Second dialing attack event identification method
The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | WEI JIAHUI LIU AN LIU JUNWEN ZHANG ZHENYE XIA ANG WANG ZIMENG LI CHENGWEI CAO YAOFU ZHAO JINGCHENG LU TENG PAN XIN LIN BINGJIE YAN JUNLU LI HUIMIN HU WEI LI QINGBO SHI JIN LI XIAOMENG CUI ZHAOWEI ZHAI QU ZHANG ZHENING LIU MENGQI DAI DAWEI CHENG JIE |
description | The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116743444A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116743444A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116743444A3</originalsourceid><addsrcrecordid>eNrjZDAMTk3Oz0tRSMlMzMnMS1dILClJTM5WSC1LzStRyEwBkplpmcmJJZn5eQq5qSUZ-Sk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MzcxNjExMTRmBg1AKASK9U</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Second dialing attack event identification method</title><source>esp@cenet</source><creator>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</creator><creatorcontrib>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</creatorcontrib><description>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230912&DB=EPODOC&CC=CN&NR=116743444A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230912&DB=EPODOC&CC=CN&NR=116743444A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEI JIAHUI</creatorcontrib><creatorcontrib>LIU AN</creatorcontrib><creatorcontrib>LIU JUNWEN</creatorcontrib><creatorcontrib>ZHANG ZHENYE</creatorcontrib><creatorcontrib>XIA ANG</creatorcontrib><creatorcontrib>WANG ZIMENG</creatorcontrib><creatorcontrib>LI CHENGWEI</creatorcontrib><creatorcontrib>CAO YAOFU</creatorcontrib><creatorcontrib>ZHAO JINGCHENG</creatorcontrib><creatorcontrib>LU TENG</creatorcontrib><creatorcontrib>PAN XIN</creatorcontrib><creatorcontrib>LIN BINGJIE</creatorcontrib><creatorcontrib>YAN JUNLU</creatorcontrib><creatorcontrib>LI HUIMIN</creatorcontrib><creatorcontrib>HU WEI</creatorcontrib><creatorcontrib>LI QINGBO</creatorcontrib><creatorcontrib>SHI JIN</creatorcontrib><creatorcontrib>LI XIAOMENG</creatorcontrib><creatorcontrib>CUI ZHAOWEI</creatorcontrib><creatorcontrib>ZHAI QU</creatorcontrib><creatorcontrib>ZHANG ZHENING</creatorcontrib><creatorcontrib>LIU MENGQI</creatorcontrib><creatorcontrib>DAI DAWEI</creatorcontrib><creatorcontrib>CHENG JIE</creatorcontrib><title>Second dialing attack event identification method</title><description>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAMTk3Oz0tRSMlMzMnMS1dILClJTM5WSC1LzStRyEwBkplpmcmJJZn5eQq5qSUZ-Sk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSTe2c_Q0MzcxNjExMTRmBg1AKASK9U</recordid><startdate>20230912</startdate><enddate>20230912</enddate><creator>WEI JIAHUI</creator><creator>LIU AN</creator><creator>LIU JUNWEN</creator><creator>ZHANG ZHENYE</creator><creator>XIA ANG</creator><creator>WANG ZIMENG</creator><creator>LI CHENGWEI</creator><creator>CAO YAOFU</creator><creator>ZHAO JINGCHENG</creator><creator>LU TENG</creator><creator>PAN XIN</creator><creator>LIN BINGJIE</creator><creator>YAN JUNLU</creator><creator>LI HUIMIN</creator><creator>HU WEI</creator><creator>LI QINGBO</creator><creator>SHI JIN</creator><creator>LI XIAOMENG</creator><creator>CUI ZHAOWEI</creator><creator>ZHAI QU</creator><creator>ZHANG ZHENING</creator><creator>LIU MENGQI</creator><creator>DAI DAWEI</creator><creator>CHENG JIE</creator><scope>EVB</scope></search><sort><creationdate>20230912</creationdate><title>Second dialing attack event identification method</title><author>WEI JIAHUI ; LIU AN ; LIU JUNWEN ; ZHANG ZHENYE ; XIA ANG ; WANG ZIMENG ; LI CHENGWEI ; CAO YAOFU ; ZHAO JINGCHENG ; LU TENG ; PAN XIN ; LIN BINGJIE ; YAN JUNLU ; LI HUIMIN ; HU WEI ; LI QINGBO ; SHI JIN ; LI XIAOMENG ; CUI ZHAOWEI ; ZHAI QU ; ZHANG ZHENING ; LIU MENGQI ; DAI DAWEI ; CHENG JIE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116743444A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WEI JIAHUI</creatorcontrib><creatorcontrib>LIU AN</creatorcontrib><creatorcontrib>LIU JUNWEN</creatorcontrib><creatorcontrib>ZHANG ZHENYE</creatorcontrib><creatorcontrib>XIA ANG</creatorcontrib><creatorcontrib>WANG ZIMENG</creatorcontrib><creatorcontrib>LI CHENGWEI</creatorcontrib><creatorcontrib>CAO YAOFU</creatorcontrib><creatorcontrib>ZHAO JINGCHENG</creatorcontrib><creatorcontrib>LU TENG</creatorcontrib><creatorcontrib>PAN XIN</creatorcontrib><creatorcontrib>LIN BINGJIE</creatorcontrib><creatorcontrib>YAN JUNLU</creatorcontrib><creatorcontrib>LI HUIMIN</creatorcontrib><creatorcontrib>HU WEI</creatorcontrib><creatorcontrib>LI QINGBO</creatorcontrib><creatorcontrib>SHI JIN</creatorcontrib><creatorcontrib>LI XIAOMENG</creatorcontrib><creatorcontrib>CUI ZHAOWEI</creatorcontrib><creatorcontrib>ZHAI QU</creatorcontrib><creatorcontrib>ZHANG ZHENING</creatorcontrib><creatorcontrib>LIU MENGQI</creatorcontrib><creatorcontrib>DAI DAWEI</creatorcontrib><creatorcontrib>CHENG JIE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEI JIAHUI</au><au>LIU AN</au><au>LIU JUNWEN</au><au>ZHANG ZHENYE</au><au>XIA ANG</au><au>WANG ZIMENG</au><au>LI CHENGWEI</au><au>CAO YAOFU</au><au>ZHAO JINGCHENG</au><au>LU TENG</au><au>PAN XIN</au><au>LIN BINGJIE</au><au>YAN JUNLU</au><au>LI HUIMIN</au><au>HU WEI</au><au>LI QINGBO</au><au>SHI JIN</au><au>LI XIAOMENG</au><au>CUI ZHAOWEI</au><au>ZHAI QU</au><au>ZHANG ZHENING</au><au>LIU MENGQI</au><au>DAI DAWEI</au><au>CHENG JIE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Second dialing attack event identification method</title><date>2023-09-12</date><risdate>2023</risdate><abstract>The invention discloses a second dial attack event identification method. The method comprises the following steps: acquiring security alarm data about asset access conditions of network security equipment in real time; establishing a sliding time window; for each asset, counting the total number of attack IP addresses of the asset in the current time window and the average number of attacks of each attack IP address; for each asset, judging whether the asset has a second dial attack event in the current time window; and analyzing second dial attack event conditions in a time period based on the sliding window to obtain second dial attack event durations, and distinguishing different second dial attack events. According to the method provided by the invention, the second dial attack event can be automatically identified from a plurality of time window segments, and the second dial attack event with unknown duration is divided and embodied in a plurality of time segments; according to the method, whether the e</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116743444A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Second dialing attack event identification method |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T22%3A51%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEI%20JIAHUI&rft.date=2023-09-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116743444A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |