Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium

According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerabi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: YU LIBIN, ZHUANG YI, LIU QI, WANG LIMING, HAO WEI, LEI ZHEN, HUANG HAIDONG, ZHANG XIAO, YUAN DING, FU RAO, SHI XIAOZHEN, DAI PENG, ZHANG WENLONG, MIAO QIU, YU JING, ZHANG KEKE, GAO HAILONG, ZHANG XINZONG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator YU LIBIN
ZHUANG YI
LIU QI
WANG LIMING
HAO WEI
LEI ZHEN
HUANG HAIDONG
ZHANG XIAO
YUAN DING
FU RAO
SHI XIAOZHEN
DAI PENG
ZHANG WENLONG
MIAO QIU
YU JING
ZHANG KEKE
GAO HAILONG
ZHANG XINZONG
description According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116471098A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116471098A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116471098A3</originalsourceid><addsrcrecordid>eNqNjM0KwjAQhHvxIOo7rA8gWBR_jlIUT57Ea9kmaxtIk5jdCPr0hqJ3TwMz33zj4nFL1lHExlgjL0iS841ivIMQvSJmiKS8Y4lJDXVP0nkN6DRoehpF0CCThjxJREU_VRsxdAPG4iO2lJ_apH5ajO5omWbfnBTz0_FanRcUfE0cssKR1NWlLDfrbbnc7w6rf5gPcwhE4Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><source>esp@cenet</source><creator>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</creator><creatorcontrib>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</creatorcontrib><description>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230721&amp;DB=EPODOC&amp;CC=CN&amp;NR=116471098A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230721&amp;DB=EPODOC&amp;CC=CN&amp;NR=116471098A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>YU LIBIN</creatorcontrib><creatorcontrib>ZHUANG YI</creatorcontrib><creatorcontrib>LIU QI</creatorcontrib><creatorcontrib>WANG LIMING</creatorcontrib><creatorcontrib>HAO WEI</creatorcontrib><creatorcontrib>LEI ZHEN</creatorcontrib><creatorcontrib>HUANG HAIDONG</creatorcontrib><creatorcontrib>ZHANG XIAO</creatorcontrib><creatorcontrib>YUAN DING</creatorcontrib><creatorcontrib>FU RAO</creatorcontrib><creatorcontrib>SHI XIAOZHEN</creatorcontrib><creatorcontrib>DAI PENG</creatorcontrib><creatorcontrib>ZHANG WENLONG</creatorcontrib><creatorcontrib>MIAO QIU</creatorcontrib><creatorcontrib>YU JING</creatorcontrib><creatorcontrib>ZHANG KEKE</creatorcontrib><creatorcontrib>GAO HAILONG</creatorcontrib><creatorcontrib>ZHANG XINZONG</creatorcontrib><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><description>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjM0KwjAQhHvxIOo7rA8gWBR_jlIUT57Ea9kmaxtIk5jdCPr0hqJ3TwMz33zj4nFL1lHExlgjL0iS841ivIMQvSJmiKS8Y4lJDXVP0nkN6DRoehpF0CCThjxJREU_VRsxdAPG4iO2lJ_apH5ajO5omWbfnBTz0_FanRcUfE0cssKR1NWlLDfrbbnc7w6rf5gPcwhE4Q</recordid><startdate>20230721</startdate><enddate>20230721</enddate><creator>YU LIBIN</creator><creator>ZHUANG YI</creator><creator>LIU QI</creator><creator>WANG LIMING</creator><creator>HAO WEI</creator><creator>LEI ZHEN</creator><creator>HUANG HAIDONG</creator><creator>ZHANG XIAO</creator><creator>YUAN DING</creator><creator>FU RAO</creator><creator>SHI XIAOZHEN</creator><creator>DAI PENG</creator><creator>ZHANG WENLONG</creator><creator>MIAO QIU</creator><creator>YU JING</creator><creator>ZHANG KEKE</creator><creator>GAO HAILONG</creator><creator>ZHANG XINZONG</creator><scope>EVB</scope></search><sort><creationdate>20230721</creationdate><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><author>YU LIBIN ; ZHUANG YI ; LIU QI ; WANG LIMING ; HAO WEI ; LEI ZHEN ; HUANG HAIDONG ; ZHANG XIAO ; YUAN DING ; FU RAO ; SHI XIAOZHEN ; DAI PENG ; ZHANG WENLONG ; MIAO QIU ; YU JING ; ZHANG KEKE ; GAO HAILONG ; ZHANG XINZONG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116471098A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>YU LIBIN</creatorcontrib><creatorcontrib>ZHUANG YI</creatorcontrib><creatorcontrib>LIU QI</creatorcontrib><creatorcontrib>WANG LIMING</creatorcontrib><creatorcontrib>HAO WEI</creatorcontrib><creatorcontrib>LEI ZHEN</creatorcontrib><creatorcontrib>HUANG HAIDONG</creatorcontrib><creatorcontrib>ZHANG XIAO</creatorcontrib><creatorcontrib>YUAN DING</creatorcontrib><creatorcontrib>FU RAO</creatorcontrib><creatorcontrib>SHI XIAOZHEN</creatorcontrib><creatorcontrib>DAI PENG</creatorcontrib><creatorcontrib>ZHANG WENLONG</creatorcontrib><creatorcontrib>MIAO QIU</creatorcontrib><creatorcontrib>YU JING</creatorcontrib><creatorcontrib>ZHANG KEKE</creatorcontrib><creatorcontrib>GAO HAILONG</creatorcontrib><creatorcontrib>ZHANG XINZONG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>YU LIBIN</au><au>ZHUANG YI</au><au>LIU QI</au><au>WANG LIMING</au><au>HAO WEI</au><au>LEI ZHEN</au><au>HUANG HAIDONG</au><au>ZHANG XIAO</au><au>YUAN DING</au><au>FU RAO</au><au>SHI XIAOZHEN</au><au>DAI PENG</au><au>ZHANG WENLONG</au><au>MIAO QIU</au><au>YU JING</au><au>ZHANG KEKE</au><au>GAO HAILONG</au><au>ZHANG XINZONG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium</title><date>2023-07-21</date><risdate>2023</risdate><abstract>According to the method, log data is taken as a main data basis, and vulnerability library knowledge and ATTamp are introduced at the same time through data acquisition and graph compression technologies; according to a CK model framework, an ontology model emphasizing attack behaviors and vulnerability source expression is established through technologies such as knowledge collection, knowledge fusion and knowledge processing, a traceability graph is jointly constructed by applying a knowledge reasoning technology and combining a causal relationship optimized and adjusted for a penetration process, and reconstruction of a vulnerability penetration utilization process is completed based on the traceability graph. According to the invention, ATTamp is fused; the CK attack model can effectively and intuitively discover the attack means of an attacker, and provides knowledge reserve and thought help for subsequent active defense. Meanwhile, the complete penetration process is clearly displayed through the graph,</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN116471098A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Vulnerability utilization process reconstruction method and device based on traceability graph and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T06%3A04%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=YU%20LIBIN&rft.date=2023-07-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116471098A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true