Network security defense method and system for autonomously identifying attack monitoring
The invention discloses a network security defense method for autonomously identifying attack monitoring, which relates to the technical field of network security, and comprises the following steps: collecting data in real time and preprocessing the data, and establishing an abnormal database throug...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | PAN XUANHONG ZHENG CHENGPING WANG CHENGPING YANG YUBO GAO RUIHONG |
description | The invention discloses a network security defense method for autonomously identifying attack monitoring, which relates to the technical field of network security, and comprises the following steps: collecting data in real time and preprocessing the data, and establishing an abnormal database through a twin training model to form an abnormal data source; the inspection assistant judges the attack behavior essence by using the autonomous recognition model according to the number of the trigger sources, triggers the threat intelligence analysis library and adopts multi-level defense deployment; and when the data source system is not triggered to keep normal, performing whole-process abnormal behavior detection by using an abnormal inspection assistant, and performing feedback optimization. According to the method and the device, the possibility of false report and missing report is reduced, the requirement of manual intervention is reduced, the network data is quickly acquired and sorted, the subsequent analysi |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118300889A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118300889A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118300889A3</originalsourceid><addsrcrecordid>eNqNyrEKwjAQgOEsDqK-w_kAQkuXOEqpOHVycSqhuWhoc1dyVyRvr4MP4PTDx781jx71zXkCwXHNUQt4DEiCkFBf7MGRBymimCBwBrcqEydeZS4QPZLGUCI9wam6cYLEFJXzV_ZmE9wsePh1Z47X7t7eTrjwgLK4EQl1aPu6tk1VWXu-NP88H4QYO_8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network security defense method and system for autonomously identifying attack monitoring</title><source>esp@cenet</source><creator>PAN XUANHONG ; ZHENG CHENGPING ; WANG CHENGPING ; YANG YUBO ; GAO RUIHONG</creator><creatorcontrib>PAN XUANHONG ; ZHENG CHENGPING ; WANG CHENGPING ; YANG YUBO ; GAO RUIHONG</creatorcontrib><description>The invention discloses a network security defense method for autonomously identifying attack monitoring, which relates to the technical field of network security, and comprises the following steps: collecting data in real time and preprocessing the data, and establishing an abnormal database through a twin training model to form an abnormal data source; the inspection assistant judges the attack behavior essence by using the autonomous recognition model according to the number of the trigger sources, triggers the threat intelligence analysis library and adopts multi-level defense deployment; and when the data source system is not triggered to keep normal, performing whole-process abnormal behavior detection by using an abnormal inspection assistant, and performing feedback optimization. According to the method and the device, the possibility of false report and missing report is reduced, the requirement of manual intervention is reduced, the network data is quickly acquired and sorted, the subsequent analysi</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240705&DB=EPODOC&CC=CN&NR=118300889A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240705&DB=EPODOC&CC=CN&NR=118300889A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PAN XUANHONG</creatorcontrib><creatorcontrib>ZHENG CHENGPING</creatorcontrib><creatorcontrib>WANG CHENGPING</creatorcontrib><creatorcontrib>YANG YUBO</creatorcontrib><creatorcontrib>GAO RUIHONG</creatorcontrib><title>Network security defense method and system for autonomously identifying attack monitoring</title><description>The invention discloses a network security defense method for autonomously identifying attack monitoring, which relates to the technical field of network security, and comprises the following steps: collecting data in real time and preprocessing the data, and establishing an abnormal database through a twin training model to form an abnormal data source; the inspection assistant judges the attack behavior essence by using the autonomous recognition model according to the number of the trigger sources, triggers the threat intelligence analysis library and adopts multi-level defense deployment; and when the data source system is not triggered to keep normal, performing whole-process abnormal behavior detection by using an abnormal inspection assistant, and performing feedback optimization. According to the method and the device, the possibility of false report and missing report is reduced, the requirement of manual intervention is reduced, the network data is quickly acquired and sorted, the subsequent analysi</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyrEKwjAQgOEsDqK-w_kAQkuXOEqpOHVycSqhuWhoc1dyVyRvr4MP4PTDx781jx71zXkCwXHNUQt4DEiCkFBf7MGRBymimCBwBrcqEydeZS4QPZLGUCI9wam6cYLEFJXzV_ZmE9wsePh1Z47X7t7eTrjwgLK4EQl1aPu6tk1VWXu-NP88H4QYO_8</recordid><startdate>20240705</startdate><enddate>20240705</enddate><creator>PAN XUANHONG</creator><creator>ZHENG CHENGPING</creator><creator>WANG CHENGPING</creator><creator>YANG YUBO</creator><creator>GAO RUIHONG</creator><scope>EVB</scope></search><sort><creationdate>20240705</creationdate><title>Network security defense method and system for autonomously identifying attack monitoring</title><author>PAN XUANHONG ; ZHENG CHENGPING ; WANG CHENGPING ; YANG YUBO ; GAO RUIHONG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118300889A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>PAN XUANHONG</creatorcontrib><creatorcontrib>ZHENG CHENGPING</creatorcontrib><creatorcontrib>WANG CHENGPING</creatorcontrib><creatorcontrib>YANG YUBO</creatorcontrib><creatorcontrib>GAO RUIHONG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PAN XUANHONG</au><au>ZHENG CHENGPING</au><au>WANG CHENGPING</au><au>YANG YUBO</au><au>GAO RUIHONG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network security defense method and system for autonomously identifying attack monitoring</title><date>2024-07-05</date><risdate>2024</risdate><abstract>The invention discloses a network security defense method for autonomously identifying attack monitoring, which relates to the technical field of network security, and comprises the following steps: collecting data in real time and preprocessing the data, and establishing an abnormal database through a twin training model to form an abnormal data source; the inspection assistant judges the attack behavior essence by using the autonomous recognition model according to the number of the trigger sources, triggers the threat intelligence analysis library and adopts multi-level defense deployment; and when the data source system is not triggered to keep normal, performing whole-process abnormal behavior detection by using an abnormal inspection assistant, and performing feedback optimization. According to the method and the device, the possibility of false report and missing report is reduced, the requirement of manual intervention is reduced, the network data is quickly acquired and sorted, the subsequent analysi</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN118300889A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Network security defense method and system for autonomously identifying attack monitoring |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T01%3A46%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PAN%20XUANHONG&rft.date=2024-07-05&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118300889A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |