Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium
According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerabi...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | YU LIBIN ZHUANG YI LIU QI WANG LIMING HAO WEI LEI ZHEN HUANG HAIDONG ZHANG XIAO YUAN DING FU RAO SHI XIAOZHEN DAI PENG ZHANG WENLONG MIAO QIU YU JING ZHANG KEKE GAO HAILONG ZHANG XINZONG |
description | According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph, |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116471098A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116471098A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116471098A3</originalsourceid><addsrcrecordid>eNqNjM0KwjAQhHvxIOo7rA8gWBR_jlIUT57Ea9kmaxtIk5jdCPr0hqJ3TwMz33zj4nFL1lHExlgjL0iS841ivIMQvSJmiKS8Y4lJDXVP0nkN6DRoehpF0CCThjxJREU_VRsxdAPG4iO2lJ_apH5ajO5omWbfnBTz0_FanRcUfE0cssKR1NWlLDfrbbnc7w6rf5gPcwhE4Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><source>esp@cenet</source><creator>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</creator><creatorcontrib>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</creatorcontrib><description>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230721&DB=EPODOC&CC=CN&NR=116471098A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230721&DB=EPODOC&CC=CN&NR=116471098A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>YU LIBIN</creatorcontrib><creatorcontrib>ZHUANG YI</creatorcontrib><creatorcontrib>LIU QI</creatorcontrib><creatorcontrib>WANG LIMING</creatorcontrib><creatorcontrib>HAO WEI</creatorcontrib><creatorcontrib>LEI ZHEN</creatorcontrib><creatorcontrib>HUANG HAIDONG</creatorcontrib><creatorcontrib>ZHANG XIAO</creatorcontrib><creatorcontrib>YUAN DING</creatorcontrib><creatorcontrib>FU RAO</creatorcontrib><creatorcontrib>SHI XIAOZHEN</creatorcontrib><creatorcontrib>DAI PENG</creatorcontrib><creatorcontrib>ZHANG WENLONG</creatorcontrib><creatorcontrib>MIAO QIU</creatorcontrib><creatorcontrib>YU JING</creatorcontrib><creatorcontrib>ZHANG KEKE</creatorcontrib><creatorcontrib>GAO HAILONG</creatorcontrib><creatorcontrib>ZHANG XINZONG</creatorcontrib><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><description>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjM0KwjAQhHvxIOo7rA8gWBR_jlIUT57Ea9kmaxtIk5jdCPr0hqJ3TwMz33zj4nFL1lHExlgjL0iS841ivIMQvSJmiKS8Y4lJDXVP0nkN6DRoehpF0CCThjxJREU_VRsxdAPG4iO2lJ_apH5ajO5omWbfnBTz0_FanRcUfE0cssKR1NWlLDfrbbnc7w6rf5gPcwhE4Q</recordid><startdate>20230721</startdate><enddate>20230721</enddate><creator>YU LIBIN</creator><creator>ZHUANG YI</creator><creator>LIU QI</creator><creator>WANG LIMING</creator><creator>HAO WEI</creator><creator>LEI ZHEN</creator><creator>HUANG HAIDONG</creator><creator>ZHANG XIAO</creator><creator>YUAN DING</creator><creator>FU RAO</creator><creator>SHI XIAOZHEN</creator><creator>DAI PENG</creator><creator>ZHANG WENLONG</creator><creator>MIAO QIU</creator><creator>YU JING</creator><creator>ZHANG KEKE</creator><creator>GAO HAILONG</creator><creator>ZHANG XINZONG</creator><scope>EVB</scope></search><sort><creationdate>20230721</creationdate><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><author>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116471098A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>YU LIBIN</creatorcontrib><creatorcontrib>ZHUANG YI</creatorcontrib><creatorcontrib>LIU QI</creatorcontrib><creatorcontrib>WANG LIMING</creatorcontrib><creatorcontrib>HAO WEI</creatorcontrib><creatorcontrib>LEI ZHEN</creatorcontrib><creatorcontrib>HUANG HAIDONG</creatorcontrib><creatorcontrib>ZHANG XIAO</creatorcontrib><creatorcontrib>YUAN DING</creatorcontrib><creatorcontrib>FU RAO</creatorcontrib><creatorcontrib>SHI XIAOZHEN</creatorcontrib><creatorcontrib>DAI PENG</creatorcontrib><creatorcontrib>ZHANG WENLONG</creatorcontrib><creatorcontrib>MIAO QIU</creatorcontrib><creatorcontrib>YU JING</creatorcontrib><creatorcontrib>ZHANG KEKE</creatorcontrib><creatorcontrib>GAO HAILONG</creatorcontrib><creatorcontrib>ZHANG XINZONG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>YU LIBIN</au><au>ZHUANG YI</au><au>LIU QI</au><au>WANG LIMING</au><au>HAO WEI</au><au>LEI ZHEN</au><au>HUANG HAIDONG</au><au>ZHANG XIAO</au><au>YUAN DING</au><au>FU RAO</au><au>SHI XIAOZHEN</au><au>DAI PENG</au><au>ZHANG WENLONG</au><au>MIAO QIU</au><au>YU JING</au><au>ZHANG KEKE</au><au>GAO HAILONG</au><au>ZHANG XINZONG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><date>2023-07-21</date><risdate>2023</risdate><abstract>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116471098A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T06%3A04%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=YU%20LIBIN&rft.date=2023-07-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116471098A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |