

[0038] Step 3: Real-time monitoring of incoming data access requests to identify illegal access requests, conduct behavioral analysis of identified illegal access requests, and obtain illegal access request behavior analysis results;

[0039] Step 4: Based on the obtained illegal access request behavior results, find a matching defense chain from the preset active defense chains to activ...

Embodiment 2

[0045] On the basis of the previous embodiment, the mirrored data space is connected in parallel with the local data storage space; at the same time, the mirrored data spaces are connected in parallel.

Embodiment 3

[0047] On the basis of the previous embodiment, the step 2 is based on the source data, and the method for generating fraudulent data in each image data space performs the following steps: Randomly select part of the data in the source data as the intersection of the fraudulent data and the source data For the part, the data other than the intersection part in the source data is used to generate a fraudulent part using the data mapping equation; the data mapping equation is expressed by the following formula: Among them, K n is the generated fraudulent part, n value represents the number of generated fraudulent data; A represents the data other than the intersection part in the source data;

[0048] Specifically, after breaking through a host, an attacker often uses this host as a base to attack other hosts (to conceal its intrusion path and avoid leaving clues). They can use network monitoring methods to try to break into other hosts in the same network; they can also att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of artificial intelligence, and particularly relates to a network active defense method and device based on deceptive artificial intelligence. The method comprises the following steps: 1, based on a local data storage space, setting a plurality of mirror image data spaces, wherein each mirror image data space is a complete mirror image of the local data storage space; 2, when the source data is stored into the local data storage space, generating deception data in each mirror image data space based on the source data; wherein the intersection part of the deception data and the source data accounts for 1-5% of the total amount of the deception data and the source data. A plurality of mirror image data spaces are arranged to puzzle an attacking party so as to ensure the security of data, meanwhile, cheating data containing part of source data are provided in the mirror image spaces, so that the attacking party considers that the attacking party obtains the data and gives up attacking, and the security of the system is improved. In addition, multiple defense means aiming at different situations are used, so the defense efficiency and initiative are improved.

Description

technical field [0001] The invention belongs to the technical field of artificial intelligence, and in particular relates to a network active defense method and device based on deceptive artificial intelligence. Background technique [0002] Cyber ​​Attacks (also known as cyber attacks) refer to any type of offensive action against computer information systems, infrastructure, computer networks or personal computer equipment. For computers and computer networks, destroying, disclosing, modifying, disabling software or services, stealing or accessing data of any computer without authorization is considered an attack on computers and computer networks . [0003] Cyber ​​defense typically includes prevention, detection and response. Before being attacked by a network, the countermeasures for computer network defense are to adopt various management and technical measures to prevent or prevent the enemy from attacking and unauthorized access to one's own network system; techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466H04L63/1491
Inventor 张惠冰
Owner 湖南省金盾信息安全等级保护评估中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products