Second dialing attack event identification method

The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WEI JIAHUI, LIU AN, LIU JUNWEN, ZHANG ZHENYE, XIA ANG, WANG ZIMENG, LI CHENGWEI, CAO YAOFU, ZHAO JINGCHENG, LU TENG, PAN XIN, LIN BINGJIE, YAN JUNLU, LI HUIMIN, HU WEI, LI QINGBO, SHI JIN, LI XIAOMENG, CUI ZHAOWEI, ZHAI QU, ZHANG ZHENING, LIU MENGQI, DAI DAWEI, CHENG JIE
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator WEI JIAHUI
LIU AN
LIU JUNWEN
ZHANG ZHENYE
XIA ANG
WANG ZIMENG
LI CHENGWEI
CAO YAOFU
ZHAO JINGCHENG
LU TENG
PAN XIN
LIN BINGJIE
YAN JUNLU
LI HUIMIN
HU WEI
LI QINGBO
SHI JIN
LI XIAOMENG
CUI ZHAOWEI
ZHAI QU
ZHANG ZHENING
LIU MENGQI
DAI DAWEI
CHENG JIE
description The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116743444A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116743444A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116743444A3</originalsourceid><addsrcrecordid>eNrjZDAMTk3Oz0tRSMlMzMnMS1dILClJTM5WSC1LzStRyEwBkplpmcmJJZn5eQq5qSUZ-Sk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MzcxNjExMTRmBg1AKASK9U</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Second dialing attack event identification method</title><source>esp@cenet</source><creator>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</creator><creatorcontrib>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</creatorcontrib><description>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230912&amp;DB=EPODOC&amp;CC=CN&amp;NR=116743444A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230912&amp;DB=EPODOC&amp;CC=CN&amp;NR=116743444A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEI JIAHUI</creatorcontrib><creatorcontrib>LIU AN</creatorcontrib><creatorcontrib>LIU JUNWEN</creatorcontrib><creatorcontrib>ZHANG ZHENYE</creatorcontrib><creatorcontrib>XIA ANG</creatorcontrib><creatorcontrib>WANG ZIMENG</creatorcontrib><creatorcontrib>LI CHENGWEI</creatorcontrib><creatorcontrib>CAO YAOFU</creatorcontrib><creatorcontrib>ZHAO JINGCHENG</creatorcontrib><creatorcontrib>LU TENG</creatorcontrib><creatorcontrib>PAN XIN</creatorcontrib><creatorcontrib>LIN BINGJIE</creatorcontrib><creatorcontrib>YAN JUNLU</creatorcontrib><creatorcontrib>LI HUIMIN</creatorcontrib><creatorcontrib>HU WEI</creatorcontrib><creatorcontrib>LI QINGBO</creatorcontrib><creatorcontrib>SHI JIN</creatorcontrib><creatorcontrib>LI XIAOMENG</creatorcontrib><creatorcontrib>CUI ZHAOWEI</creatorcontrib><creatorcontrib>ZHAI QU</creatorcontrib><creatorcontrib>ZHANG ZHENING</creatorcontrib><creatorcontrib>LIU MENGQI</creatorcontrib><creatorcontrib>DAI DAWEI</creatorcontrib><creatorcontrib>CHENG JIE</creatorcontrib><title>Second dialing attack event identification method</title><description>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAMTk3Oz0tRSMlMzMnMS1dILClJTM5WSC1LzStRyEwBkplpmcmJJZn5eQq5qSUZ-Sk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MzcxNjExMTRmBg1AKASK9U</recordid><startdate>20230912</startdate><enddate>20230912</enddate><creator>WEI JIAHUI</creator><creator>LIU AN</creator><creator>LIU JUNWEN</creator><creator>ZHANG ZHENYE</creator><creator>XIA ANG</creator><creator>WANG ZIMENG</creator><creator>LI CHENGWEI</creator><creator>CAO YAOFU</creator><creator>ZHAO JINGCHENG</creator><creator>LU TENG</creator><creator>PAN XIN</creator><creator>LIN BINGJIE</creator><creator>YAN JUNLU</creator><creator>LI HUIMIN</creator><creator>HU WEI</creator><creator>LI QINGBO</creator><creator>SHI JIN</creator><creator>LI XIAOMENG</creator><creator>CUI ZHAOWEI</creator><creator>ZHAI QU</creator><creator>ZHANG ZHENING</creator><creator>LIU MENGQI</creator><creator>DAI DAWEI</creator><creator>CHENG JIE</creator><scope>EVB</scope></search><sort><creationdate>20230912</creationdate><title>Second dialing attack event identification method</title><author>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116743444A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WEI JIAHUI</creatorcontrib><creatorcontrib>LIU AN</creatorcontrib><creatorcontrib>LIU JUNWEN</creatorcontrib><creatorcontrib>ZHANG ZHENYE</creatorcontrib><creatorcontrib>XIA ANG</creatorcontrib><creatorcontrib>WANG ZIMENG</creatorcontrib><creatorcontrib>LI CHENGWEI</creatorcontrib><creatorcontrib>CAO YAOFU</creatorcontrib><creatorcontrib>ZHAO JINGCHENG</creatorcontrib><creatorcontrib>LU TENG</creatorcontrib><creatorcontrib>PAN XIN</creatorcontrib><creatorcontrib>LIN BINGJIE</creatorcontrib><creatorcontrib>YAN JUNLU</creatorcontrib><creatorcontrib>LI HUIMIN</creatorcontrib><creatorcontrib>HU WEI</creatorcontrib><creatorcontrib>LI QINGBO</creatorcontrib><creatorcontrib>SHI JIN</creatorcontrib><creatorcontrib>LI XIAOMENG</creatorcontrib><creatorcontrib>CUI ZHAOWEI</creatorcontrib><creatorcontrib>ZHAI QU</creatorcontrib><creatorcontrib>ZHANG ZHENING</creatorcontrib><creatorcontrib>LIU MENGQI</creatorcontrib><creatorcontrib>DAI DAWEI</creatorcontrib><creatorcontrib>CHENG JIE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEI JIAHUI</au><au>LIU AN</au><au>LIU JUNWEN</au><au>ZHANG ZHENYE</au><au>XIA ANG</au><au>WANG ZIMENG</au><au>LI CHENGWEI</au><au>CAO YAOFU</au><au>ZHAO JINGCHENG</au><au>LU TENG</au><au>PAN XIN</au><au>LIN BINGJIE</au><au>YAN JUNLU</au><au>LI HUIMIN</au><au>HU WEI</au><au>LI QINGBO</au><au>SHI JIN</au><au>LI XIAOMENG</au><au>CUI ZHAOWEI</au><au>ZHAI QU</au><au>ZHANG ZHENING</au><au>LIU MENGQI</au><au>DAI DAWEI</au><au>CHENG JIE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Second dialing attack event identification method</title><date>2023-09-12</date><risdate>2023</risdate><abstract>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN116743444A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Second dialing attack event identification method
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T22%3A51%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEI%20JIAHUI&rft.date=2023-09-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116743444A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true