CN115622796A - Network security linkage response combat map generation method, system, device and medium - Google Patents
Network security linkage response combat map generation method, system, device and medium Download PDFInfo
- Publication number
- CN115622796A CN115622796A CN202211436979.8A CN202211436979A CN115622796A CN 115622796 A CN115622796 A CN 115622796A CN 202211436979 A CN202211436979 A CN 202211436979A CN 115622796 A CN115622796 A CN 115622796A
- Authority
- CN
- China
- Prior art keywords
- network
- event
- access
- subgraph
- network event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method, a system, a device and a medium for generating a network security linkage response combat map, wherein the method comprises the following steps: constructing a topological graph containing network defense information according to a service system; collecting network access events in a detection stage and mapping the network access events to a topological graph to form a network event graph; dividing the network event graph and generating a network event subgraph sequence; inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph; generating a corresponding security policy and a tracing result according to the classification result of the network event subgraph; generating a network security linkage response combat map according to the security strategy and the tracing result; the invention can find out the safety event in the network and automatically generate the blocking strategy, and generate the network safety battle graph aiming at the safety event, thereby improving the safety analysis efficiency of safety operators.
Description
Technical Field
A method, a system, a device and a medium for generating a network security linkage response combat chart belong to the technical field of information security.
Background
With the continuous development of network security attack and defense technology, the security problems of the network faced by the national key information infrastructure are continuously increased, the network security risk is continuously increased, the network threat is developing towards intellectualization and automation, the attack means usually adopts a plurality of attack steps to combine to form a complex attack process, the attack duration is long, the attack frequency is low, and the traditional network security detection tool is difficult to find and detect. On the other hand, a certain gap exists between the network attack behavior detection and the subsequent attack response, the situation awareness platform does not integrate the attack detection capability, the defense information of the security device and the attack response, the fast blocking of the attack behavior is realized, the security operator is often required to confirm the attack event, a strategy of the attack response is made, and finally the security device is logged in offline and the strategy is modified, the blocking of the attack behavior is realized, and the efficiency is low.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a method, a system, a device and a medium for generating a network security linkage response combat map, which can find out that a security event in a network automatically generates a blocking strategy, generate the network security combat map aiming at the security event and improve the security analysis efficiency of security operators.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
in a first aspect, the invention provides a method for generating a network security linkage response combat chart, which comprises the following steps:
constructing a topological graph containing network defense information according to a service system;
collecting network access events in a detection stage and mapping the network access events to a topological graph to form a network event graph;
dividing the network event graph and generating a network event subgraph sequence;
inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
generating a corresponding security policy and a tracing result according to the classification result of the network event subgraph;
and generating a network security linkage response combat drawing according to the security strategy and the tracing result.
Optionally, the network defense information includes security devices connected in series in the network, and the security devices include a firewall and a gateway.
Optionally, the collecting the network access event and mapping the network access event to the topology map to form the network event map includes:
acquiring a network access event, and describing the acquired network access event according to an access source node, a destination resource node and an access type; the access type comprises spanning a security device and not spanning the security device;
if the access source node or the destination resource node corresponding to the network access event does not exist in the topological graph, adding the access source node or the destination resource node into the topological graph;
if an access source node and a destination resource node corresponding to a network access event exist in the topological graph, judging whether to cross the security equipment according to the access type, and if not, adding an access source node to the edge of the destination resource node; if the node crosses the safety device, an edge from the access source node to the safety device and an edge from the safety device to the destination resource node are respectively added.
Optionally, the dividing the network event graph and generating the network event sub-graph sequence includes:
traversing the network access event, if the access type of the network access event is a crossing safety device, generating a network event subgraph:
In the formula (I), the compound is shown in the specification,in the form of a set of nodes, the nodes,in the form of a set of edges,for network event subgraphsTo middleEach side; to the edgeWhen is coming into contact withIf so, the access type of the corresponding network access event is a spanning safety device; when in useIf so, the access type of the corresponding network access event is not to cross the safety equipment;
summarizing the network event subgraphs in sequence to generate a network event subgraph sequence,Is the number of network event subgraphs.
Optionally, the constructing of the classification model includes:
collecting network access events in a training phase and mapping the network access events to a topological graph to form a network event graph;
dividing the network event graph and generating a network event sub-graph sequence;
adding marks to the network event sub-graph sequence to generate a training data set; the training data set is:
in the formula (I), the compound is shown in the specification,for network event subgraphsThe flag being normal access or abnormal access;
and inputting the training data set into an improved Graphormer network for training to obtain a classification model.
Optionally, the improved Graphormer network comprises:
introducing a coder-decoder structure of Graphormer network, only using a coder and cutting off a decoder module; in the self-attention mechanism calculation process of an encoder, central coding and spatial coding introduced into a Graphormer network are improved; adding an MLP layer at the output of the encoder;
the embedding of the center code is represented as:
in the formula (I), the compound is shown in the specification,is a firstSub-iterative network event subgraphMiddle nodeThe center code value of (a) is,is as followsSub-iterative network event subgraphMiddle nodeA center code value of (a);
the embedding of the spatial coding is represented as:
in the formula (I), the compound is shown in the specification,subgraph of network eventsMiddle nodeThe center code value of (a) is,as a parameter matrix for the Graphormer network,is a parameter of the dimension of the object,to pass throughA matrix of weights that can be learned,for network event subgraphsMiddle nodeThe spatial relationship between the two or more of the two,for network event subgraphsMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle nodeNetwork event subgraphMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle nodeNetwork event subgraphMiddle nodeThe spatial relationship between them.
Optionally, the generating the corresponding security policy and the tracing result according to the classification result of the network event subgraph includes:
if network event subgraphIf the classification result is abnormal access, searching the network event subgraphThe added edges crossing the corresponding edges of the safety equipment are judged as abnormal edges;
searching the safety equipment crossed by the abnormal edge, and generating a safety strategy of the safety equipment crossed by the abnormal edge;
lookup network event subgraphAdjacent network event subgraphs、Taking nodes and edges which have time sequence and spatial relation correlation with the abnormal edges as tracing results;
the generating of the security policy of the security device crossed by the abnormal edge comprises the following steps:
during the battle, the IP of the access security equipment is forbidden;
and when the user does not fight, the Port or the URL corresponding to the IP of the access security device is forbidden.
In a second aspect, the present invention provides a network security linkage response combat map generation system, including:
the topological graph module is used for constructing a topological graph containing network defense information according to the service system;
the network event graph module is used for acquiring network access events in a detection stage and mapping the network access events to the topological graph to form a network event graph;
the network time subgraph module is used for dividing the network event graph and generating a network event subgraph sequence;
the classification module is used for inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
the processing module is used for generating a corresponding security strategy and a tracing result according to the classification result of the network event subgraph;
and the operation diagram module is used for generating a network security linkage response operation diagram according to the security strategy and the source tracing result.
In a third aspect, the invention provides a network security linkage response combat chart generation device, which comprises a processor and a storage medium;
the storage medium is used for storing instructions;
the processor is configured to operate in accordance with the instructions to perform the steps according to the above-described method.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method.
Compared with the prior art, the invention has the following beneficial effects:
according to the method, the system, the device and the medium for generating the network security linkage response combat map, a topological map containing network defense information is constructed in a training stage, the acquired network access events are mapped into the topological map to form a network event map, then the network event map is segmented to form a network security event sub-graph sequence, and the network security event sub-graph sequence is transmitted to an improved Graphormer algorithm to perform model training, so that a classification model is obtained. In the detection stage, network security event subgraphs in a real system are input into a classification model in sequence, then the network security event subgraphs are classified, after abnormality is found, abnormal edges in an abnormal graph are searched, security equipment spanned by the abnormal edges is found, and a strategy capable of blocking access is generated; and further finding out the associated access behaviors in the event sequence to form an event tracing graph, helping security personnel further analyze the influence of the security events and providing effective support for the decision of security response.
Drawings
Fig. 1 is a flowchart of a method for generating a network security linkage response combat chart according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The first embodiment is as follows:
as shown in fig. 1, an embodiment of the present invention provides a method for generating a network security linkage response combat map, including the following steps:
1. constructing a topological graph containing network defense information according to a service system;
the network defense information comprises security devices which are connected in series in the network, wherein the security devices comprise a firewall, a gateway and the like.
2. Collecting network access events in a detection stage and mapping the network access events to a topological graph to form a network event graph; the process comprises the following steps:
2.1, collecting network access events, and describing the collected network access events according to access source nodes, destination resource nodes and access types; the access type comprises spanning the security device and not spanning the security device;
2.2, if the access source node or the destination resource node corresponding to the network access event does not exist in the topological graph, adding the access source node or the destination resource node into the topological graph;
2.3, if an access source node and a destination resource node corresponding to the network access event exist in the topological graph, judging whether to cross the safety equipment according to the access type, and if not, adding an access source node to the edge of the destination resource node; if the node crosses the safety device, an edge from the access source node to the safety device and an edge from the safety device to the destination resource node are respectively added.
3. Dividing the network event graph and generating a network event subgraph sequence; the specific process comprises the following steps:
3.1, traversing the network access event, and if the access type of the network access event is the crossing safety device, generating a network event subgraph:
In the formula (I), the compound is shown in the specification,in the form of a set of nodes, the nodes,in the form of a set of edges,for network event subgraphsTo middleEach side; to the edgeWhen is coming into contact withIf so, the access type of the corresponding network access event is a spanning safety device; when in useIf so, the access type of the corresponding network access event is not to cross the safety equipment;
3.2, summarizing the network event subgraphs in sequence to generate a network event subgraph sequence,Is the number of network event subgraphs.
4. Inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
the construction of the classification model comprises the following steps:
(1) Collecting network access events in a training stage and mapping the network access events to a topological graph to form a network event graph;
(2) Dividing the network event graph and generating a network event subgraph sequence;
(3) Adding marks to the network event sub-graph sequence to generate a training data set; the training data set was:
in the formula (I), the compound is shown in the specification,subgraph of network eventsA flag of (1), the flag being a normal access or an abnormal access;
(4) And inputting the training data set into an improved Graphormer network for training to obtain a classification model.
Wherein the improved Graphormer network comprises:
introducing a coder-decoder structure of a Graphormer network, only using a coder and cutting off a decoder module; in the self-attention mechanism calculation process of an encoder, central coding and spatial coding introduced into a Graphorrmer network are improved; adding an MLP layer at the output of the encoder;
the embedding of the center code is represented as:
in the formula (I), the compound is shown in the specification,is as followsSub-iterative network event subgraphMiddle nodeThe center-coded value of (a) is,is as followsSub-iterative network event subgraphMiddle nodeThe center code value of (a); if network event subgraphIn the absence of nodesThen, then;
The embedding of the spatial coding is represented as:
in the formula (I), the compound is shown in the specification,subgraph of network eventsMiddle nodeThe center code value of (a) is,as a parameter matrix for the Graphormer network,to pass throughA matrix of weights that can be learned,for network event subgraphsMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle nodeNetwork event subgraphMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle nodeNetwork event subgraphMiddle nodeThe spatial relationship between them; if the spatial relationship is not connected, the corresponding relationship isThe value is-1.
5. Generating a corresponding security policy and a tracing result according to the classification result of the network event subgraph; the method specifically comprises the following steps:
5.1 if network event subgraphIf the classification result is abnormal access, searching the network event subgraphThe edges corresponding to the crossing safety devices are added and judged as abnormal edges;
5.2, searching for the safety equipment crossed by the abnormal edge, and generating a safety strategy of the safety equipment crossed by the abnormal edge;
5.3 searching network event subgraphAdjacent network event subgraphs、Taking nodes and edges which have time precedence and spatial relation correlation with the abnormal edges as tracing results;
the generating of the security policy of the security device crossed by the abnormal edge comprises the following steps:
during the battle, the IP of the access security equipment is forbidden;
when the user does not fight, the Port or URL corresponding to the IP of the access security equipment is forbidden;
6. and generating a network security linkage response combat map according to the security strategy and the tracing result.
Example two:
the embodiment of the invention provides a network security linkage response combat chart generation system, which comprises:
the topological graph module is used for constructing a topological graph containing network defense information according to the service system;
the network event graph module is used for acquiring network access events in a detection stage and mapping the network access events to the topological graph to form a network event graph;
the network time subgraph module is used for dividing the network event graph and generating a network event subgraph sequence;
the classification module is used for inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
the processing module is used for generating a corresponding security strategy and a tracing result according to the classification result of the network event subgraph;
and the operation diagram module is used for generating a network security linkage response operation diagram according to the security strategy and the source tracing result.
Example three:
based on the first embodiment, the embodiment of the invention provides a network security linkage response combat map generation device, which comprises a processor and a storage medium, wherein the processor is used for processing a network security linkage response combat map;
a storage medium to store instructions;
the processor is configured to operate in accordance with instructions to perform steps in accordance with the above-described method.
Example four:
according to a first embodiment, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the method.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A network security linkage response combat map generation method is characterized by comprising the following steps:
constructing a topological graph containing network defense information according to a service system;
collecting network access events in a detection stage and mapping the network access events to a topological graph to form a network event graph;
dividing the network event graph and generating a network event subgraph sequence;
inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
generating a corresponding security policy and a tracing result according to the classification result of the network event subgraph;
and generating a network security linkage response combat drawing according to the security strategy and the tracing result.
2. The method as claimed in claim 1, wherein the network security coordinated response combat map generation method comprises a security device connected in series in the network, wherein the security device comprises a firewall and a gateway.
3. The method for generating the network security linkage response combat map according to claim 2, wherein the step of collecting the network access events and mapping the network access events into the topological map to form the network event map comprises the steps of:
acquiring a network access event, and describing the acquired network access event according to an access source node, a destination resource node and an access type; the access type comprises spanning a security device and not spanning the security device;
if the access source node or the destination resource node corresponding to the network access event does not exist in the topological graph, adding the access source node or the destination resource node into the topological graph;
if an access source node and a destination resource node corresponding to a network access event exist in the topological graph, judging whether to cross the safety equipment according to the access type, and if not, adding an access source node to the edge of the destination resource node; if the node crosses the safety device, an edge from the access source node to the safety device and an edge from the safety device to the destination resource node are respectively added.
4. The method for generating the network security linkage response combat map according to claim 3, wherein the step of dividing the network event map and generating the network event sub-map sequence comprises the steps of:
traversing the network access event, if the access type of the network access event is crossing the safety device, generating a network event subgraph:
In the formula (I), the compound is shown in the specification,in the form of a set of nodes, the nodes,in the form of a set of edges,for network event subgraphsTo middleEach side; to the edgeWhen is coming into contact withWhen the access type of the corresponding network access event is cross-securityThe whole equipment; when the temperature is higher than the set temperatureIf so, the access type of the corresponding network access event is not to cross the safety equipment;
5. The method as claimed in claim 4, wherein the construction of the classification model comprises:
collecting network access events in a training stage and mapping the network access events to a topological graph to form a network event graph;
dividing the network event graph and generating a network event subgraph sequence;
adding marks to the network event sub-graph sequence to generate a training data set; the training data set is:
in the formula (I), the compound is shown in the specification,for network event subgraphsThe flag being normal access or abnormal access;
and inputting the training data set into an improved Graphormer network for training to obtain a classification model.
6. The method as claimed in claim 5, wherein the improved Graphormer network comprises:
introducing a coder-decoder structure of a Graphormer network, only using a coder and cutting off a decoder module; in the self-attention mechanism calculation process of an encoder, central coding and spatial coding introduced into a Graphorrmer network are improved; adding an MLP layer at the output of the encoder;
the embedding of the center code is represented as:
in the formula (I), the compound is shown in the specification,is as followsSub-iterative network event subgraphMiddle nodeThe center code value of (a) is,is as followsSub-iterative network event subgraphMiddle nodeThe center code value of (a);
the embedding of the spatial coding is represented as:
in the formula (I), the compound is shown in the specification,for network event subgraphsMiddle nodeThe center code value of (a) is,is a parameter matrix of the Graphormer network,in order to be a dimension parameter, the dimension parameter,to pass throughA matrix of weights that can be learned,subgraph of network eventsMiddle nodeThe spatial relationship between the two or more of the two,for network event subgraphsMiddle nodeThe spatial relationship between the two components is that,for network event subgraphsMiddle node, network event subgraphMiddle nodeThe spatial relationship between the two components is that,subgraph of network eventsMiddle nodeNetwork event subgraphMiddle nodeThe spatial relationship between them.
7. The method for generating the network security linkage response combat map according to claim 6, wherein the step of generating the corresponding security policy and the traceability result according to the classification result of the network event subgraph comprises the following steps:
if network event subgraphIf the classification result is abnormal access, searching the network event subgraphThe added edges crossing the corresponding edges of the safety equipment are judged as abnormal edges;
searching the safety equipment crossed by the abnormal edge, and generating a safety strategy of the safety equipment crossed by the abnormal edge;
lookup network event subgraphAdjacent network event subgraphs、Taking nodes and edges which have time precedence and spatial relation correlation with the abnormal edges as tracing results;
the generating of the security policy of the security device crossed by the abnormal edge comprises the following steps:
during the battle, the IP of the access security equipment is forbidden;
and when the user does not fight, the Port or the URL corresponding to the IP of the access security device is forbidden.
8. A network security linkage response combat map generation system is characterized by comprising:
the topological graph module is used for constructing a topological graph containing network defense information according to the service system;
the network event graph module is used for acquiring network access events in a detection stage and mapping the network access events to the topological graph to form a network event graph;
the network time subgraph module is used for dividing the network event graph and generating a network event subgraph sequence;
the classification module is used for inputting the network event subgraph sequence into a pre-constructed classification model to classify the network event subgraph;
the processing module is used for generating a corresponding security strategy and a tracing result according to the classification result of the network event subgraph;
and the operation diagram module is used for generating a network security linkage response operation diagram according to the security strategy and the source tracing result.
9. A network security linkage response combat map generating device is characterized by comprising a processor and a storage medium;
the storage medium is used for storing instructions;
the processor is configured to operate in accordance with the instructions to perform the steps of the method according to any one of claims 1 to 7.
10. Computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211436979.8A CN115622796B (en) | 2022-11-16 | 2022-11-16 | Network security linkage response combat map generation method, system, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211436979.8A CN115622796B (en) | 2022-11-16 | 2022-11-16 | Network security linkage response combat map generation method, system, device and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115622796A true CN115622796A (en) | 2023-01-17 |
CN115622796B CN115622796B (en) | 2023-04-07 |
Family
ID=84878692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211436979.8A Active CN115622796B (en) | 2022-11-16 | 2022-11-16 | Network security linkage response combat map generation method, system, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115622796B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000070463A1 (en) * | 1999-05-14 | 2000-11-23 | L-3 Communications Corporation | Apparatus and methods for analyzing multiple network security vulnerabilities |
CN101820357A (en) * | 2010-02-11 | 2010-09-01 | 哈尔滨工业大学 | Network security incident visualization system |
CN108494810A (en) * | 2018-06-11 | 2018-09-04 | 中国人民解放军战略支援部队信息工程大学 | Network security situation prediction method, apparatus and system towards attack |
CN109302380A (en) * | 2018-08-15 | 2019-02-01 | 全球能源互联网研究院有限公司 | A kind of safety protection equipment linkage defense strategy Intelligent Decision-making Method and system |
CN109587174A (en) * | 2019-01-10 | 2019-04-05 | 广东电网有限责任公司信息中心 | Composite defense method and system for network protection |
CN110290120A (en) * | 2019-06-12 | 2019-09-27 | 西安邮电大学 | A kind of timing evolved network safe early warning method of cloud platform |
CN110764969A (en) * | 2019-10-25 | 2020-02-07 | 新华三信息安全技术有限公司 | Network attack tracing method and device |
CN113067728A (en) * | 2021-03-17 | 2021-07-02 | 中国人民解放军海军工程大学 | Network security attack and defense test platform |
CN113824643A (en) * | 2021-11-25 | 2021-12-21 | 中国科学院信息工程研究所 | Ubiquitous network topological graph construction method and network security protection method |
CN114090374A (en) * | 2021-11-08 | 2022-02-25 | 北京许继电气有限公司 | Network security operation management platform |
CN114640548A (en) * | 2022-05-18 | 2022-06-17 | 宁波市镇海区大数据投资发展有限公司 | Network security sensing and early warning method and system based on big data |
CN115037561A (en) * | 2022-08-10 | 2022-09-09 | 杭州悦数科技有限公司 | Network security detection method and system |
CN115277102A (en) * | 2022-06-29 | 2022-11-01 | 北京天融信网络安全技术有限公司 | Network attack detection method and device, electronic equipment and storage medium |
-
2022
- 2022-11-16 CN CN202211436979.8A patent/CN115622796B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000070463A1 (en) * | 1999-05-14 | 2000-11-23 | L-3 Communications Corporation | Apparatus and methods for analyzing multiple network security vulnerabilities |
CN101820357A (en) * | 2010-02-11 | 2010-09-01 | 哈尔滨工业大学 | Network security incident visualization system |
CN108494810A (en) * | 2018-06-11 | 2018-09-04 | 中国人民解放军战略支援部队信息工程大学 | Network security situation prediction method, apparatus and system towards attack |
CN109302380A (en) * | 2018-08-15 | 2019-02-01 | 全球能源互联网研究院有限公司 | A kind of safety protection equipment linkage defense strategy Intelligent Decision-making Method and system |
CN109587174A (en) * | 2019-01-10 | 2019-04-05 | 广东电网有限责任公司信息中心 | Composite defense method and system for network protection |
CN110290120A (en) * | 2019-06-12 | 2019-09-27 | 西安邮电大学 | A kind of timing evolved network safe early warning method of cloud platform |
CN110764969A (en) * | 2019-10-25 | 2020-02-07 | 新华三信息安全技术有限公司 | Network attack tracing method and device |
CN113067728A (en) * | 2021-03-17 | 2021-07-02 | 中国人民解放军海军工程大学 | Network security attack and defense test platform |
CN114090374A (en) * | 2021-11-08 | 2022-02-25 | 北京许继电气有限公司 | Network security operation management platform |
CN113824643A (en) * | 2021-11-25 | 2021-12-21 | 中国科学院信息工程研究所 | Ubiquitous network topological graph construction method and network security protection method |
CN114640548A (en) * | 2022-05-18 | 2022-06-17 | 宁波市镇海区大数据投资发展有限公司 | Network security sensing and early warning method and system based on big data |
CN115277102A (en) * | 2022-06-29 | 2022-11-01 | 北京天融信网络安全技术有限公司 | Network attack detection method and device, electronic equipment and storage medium |
CN115037561A (en) * | 2022-08-10 | 2022-09-09 | 杭州悦数科技有限公司 | Network security detection method and system |
Non-Patent Citations (1)
Title |
---|
吴华等: "大规模网络安全事件威胁量化分析", 《微计算机信息》 * |
Also Published As
Publication number | Publication date |
---|---|
CN115622796B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11637853B2 (en) | Operational network risk mitigation system and method | |
US11522882B2 (en) | Detection of adversary lateral movement in multi-domain IIOT environments | |
CN115296924B (en) | Network attack prediction method and device based on knowledge graph | |
CN106357470B (en) | One kind threatening method for quickly sensing based on SDN controller network | |
JP2021060987A (en) | Method of data-efficient threat detection in computer network | |
Pan et al. | Anomaly based intrusion detection for building automation and control networks | |
GhasemiGol et al. | E‐correlator: an entropy‐based alert correlation system | |
CN111049827A (en) | Network system safety protection method, device and related equipment | |
CN112019523A (en) | Network auditing method and device for industrial control system | |
CN113890821B (en) | Log association method and device and electronic equipment | |
Rubio et al. | Tracking apts in industrial ecosystems: A proof of concept | |
Kozik et al. | Pattern extraction algorithm for NetFlow‐based botnet activities detection | |
CN111159702B (en) | Process list generation method and device | |
CN107479518A (en) | A kind of method and system for automatically generating alarm association rule | |
Frankowski et al. | Application of the Complex Event Processing system for anomaly detection and network monitoring | |
CN115622796B (en) | Network security linkage response combat map generation method, system, device and medium | |
Guruprasad et al. | Development of an evolutionary framework for autonomous rule creation for intrusion detection | |
Yu et al. | Mining anomaly communication patterns for industrial control systems | |
Sampath et al. | Intrusion detection in software defined networking using genetic algorithm | |
CN114826685B (en) | Information analysis method, equipment and computer readable storage medium | |
CN115098602B (en) | Data processing method, device and equipment based on big data platform and storage medium | |
CN115913640B (en) | Large-scale network attack deduction and risk early warning method based on attack graph | |
Iturbe | Data-driven anomaly detection in industrial networks | |
Ayoughi et al. | Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study | |
Ayyadapu | CYBER THREAT MITIGATION THROUGH AI-ENABLED BIG DATA ANALYSIS IN CLOUD ADMINISTRATION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |