Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Botnet risk assessment method and device

A risk assessment and botnet technology, applied in secure communication devices, digital transmission systems, instruments, etc., can solve problems such as single means, difficulty in encrypting traffic, and lack of botnet risk assessment methods and devices, etc., to improve comprehensive benefits , high commercial value, and easy to use

Pending Publication Date: 2022-04-29
CHINA PACIFIC INSURANCE (GRP) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing methods for responding to botnet risks, there are mainly two types of C&C identification and detection technologies in this field: one is feature matching detection based on rule engines, such as detecting HTTP traffic header information, attack characteristics, etc. , but rule-based matching tends to produce a high false positive rate and it is difficult to detect new types of attacks; while the other is to analyze and detect artificial abnormal traffic based on network capture, which is not efficient, especially for encrypted traffic It is very difficult to process, but also has a high false positive rate
[0005] At the same time, in the existing technology, there are mainly various defects such as simple detection scenarios, single means, low efficiency, high false alarm rate, and insufficient early prediction ability for new types of detection. At the same time, there is also a lack of an automated platform for this This kind of detection technology is implemented, and a closed-loop system is provided for decision support, threat warning and intervention
[0006] At present, there is no technical solution that can solve the above technical problems, specifically, there is no method and device for botnet risk assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Botnet risk assessment method and device
  • Botnet risk assessment method and device
  • Botnet risk assessment method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to better clearly express the technical solution of the present invention, the present invention will be further described below in conjunction with the accompanying drawings.

[0038] figure 1 Showing a specific implementation of the present invention, a schematic flow chart of a botnet risk assessment method. The present invention discloses a botnet risk assessment method, which establishes a multi-scenario multi-scenario fusion based on internal basic security data and public data samples of the enterprise. Dimensional model, combined with big data security platform for real-time and effective assessment of security risks, the present invention is a C&C botnet risk assessment method and system based on big data AI platform, and its characteristics are: based on internal basic security data and public data samples of the enterprise , establish a fusion of multi-scenario and multi-dimensional models, combined with a big data security platform for real-time and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a botnet risk assessment method. The botnet risk assessment method comprises the following steps of a, performing data cleaning on client data, and substituting the client data into Camp; the method comprises the following steps of: obtaining a domain name risk suspicion degree Pc, a domain name threat probability Pd and a threat degree probability Pf associated with an output result in a relation graph fastflux model, a C model, a deep learning DGA model and a relation graph fastflux model; b, at least the associated domain name risk suspicion degree Pc, the domain name threat probability Pd, the threat degree probability Pf and a marked sample y value are input into a traditional machine learning model LR, a comprehensive threat score is determined, the marked sample y is determined at least through a public data sample and a black sample of enterprise internal basic security data, and then customer data is substituted into Camp; before the C model, at least the client data is subjected to feature engineering processing to determine a plurality of derivative variables, and the feature engineering processing at least comprises calculation of a beacon score, a transverse UA (Unified Architecture) probability degree and a longitudinal UA probability degree. The method is simple in process and convenient to use, and has extremely high commercial value.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a botnet risk assessment method and device. Background technique [0002] A botnet consists of a series of malware-infected hosts that are remotely controlled by a host known as a botmaster. Botnets can be used to perform a range of malicious activities, such as distributed denial of service attacks, sending spam, stealing personal information, performing distributed computing tasks, and more. Botnet communication methods mainly include central, P2P and mixed methods. In central, zombie hosts (bots) communicate through legal communication channels, generally using IRC (Internet RelayChat) communication methods. When a host is infected, it establishes a connection with the IRC server. The botmaster will establish an IRC command and control (C&C) channel to control the zombie host, and implement instructions such as issuing intrusion commands and updating the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06N20/00
CPCH04L63/1416H04L63/1441G06N20/00
Inventor 李佚蝶
Owner CHINA PACIFIC INSURANCE (GRP) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products