CN117596009A - Local security management system and method - Google Patents
Local security management system and method Download PDFInfo
- Publication number
- CN117596009A CN117596009A CN202311291873.8A CN202311291873A CN117596009A CN 117596009 A CN117596009 A CN 117596009A CN 202311291873 A CN202311291873 A CN 202311291873A CN 117596009 A CN117596009 A CN 117596009A
- Authority
- CN
- China
- Prior art keywords
- data
- analysis
- security
- cloud
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域Technical field
本发明涉及网络安全技术领域,特别是一种本地安全管理系统及方法。The invention relates to the field of network security technology, in particular to a local security management system and method.
背景技术Background technique
目前,传统本地安全防护措施基本上覆盖了网络层、主机层、应用层以及数据层,但现有网络安全隐患仍然存在。At present, traditional local security protection measures basically cover the network layer, host layer, application layer and data layer, but existing network security risks still exist.
主要需求有安全态势感知需求:针对单位网络整体范围或某一特定时间,形成整体安全态势感知及对未来短期的预测,通过态势分析能够很好的洞察单位内部整体安全状态,需要通过量化的评判指标能够直观的理解当前态势情况;网络威胁检测需求:实时进行网络威胁检测,消除安全孤岛所导致的数据割裂问题,同时能够实时监测网络中各组成部分的安全状态,包括IPS(入侵防御系统,Intrusion Prevention System)单方面监测到的安全事件上,IPS与审计系统关联多发现的高风险网络行为等。The main requirement is security situation awareness: to form an overall security situation awareness and a short-term prediction for the future based on the entire scope of the unit network or a specific time. Situation analysis can provide a good insight into the overall security status within the unit, which requires quantitative evaluation. Indicators can intuitively understand the current situation; network threat detection requirements: real-time network threat detection, eliminating data fragmentation problems caused by security islands, and being able to monitor the security status of each component in the network in real time, including IPS (Intrusion Prevention System, Intrusion Prevention System) unilaterally monitors security incidents, and high-risk network behaviors are frequently discovered in association with IPS and audit systems.
还有内部威胁发现需求:内部安全威胁一般是比较难以发现和防范的,但是统计数据显示,超过2/3的安全攻击和数据泄露都源自组织内部,本地平台需要能够建立各类场景化的安全模型,以实现快速准确的发现各种内部人员违规或高危的操作;攻击溯源取证需求:目前安全事件难以找到源头,难以发现攻击过程,难以了解安全攻击状态。因此,需要对安全事件实现攻击溯源取证。There is also a need for internal threat detection: Internal security threats are generally difficult to detect and prevent, but statistics show that more than 2/3 of security attacks and data leaks originate from within the organization. The local platform needs to be able to establish various scenario-based Security model to quickly and accurately discover various insider violations or high-risk operations; attack source traceability and evidence collection requirements: It is currently difficult to find the source of security events, discover the attack process, and understand the security attack status. Therefore, it is necessary to implement attack source tracing and evidence collection for security incidents.
因此,亟需一种本地安全管理平台,能够直观洞察当前安全态势,消除安全孤岛实时监测网络中各组成部分的安全状态,快速准确的发现内部危险,实现攻击溯源取证。Therefore, there is an urgent need for a local security management platform that can intuitively gain insight into the current security situation, eliminate security islands, monitor the security status of each component in the network in real time, quickly and accurately discover internal dangers, and achieve attack source traceability and evidence collection.
发明内容Contents of the invention
鉴于现有的网络安全隐患存在的问题,提出了本发明。In view of the problems existing in the existing network security risks, the present invention is proposed.
因此,本发明所要解决的问题在于如何在安全事件找到源头并发现攻击过程,从而实现攻击溯源取证。Therefore, the problem to be solved by the present invention is how to find the source of a security event and discover the attack process, so as to realize attack source traceability and evidence collection.
为解决上述技术问题,本发明提供如下技术方案:In order to solve the above technical problems, the present invention provides the following technical solutions:
第一方面,本发明实施例提供了一种本地安全管理系统,其包括指挥运营单元包括安全态势分析模块、安全事件管理模块、溯源分析模块、响应处置模块、评估改进模块以及指挥调度模块;安全态势分析模块用于设定检测分析单元和指挥运营单元需要展示分析的数据类型并进行展示;安全事件管理模块用于配置查询条件,并配置安全事件与严重等级和威胁分值的关联表,溯源分析模块内置多种威胁溯源方式,响应处置模块用于可视化编排安全策略,指挥调度模块用于内置任务规划内容包;以及,检测分析单元包括多个引擎工具和检测工具,用于对神经元单元记录的打点数据和样本数据进行检测分析。In a first aspect, embodiments of the present invention provide a local security management system, which includes a command operation unit including a security situation analysis module, a security event management module, a traceability analysis module, a response processing module, an assessment and improvement module, and a command and dispatch module; security The situation analysis module is used to set and display the data types that the detection analysis unit and command operation unit need to display and analyze; the security event management module is used to configure query conditions, and configure the association table of security events with severity levels and threat scores to trace the source. The analysis module has multiple built-in threat tracing methods, the response processing module is used to visually orchestrate security policies, and the command and dispatch module is used to build in task planning content packages; and the detection and analysis unit includes multiple engine tools and detection tools for analyzing neuron units. The recorded spot data and sample data are tested and analyzed.
作为本发明本地安全管理系统的一种优选方案,其中:安全事件管理模块具体用于配置查询条件调用检测分析单元的引擎工具;持续自动分析和关联整合攻击相关的安全数据信息,按攻击时序生成安全事件,根据关联表获得严重等级及威胁分值,将安全事件标注严重等级及威胁分值后转换为可视化的攻击链路图;威胁溯源方式包括各类交互式检索分析以及自动化威胁溯源结果展示;交互式检索分析为按照威胁种类,分别设置每种威胁种类的多个字段关键字,对时间窗口自定义查询,设置过滤条件查询,以时间轴维度通过进行上述查询,溯源展示安全事件过程以及全部上下文信息,自动智能聚合关联的日志、流量和告警信息,对日志和流量数据进行信息下钻,获得威胁源头的路径;安全策略包括日常安全任务、响应预案、告警以及事件处置;日常安全任务通过定时触发或手动触发,用于日常检测所有本地威胁;响应预案预设动作脚本,用于与多种主流设备及系统联动,执行告警和联动响应主流设备及系统进行事件处置;任务规划内容包包括护网阶段、护网阶段重点任务及说明,根据护网阶段重点任务对神经元单元、检测分析单元、大数据单元以及云端服务单元进行规划、分解、分配和跟踪调度;评估改进模块用于对安全时间进行评估分析和提供改进方案。As a preferred solution of the local security management system of the present invention, the security event management module is specifically used to configure the engine tool of the query condition call detection analysis unit; continuously automatically analyzes and correlates and integrates attack-related security data information, and generates it according to the attack sequence. For security events, the severity level and threat score are obtained according to the correlation table, and the security event is marked with the severity level and threat score and then converted into a visual attack link diagram; threat tracing methods include various interactive retrieval analysis and automated threat tracing results display ;Interactive retrieval analysis is to set multiple field keywords for each threat type according to the threat type, customize the query for the time window, set the filter condition query, and perform the above query in the timeline dimension to trace the source and display the security event process and All contextual information, automatically and intelligently aggregate related log, traffic and alarm information, drill down on log and traffic data, and obtain the path to the source of threats; security policies include daily security tasks, response plans, alarms and event handling; daily security tasks It is used to detect all local threats on a daily basis through scheduled triggering or manual triggering; the preset action script of the response plan is used to link with a variety of mainstream equipment and systems to execute alarms and linkage to respond to mainstream equipment and systems for event handling; task planning content package Including the network protection phase, key tasks and descriptions of the network protection phase, planning, decomposition, allocation and tracking and scheduling of neuron units, detection analysis units, big data units and cloud service units according to the key tasks of the network protection phase; the evaluation and improvement module is used Evaluate and analyze safety time and provide improvement plans.
作为本发明本地安全管理系统的一种优选方案,其中:评估改进模块还用于提供可视化BI分析、资产分析评估、智能仪表盘展示、自动化报告以及持续评估功能;可视化BI分析将安全事件进行图表展示;图表展示包括直方图、折线图、面积图、饼图以及表格;资产分析评估的维度信息包括资产重要性、资产脆弱性情况和资产受到威胁攻击情况;智能仪表盘展示通过界面展示安全事件,将直接下钻到详细安全事件的事件内容,并通过安全事件的事件内容下钻到关联资产和威胁源头;自动化报告为配置报告周期后,根据预设的“宏”自动化生成预定义的报告,报告为对安全概况、事件、IP地址、端口、服务、安全事件的严重等级及威胁分值、攻击种类以及用户进行统计。As a preferred solution of the local security management system of the present invention, the assessment improvement module is also used to provide visual BI analysis, asset analysis and assessment, intelligent dashboard display, automated reporting and continuous assessment functions; the visual BI analysis charts security events Display; chart display includes histograms, line charts, area charts, pie charts, and tables; dimensional information for asset analysis and evaluation includes asset importance, asset vulnerability, and asset threat attacks; intelligent dashboard display displays security events through the interface , will directly drill down to the event content of detailed security events, and drill down to associated assets and threat sources through the event content of security events; automated reporting is to automatically generate predefined reports based on the preset "macro" after configuring the reporting cycle. , the report provides statistics on security profiles, events, IP addresses, ports, services, severity levels and threat scores of security events, attack types, and users.
作为本发明本地安全管理系统的一种优选方案,其中:本地安全管理系统还包括,神经元单元用于通过检测设备与响应产品分类收集打点数据和样本数据,且神经元单元根据指挥运营单元的调度动态调整打点数据的打点范围及按需上传打点数据至检测分析单元;云端服务单元与检测分析单元实现交互。As a preferred solution of the local security management system of the present invention, the local security management system also includes a neuron unit for collecting point data and sample data through detection equipment and response product classification, and the neuron unit is configured according to the command operation unit. The schedule dynamically adjusts the scoring range of the scoring data and uploads the scoring data to the detection and analysis unit on demand; the cloud service unit interacts with the detection and analysis unit.
作为本发明本地安全管理系统的一种优选方案,其中:终端神经元包括终端行为数据记录和用户行为数据记录;终端行为数据记录为对文件行为数据、注册表行为数据、进程操作行为数据、文件释放行为数据、内存操作行为数据、进程网络访问行为数据的记录;用户行为数据记录为对用户Web访问数据、用户账号登录数据、用户应用安装运行数据、用户外设使用数据的记录;网络神经元用于对网络行为的全记录;网络神经元支持对网络流量的DPI和DFI分析,支持高速大流量采集,支持AF-PACKET或DPDK模式下,网络流量旁路镜像多网口采集,支持流量采集黑白名单;支持各类抓包工具对采集到的流量进行自动分割和提取,将全量网络流量转化成的标准化字段存储;支持对全量的原始PCAP包进行数据存储;支持对多个传输协议传输的可执行文件、文档文件、压缩文件还原。As a preferred solution of the local security management system of the present invention, the terminal neurons include terminal behavior data records and user behavior data records; the terminal behavior data records include file behavior data, registry behavior data, process operation behavior data, and file behavior data. Records of release behavior data, memory operation behavior data, and process network access behavior data; user behavior data records include user Web access data, user account login data, user application installation and operation data, and user peripheral usage data; network neurons Used to fully record network behaviors; network neurons support DPI and DFI analysis of network traffic, support high-speed large traffic collection, support network traffic bypass mirroring multi-network port collection in AF-PACKET or DPDK mode, and support traffic collection Black and white lists; supports various packet capture tools to automatically segment and extract the collected traffic, and converts all network traffic into standardized field storage; supports data storage of all original PCAP packets; supports transmission of multiple transmission protocols Restore executable files, document files, and compressed files.
作为本发明本地安全管理系统的一种优选方案,其中:查杀云通过云端提供多维度的检测和查杀服务;沙箱云用于提供多样化云端沙箱的订阅服务并包括针对不同终端、不同系统、不同应用以及不同场景的沙箱,并将行为分析和传统的特征匹配通过自动化或人机协同的沙箱结合起来,发现未知威胁;分析云通过API调用向外赋能,并通过在分析云开发和运行新的分析工具为外部专家提供平台服务;知识云用于将网络攻击技战术、攻击工具和攻击者组织的信息提供云端订阅服务。As a preferred solution of the local security management system of the present invention, the killing cloud provides multi-dimensional detection and killing services through the cloud; the sandbox cloud is used to provide diversified cloud sandbox subscription services and includes services for different terminals, Sandboxes for different systems, different applications, and different scenarios combine behavioral analysis and traditional feature matching through automated or human-computer collaboration sandboxes to discover unknown threats; the analysis cloud enables external empowerment through API calls, and The Analysis Cloud develops and runs new analysis tools to provide platform services for external experts; the Knowledge Cloud is used to provide cloud subscription services for information on network attack techniques, tactics, attack tools, and attacker organizations.
作为本发明本地安全管理系统的一种优选方案,其中:漏洞云用于提供公共的漏洞招领、企业专属的SRC、定向的漏洞众测以及基于漏洞感知的威胁情报的云端订阅服务;情报云通过情报集成、深度分析、API提供威胁情报查询以及云端订阅服务;专家云用于提供专家咨询的云端订阅服务;实战云通过云端攻击行为分析中心分析攻防技战法,输出攻防成果报告,还用于提供防御方案验证、应急响应训练、安全设备评估以及信息系统深度评估的云端订阅服务;培训云用于提供安全培训课程的云端订阅服务。As a preferred solution of the local security management system of the present invention, the vulnerability cloud is used to provide cloud subscription services for public vulnerability recruitment, enterprise-specific SRC, targeted vulnerability public testing, and threat intelligence based on vulnerability awareness; the intelligence cloud is Intelligence integration, in-depth analysis, and API provide threat intelligence query and cloud subscription services; the expert cloud is used to provide cloud subscription services for expert consultation; the actual combat cloud analyzes offensive and defensive techniques and tactics through the cloud attack behavior analysis center, outputs attack and defense results reports, and is also used It provides cloud subscription services for defense plan verification, emergency response training, security equipment assessment and in-depth assessment of information systems; the training cloud is used to provide cloud subscription services for security training courses.
作为本发明本地安全管理系统的一种优选方案,其中:大数据单元,包括数据采集模块、数据解析模块、数据标准化模块、数据丰富化模块、数据存储模块、数据检索与计算模块;数据采集模块,通过从各种数据源采集不同格式的数据,数据解析模块,通过对采集到的原始数据进行解析和提取;As a preferred solution of the local security management system of the present invention, the big data unit includes a data collection module, a data analysis module, a data standardization module, a data enrichment module, a data storage module, and a data retrieval and calculation module; a data collection module , by collecting data in different formats from various data sources, the data analysis module parses and extracts the collected raw data;
数据标准化模块,用于将处理和转换的数据标准化到规定的数据格式和模型;数据丰富化模块,用于为数据添加更多的背景信息和上下文数据;数据存储模块,负责数据的持久化存储,并支持数据压缩和索引;数据检索与计算模块,通过对存储的数据进行查询、统计和挖掘的复杂计算和分析处理,并以实时或批量方式从数据中提取价值;数据服务模块,通过对外提供数据服务,返回分析和计算结果。The data standardization module is used to standardize the processed and converted data to the prescribed data format and model; the data enrichment module is used to add more background information and contextual data to the data; the data storage module is responsible for the persistent storage of data , and supports data compression and indexing; the data retrieval and calculation module, through complex calculation and analysis processing of query, statistics and mining of stored data, and extracts value from the data in real-time or batch mode; the data service module, through external Provide data services and return analysis and calculation results.
作为本发明本地安全管理系统的一种优选方案,其中:引擎工具包括以下至少之一:引擎工具包括查杀引擎、API检测引擎、终端行为分析引擎、网络行为分析引擎、沙箱检测引擎、关联分析引擎、情报检测引擎以及AI分析引擎;检测工具包括样本云检测、ATT&CK检测。As a preferred solution of the local security management system of the present invention, the engine tool includes at least one of the following: the engine tool includes a killing engine, an API detection engine, a terminal behavior analysis engine, a network behavior analysis engine, a sandbox detection engine, and an association engine. Analysis engine, intelligence detection engine and AI analysis engine; detection tools include sample cloud detection and ATT&CK detection.
第二方面,本发明实施例提供了一种本地安全管理平台方法,其包括:大数据单元采用分布式存储架构包括以下步骤:数据预处理,对原始数据集进行清洗、去噪和格式化的预处理,将数据处理成结构化的数据格式;切分数据,将大数据集按照一定规则切分成多个数据块;创建元数据,记录每个数据块的数据源、数据格式和存储位置元数据的元信息,并将元数据存储在Master节点;存储数据块,将数据块复制到集群的多个数据节点上,可设置复制份数;读取数据,计算程序根据元数据从数据节点并行读取需要处理的数据块;计算分析,根据业务逻辑对数据进行分布式计算和分析;返回结果,汇总所有数据节点的计算结果,将组装最终结果返回给用户或应用程序。In the second aspect, embodiments of the present invention provide a local security management platform method, which includes: the big data unit adopts a distributed storage architecture and includes the following steps: data preprocessing, cleaning, denoising and formatting of the original data set. Preprocessing, processing the data into a structured data format; segmenting the data, dividing the large data set into multiple data blocks according to certain rules; creating metadata, recording the data source, data format and storage location of each data block Meta information of the data, and store the metadata in the Master node; store data blocks, copy the data blocks to multiple data nodes in the cluster, and set the number of copies; read the data, and the calculation program runs in parallel from the data nodes based on the metadata Read the data blocks that need to be processed; calculate and analyze, perform distributed calculation and analysis on the data according to business logic; return the results, summarize the calculation results of all data nodes, and return the final assembled results to the user or application.
本发明有益效果为:本发明设置神经元单元,将快速抓取用户环境中的一系列检测设备与响应产品的使用数据和网络数据;大数据单元用于根据神经元单元获取的数据;检测分析单元和云端服务单元分别用于提供安全检索和更新提高安全服务;神经元单元分类收集打点数据和样本数据,将消除安全孤岛,并实时监测网络中各组成部分的安全状态;指挥运营单元能够进行安全态势分析、安全事件管理、溯源分析、响应处置、评估改进以及指挥调度,用于快速准确的发现内部危险,实现攻击溯源取证;并通过上述设置,覆盖安全产品和大数据信息进行监测,能够直观洞察当前安全态势,消除安全孤岛实时监测网络中各组成部分的安全状态,快速准确的发现内部危险,实现攻击溯源取证。The beneficial effects of the present invention are: the present invention sets neuron units to quickly capture the usage data and network data of a series of detection equipment and response products in the user environment; the big data unit is used to obtain data based on the neuron units; detection and analysis The unit and cloud service unit are respectively used to provide secure retrieval and update to improve security services; the neuron unit collects management data and sample data in categories, which will eliminate security islands and monitor the security status of each component in the network in real time; the command operation unit can perform Security situation analysis, security event management, traceability analysis, response processing, assessment improvement, and command and dispatch are used to quickly and accurately discover internal dangers and realize attack source traceability and evidence collection; and through the above settings, cover security products and big data information for monitoring, and can Intuitively gain insight into the current security situation, eliminate security islands, monitor the security status of each component in the network in real time, quickly and accurately discover internal dangers, and achieve attack source traceability and evidence collection.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。其中:In order to explain the technical solutions of the embodiments of the present invention more clearly, the drawings needed to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. Those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts. in:
图1为实施例1本地安全管理平台系统的系统框架图。Figure 1 is a system framework diagram of the local security management platform system in Embodiment 1.
图2为实施例1本地安全管理平台系统的指挥运营中心大屏显示界面。Figure 2 is a large-screen display interface of the command and operation center of the local security management platform system in Embodiment 1.
图3为实施例1本地安全管理平台系统的大数据中心大屏显示界面。Figure 3 is a large-screen display interface of the big data center of the local security management platform system in Embodiment 1.
图4为实施例1本地安全管理平台系统的检测分析中心大屏显示界面。Figure 4 is a large-screen display interface of the detection and analysis center of the local security management platform system in Embodiment 1.
图5实施例2为本地安全管理平台系统的本地安全大屏显示界面。Figure 5 Embodiment 2 is a local security large-screen display interface of the local security management platform system.
具体实施方式Detailed ways
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合说明书附图对本发明的具体实施方式做详细的说明。In order to make the above objects, features and advantages of the present invention more obvious and understandable, the specific implementation modes of the present invention will be described in detail below with reference to the accompanying drawings.
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是本发明还可以采用其他不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本发明内涵的情况下做类似推广,因此本发明不受下面公开的具体实施例的限制。Many specific details are set forth in the following description to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Those skilled in the art can do so without departing from the connotation of the present invention. Similar generalizations are made, and therefore the present invention is not limited to the specific embodiments disclosed below.
其次,此处所称的“一个实施例”或“实施例”是指可包含于本发明至少一个实现方式中的特定特征、结构或特性。在本说明书中不同地方出现的“在一个实施例中”并非均指同一个实施例,也不是单独的或选择性的与其他实施例互相排斥的实施例。Second, reference herein to "one embodiment" or "an embodiment" refers to a specific feature, structure, or characteristic that may be included in at least one implementation of the present invention. "In one embodiment" appearing in different places in this specification does not all refer to the same embodiment, nor is it a separate or selective embodiment that is mutually exclusive with other embodiments.
实施例1Example 1
参照图1~图4,为本发明第一个实施例,该实施例提供了一种本地安全管理系统,包括神经元单元、云端服务单元、检测分析单元、大数据单元以及指挥运营单元。神经元单元连接大数据单元,大数据单元分别连接检测分析单元、指挥运营单元,云端服务单元分别连接检测分析单元、指挥运营单元。Referring to Figures 1 to 4, a first embodiment of the present invention is shown. This embodiment provides a local security management system, including a neuron unit, a cloud service unit, a detection analysis unit, a big data unit and a command and operation unit. The neuron unit is connected to the big data unit, the big data unit is connected to the detection and analysis unit and the command and operation unit respectively, and the cloud service unit is connected to the detection and analysis unit and the command and operation unit respectively.
具体的,指挥运营单元包括安全态势分析模块、安全事件管理模块、溯源分析模块、响应处置模块、评估改进模块以及指挥调度模块。其中,安全态势分析模块用于设定检测分析单元和指挥运营单元需要展示分析的数据类型并进行展示。Specifically, the command operation unit includes a security situation analysis module, a security event management module, a traceability analysis module, a response and disposal module, an assessment and improvement module, and a command and dispatch module. Among them, the security situation analysis module is used to set the data types that the detection analysis unit and the command operation unit need to display and analyze and display them.
进一步的,安全事件管理模块用于配置查询条件,并配置安全事件与严重等级和威胁分值的关联表;依据查询条件调用检测分析单元的引擎工具;持续自动分析和关联整合攻击相关的安全数据信息,按攻击时序生成安全事件,根据关联表获得严重等级及威胁分值,将安全事件标注严重等级及威胁分值后转换为可视化的攻击链路图。Further, the security event management module is used to configure query conditions and configure the association table of security events with severity levels and threat scores; call the engine tool of the detection analysis unit based on the query conditions; continuously and automatically analyze and associate and integrate attack-related security data Information, security events are generated according to the attack sequence, the severity level and threat score are obtained according to the correlation table, and the security events are marked with severity level and threat score and converted into a visual attack link diagram.
更进一步的,溯源分析模块内置多种威胁溯源方式,威胁溯源方式包括各类交互式检索分析以及自动化威胁溯源结果展示;交互式检索分析为按照威胁种类,分别设置每种威胁种类的多个字段关键字,对时间窗口自定义查询,设置过滤条件查询,以时间轴维度通过进行上述查询,溯源展示安全事件过程以及全部上下文信息,自动智能聚合关联的日志、流量和告警信息,对日志和流量数据进行信息下钻,获得威胁源头的路径。Furthermore, the traceability analysis module has built-in multiple threat traceability methods. Threat traceability methods include various types of interactive search analysis and automated threat traceability result display; interactive search analysis sets multiple fields for each threat type according to the threat type. Keywords, customize the query for the time window, set the filter condition query, perform the above query in the timeline dimension, trace the source and display the security event process and all contextual information, automatically and intelligently aggregate the associated logs, traffic and alarm information, and analyze the logs and traffic Drill down the data to obtain the path to the source of the threat.
具体的,响应处置模块用于可视化编排安全策略;安全策略包括日常安全任务、响应预案、告警、事件处置;日常安全任务通过定时触发或手动触发,用于日常检测所有本地威胁;响应预案预设动作脚本,用于与多种主流设备及系统联动,执行告警和联动响应主流设备及系统进行事件处置。Specifically, the response processing module is used to visually organize security policies; security policies include daily security tasks, response plans, alarms, and event handling; daily security tasks are triggered regularly or manually to detect all local threats on a daily basis; response plans are preset Action scripts are used to link with a variety of mainstream devices and systems to execute alarms and linkage to respond to mainstream devices and systems for event handling.
进一步的,指挥调度模块用于内置任务规划内容包;任务规划内容包包括护网阶段、护网阶段重点任务及说明,根据护网阶段重点任务对神经元单元、检测分析单元、大数据单元以及云端服务单元进行规划、分解、分配和跟踪调度。Further, the command and dispatch module is used to build a mission planning content package; the mission planning content package includes the network protection stage, key tasks and instructions in the network protection stage, and the neuron unit, detection analysis unit, big data unit and The cloud service unit performs planning, decomposition, allocation and tracking scheduling.
更进一步的,评估改进模块用于对安全时间进行评估分析和提供改进方案。Furthermore, the evaluation and improvement module is used to evaluate and analyze safety time and provide improvement plans.
具体的,评估改进模块还用于提供可视化BI分析、资产分析评估、智能仪表盘展示、自动化报告以及持续评估功能。Specifically, the assessment improvement module is also used to provide visual BI analysis, asset analysis and assessment, intelligent dashboard display, automated reporting and continuous assessment functions.
需要说明的,可视化BI分析将安全事件进行图表展示;图表展示包括直方图、折线图、面积图、饼图以及表格;资产分析评估的维度信息包括资产重要性、资产脆弱性情况和资产受到威胁攻击情况;智能仪表盘展示通过界面展示安全事件,将直接下钻到详细安全事件的事件内容,并通过安全事件的事件内容下钻到关联资产和威胁源头;自动化报告为配置报告周期后,根据预设的“宏”自动化生成预定义的报告,报告为对安全概况、事件、IP地址、端口、服务、安全事件的严重等级及威胁分值、攻击种类以及用户进行统计。It should be noted that visual BI analysis displays security events in charts; chart displays include histograms, line charts, area charts, pie charts, and tables; dimensional information in asset analysis and evaluation includes asset importance, asset vulnerability, and asset threats. Attack status; the intelligent dashboard display displays security events through the interface, and drills directly into the event content of detailed security events, and drills down to associated assets and threat sources through the event content of security events; automated reporting is based on the configured reporting cycle. The preset "macro" automatically generates predefined reports, which provide statistics on security profiles, events, IP addresses, ports, services, security event severity and threat scores, attack types, and users.
具体的,检测分析单元,包括多个引擎工具和检测工具,用于对神经元单元记录的打点数据和样本数据进行检测分析。Specifically, the detection and analysis unit includes multiple engine tools and detection tools, which are used to detect and analyze the point data and sample data recorded by the neuron unit.
进一步的,引擎工具包括查杀引擎、API检测引擎、终端行为分析引擎、网络行为分析引擎、沙箱检测引擎、关联分析引擎、情报检测引擎以及AI分析引擎;检测工具包括样本云检测、ATT&CK检测。Further, the engine tools include anti-virus engine, API detection engine, terminal behavior analysis engine, network behavior analysis engine, sandbox detection engine, correlation analysis engine, intelligence detection engine and AI analysis engine; detection tools include sample cloud detection, ATT&CK detection .
具体的,情报检测引擎分析加工后形成如下情报:失陷检测情报,有关攻击者的远程命令与控制服务器情报,用以发现内部被API组织、僵尸网络、木马软件、后门工具等控制的失陷主机。此类情报将推送到威胁情报平台,以保障高速查询的需要。Specifically, after analysis and processing by the intelligence detection engine, the following intelligence is formed: Compromise detection intelligence, information about the attacker's remote command and control server, used to discover compromised hosts internally controlled by API organizations, botnets, Trojan software, backdoor tools, etc. This type of intelligence will be pushed to the threat intelligence platform to ensure high-speed query needs.
进一步的,文件信誉,样本信誉库依赖自身强大的样本收集能力和先进的机器学习识别恶意软件的能力。以文件的HASH为索引,包括是否是白文件、是否恶意、恶意类型、家族信息等信息,针对已知木马、蠕虫类恶意软件,提供对应的网络IOC信息。样本信誉数据将在本地维护一个Cache库,不能命中的数据再到云端查询。Furthermore, the file reputation and sample reputation database rely on its powerful sample collection capabilities and advanced machine learning capabilities to identify malware. Using the file's HASH as an index, including information such as whether it is a white file, whether it is malicious, malicious type, family information, etc., corresponding network IOC information is provided for known Trojans and worm-like malware. The sample reputation data will maintain a Cache library locally, and the data that cannot be hit will be queried in the cloud.
更进一步的,IP情报,针对来自互联网攻击IP地址的情报信息,包括:是否有历史攻击行为、是否是IDC主机、是否是傀儡主机、是否是代理或Tor网主机、是否可能是扫描机器人等,用以过滤出优先级较高(或较低)的攻击事件,或了解攻击者的背景信息。IP类情报数量庞大且更新速度快,以云端查询为主。Further, IP intelligence refers to intelligence information from Internet attack IP addresses, including: whether there are historical attacks, whether it is an IDC host, whether it is a puppet host, whether it is a proxy or Tor network host, whether it may be a scanning robot, etc. It is used to filter out attack events with higher (or lower) priority, or to understand the background information of attackers. IP intelligence is huge in quantity and updated quickly, and is mainly queried on the cloud.
具体的,TTP情报,有关攻击者工具、技术、技战术手法的情报,具体包括和客户相关的攻击事件、恶意样本、软件漏洞等分析报告和预警通告,内容一般包括事件危害、影响范围、攻击机制、防范或检查机制能力。可以帮助组织提前预防攻击,并且有针对性的增强安全架构。Specifically, TTP intelligence refers to information about attacker tools, techniques, technical and tactical methods, including analysis reports and early warning notices on customer-related attack events, malicious samples, software vulnerabilities, etc. The content generally includes event hazards, scope of impact, and attacks. Mechanisms, prevention or inspection mechanism capabilities. It can help organizations prevent attacks in advance and enhance security architecture in a targeted manner.
进一步的,样本云检测,包括终端文件落地检测、终端文件落地检测、病毒引擎检测、恶意样本检测。Further, sample cloud detection includes terminal file landing detection, terminal file landing detection, virus engine detection, and malicious sample detection.
需要说明的是,AI分析引擎利用AI技术实现高级威胁检测任务,实现的过程分两步:第一步,使用特征工程等技术进行特征组合、特征选择等构造合适的特征集;第二步,基于特征集选择合适的机器学习或深度学习技术进行训练。常用的恶意样本特征包括连接持续时间、数据包个数、字节数、协议类型和网络流量长度等统计特征和类别特征。It should be noted that the AI analysis engine uses AI technology to implement advanced threat detection tasks. The implementation process is divided into two steps: the first step is to use feature engineering and other technologies to perform feature combination, feature selection, etc. to construct an appropriate feature set; the second step is to Select appropriate machine learning or deep learning techniques for training based on feature sets. Commonly used malicious sample characteristics include statistical characteristics and category characteristics such as connection duration, number of data packets, number of bytes, protocol type, and network traffic length.
具体的,神经元单元,用于通过检测设备与响应产品分类收集打点数据和样本数据;神经元单元根据指挥运营单元的调度动态调整打点数据的打点范围及按需上传打点数据至检测分析单元。Specifically, the neuron unit is used to collect scoring data and sample data through detection equipment and response product classification; the neuron unit dynamically adjusts the scoring range of the scoring data according to the dispatch of the command operation unit and uploads the scoring data to the detection and analysis unit on demand.
进一步的,终端神经元包括终端行为数据记录和用户行为数据记录;终端行为数据记录为对文件行为数据、注册表行为数据、进程操作行为数据、文件释放行为数据、内存操作行为数据、进程网络访问行为数据的记录;用户行为数据记录为对用户Web访问数据、用户账号登录数据、用户应用安装运行数据、用户外设使用数据的记录。Further, terminal neurons include terminal behavior data records and user behavior data records; terminal behavior data records include file behavior data, registry behavior data, process operation behavior data, file release behavior data, memory operation behavior data, and process network access Recording of behavioral data; user behavior data records include user Web access data, user account login data, user application installation and operation data, and user peripheral device usage data.
更进一步的,网络神经元用于对网络行为的全记录;网络神经元支持对网络流量的DPI和DFI分析,支持高速大流量采集,支持AF-PACKET或DPDK模式下,网络流量旁路镜像多网口采集,支持流量采集黑白名单;支持各类抓包工具对采集到的流量进行自动分割和提取,如WireShark等,将全量网络流量转化成的标准化字段存储;支持对全量的原始PCAP包进行数据存储;支持对SMTP、POP3、IMAP、HTTP、FTP以及SMB协议传输的可执行文件、文档文件和压缩文件还原。Furthermore, network neurons are used to fully record network behaviors; network neurons support DPI and DFI analysis of network traffic, support high-speed large traffic collection, and support multiple network traffic bypass mirrors in AF-PACKET or DPDK mode. Network port collection supports traffic collection black and white lists; supports various packet capture tools to automatically segment and extract the collected traffic, such as WireShark, etc., to convert the full amount of network traffic into standardized field storage; supports the full amount of original PCAP packets Data storage; supports restoration of executable files, document files and compressed files transmitted through SMTP, POP3, IMAP, HTTP, FTP and SMB protocols.
具体的,云端服务单元包括查杀云、沙箱云、分析云、知识云、漏洞云、情报云、专家云、实战云以及培训云,其与检测分析单元实现交互。Specifically, the cloud service unit includes a killing cloud, a sandbox cloud, an analysis cloud, a knowledge cloud, a vulnerability cloud, an intelligence cloud, an expert cloud, a combat cloud and a training cloud, which interact with the detection and analysis unit.
进一步的,查杀云通过云端提供多维度的检测和查杀服务;沙箱云用于提供云端沙箱的订阅服务并包括针对终端、系统、应用以及场景的沙箱,并将行为分析和传统的特征匹配通过自动化或人机协同的沙箱结合起来,发现未知威胁;分析云通过API调用向外赋能,并通过在分析云开发和运行新的分析工具为外部专家提供平台服务;知识云用于将网络攻击技战术、攻击工具和攻击者组织的信息提供云端订阅服务;漏洞云用于提供公共的漏洞招领、企业专属的SRC、定向的漏洞众测以及基于漏洞感知的威胁情报的云端订阅服务;情报云通过情报集成、深度分析、API提供威胁情报查询以及云端订阅服务;专家云用于提供专家咨询的云端订阅服务;实战云通过云端攻击行为分析中心分析攻防技战法,输出攻防成果报告,还用于提供防御方案验证、应急响应训练、安全设备评估以及信息系统深度评估的云端订阅服务;培训云用于提供安全培训课程的云端订阅服务。Furthermore, the killing cloud provides multi-dimensional detection and killing services through the cloud; the sandbox cloud is used to provide cloud sandbox subscription services and includes sandboxes for terminals, systems, applications and scenarios, and combines behavioral analysis with traditional Feature matching is combined with automated or human-machine collaborative sandboxes to discover unknown threats; the analysis cloud empowers external forces through API calls and provides platform services to external experts by developing and running new analysis tools in the analysis cloud; knowledge cloud It is used to provide cloud subscription services for information about network attack techniques and tactics, attack tools, and attacker organizations; the Vulnerability Cloud is used to provide public vulnerability recruitment, enterprise-specific SRC, targeted vulnerability public testing, and vulnerability awareness-based threat intelligence. Subscription service; Intelligence Cloud provides threat intelligence query and cloud subscription services through intelligence integration, in-depth analysis, and API; Expert Cloud is used to provide cloud subscription services for expert consultation; Practical Cloud analyzes offensive and defensive techniques and tactics through the cloud attack behavior analysis center, and outputs attack and defense The results report is also used to provide cloud subscription services for defense plan verification, emergency response training, security equipment assessment, and in-depth assessment of information systems; the training cloud is used to provide cloud subscription services for security training courses.
具体的,大数据单元包括数据采集模块、数据解析模块、数据标准化模块、数据丰富化模块、数据存储模块、数据检索与计算模块。Specifically, the big data unit includes a data collection module, a data analysis module, a data standardization module, a data enrichment module, a data storage module, and a data retrieval and calculation module.
需要说明的,数据采集模块,通过从各种数据源采集不同格式的数据;数据解析模块,通过对采集到的原始数据进行解析和提取;数据标准化模块,将处理和转换的数据标准化到规定的数据格式和模型;数据丰富化模块,为数据添加更多的背景信息和上下文数据;数据存储模块,负责数据的持久化存储,并支持数据压缩和索引;数据检索与计算模块,通过对存储的数据进行查询、统计和挖掘的复杂计算和分析处理,并以实时或批量方式从数据中提取价值;数据服务模块,通过对外提供数据服务,返回分析和计算结果。It should be noted that the data collection module collects data in different formats from various data sources; the data parsing module parses and extracts the collected raw data; the data standardization module standardizes the processed and converted data to the specified Data format and model; data enrichment module, which adds more background information and contextual data to the data; data storage module, which is responsible for the persistent storage of data and supports data compression and indexing; data retrieval and calculation module, through the storage The data performs complex calculation and analysis processing of query, statistics and mining, and extracts value from the data in real-time or batch mode; the data service module returns analysis and calculation results by providing external data services.
本实施例还提供一种计算机设备,适用于本地安全管理系统的情况,包括存储器和处理器;存储器用于存储计算机可执行指令,处理器用于执行计算机可执行指令,实现如上述实施例提出的本地安全管理系统。This embodiment also provides a computer device, which is suitable for local security management systems, including a memory and a processor; the memory is used to store computer executable instructions, and the processor is used to execute computer executable instructions to implement what is proposed in the above embodiment. Local security management system.
该计算机设备可以是终端,该计算机设备包括通过系统总线连接的处理器、存储器、通信接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的通信接口用于与外部的终端进行有线或无线方式的通信,无线方式可通过WIFI、运营商网络、NFC(近场通信)或其他技术实现。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。The computer device may be a terminal, and the computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected through a system bus. Wherein, the processor of the computer device is used to provide computing and control capabilities. The memory of the computer device includes non-volatile storage media and internal memory. The non-volatile storage medium stores operating systems and computer programs. This internal memory provides an environment for the execution of operating systems and computer programs in non-volatile storage media. The communication interface of the computer device is used for wired or wireless communication with external terminals. The wireless mode can be implemented through WIFI, operator network, NFC (Near Field Communication) or other technologies. The display screen of the computer device may be a liquid crystal display or an electronic ink display. The input device of the computer device may be a touch layer covered on the display screen, or may be a button, trackball or touch pad provided on the computer device shell. , it can also be an external keyboard, trackpad or mouse, etc.
本实施例还提供一种存储介质,其上存储有计算机程序,该程序被处理器执行时实现以下步骤:包括,指挥运营单元包括安全态势分析模块、安全事件管理模块、溯源分析模块、响应处置模块、评估改进模块以及指挥调度模块;安全态势分析模块用于设定检测分析单元和指挥运营单元需要展示分析的数据类型并进行展示;安全事件管理模块用于配置查询条件,并配置安全事件与严重等级和威胁分值的关联表,溯源分析模块内置多种威胁溯源方式,响应处置模块用于可视化编排安全策略,指挥调度模块用于内置任务规划内容包;以及,检测分析单元包括多个引擎工具和检测工具,用于对神经元单元记录的打点数据和样本数据进行检测分析。This embodiment also provides a storage medium on which a computer program is stored. When the program is executed by the processor, the following steps are implemented: including: the command operation unit includes a security situation analysis module, a security event management module, a traceability analysis module, and a response processing module. module, assessment improvement module, and command and dispatch module; the security situation analysis module is used to set and display the data types that the detection analysis unit and the command operation unit need to display and analyze; the security event management module is used to configure query conditions, and configure security events and There is a correlation table between severity levels and threat scores. The traceability analysis module has built-in multiple threat traceability methods. The response processing module is used to visually arrange security policies. The command and dispatch module is used to build in task planning content packages; and the detection and analysis unit includes multiple engines. Tools and detection tools are used to detect and analyze the point data and sample data recorded by neuron units.
综上,本发明设置神经元单元,将快速抓取用户环境中的一系列检测设备与响应产品的使用数据和网络数据;大数据单元用于根据神经元单元获取的数据;检测分析单元和云端服务单元分别用于提供安全检索和更新提高安全服务;神经元单元分类收集打点数据和样本数据,将消除安全孤岛,并实时监测网络中各组成部分的安全状态;指挥运营单元能够进行安全态势分析、安全事件管理、溯源分析、响应处置、评估改进以及指挥调度,用于快速准确的发现内部危险,实现攻击溯源取证;并通过上述设置,覆盖安全产品和大数据信息进行监测,能够直观洞察当前安全态势,消除安全孤岛实时监测网络中各组成部分的安全状态,快速准确的发现内部危险,实现攻击溯源取证。In summary, the present invention sets up neuron units to quickly capture usage data and network data of a series of detection devices and response products in the user environment; the big data unit is used to obtain data based on the neuron units; the detection analysis unit and the cloud The service units are respectively used to provide security retrieval and update to improve security services; the neuron unit collects point data and sample data by classification, which will eliminate security islands and monitor the security status of each component in the network in real time; the command operation unit can conduct security situation analysis , security event management, traceability analysis, response processing, assessment improvement, and command and dispatch, used to quickly and accurately discover internal dangers and achieve attack source traceability and evidence collection; and through the above settings, cover security products and big data information for monitoring, allowing intuitive insight into the current situation Security posture, eliminate security islands, monitor the security status of each component in the network in real time, quickly and accurately discover internal dangers, and achieve attack source traceability and evidence collection.
实施例2Example 2
参照图5,为本发明第二个实施例,该实施例提供了一种本地安全管理平台方法,为了验证本发明的有益效果,通过经济效益计算和仿真实验进行科学论证。Referring to Figure 5, a second embodiment of the present invention is shown. This embodiment provides a local security management platform method. In order to verify the beneficial effects of the present invention, scientific demonstration is carried out through economic benefit calculation and simulation experiments.
具体的,本实施例还提供一种本地安全管理方法,包括:大数据单元采用分布式存储架构包括以下步骤:数据预处理,对原始数据集进行清洗、去噪和格式化的预处理,将数据处理成结构化的数据格式;切分数据,将大数据集按照一定规则切分成多个数据块;创建元数据,记录每个数据块的数据源、数据格式和存储位置元数据的元信息,并将元数据存储在Master节点;存储数据块,将数据块复制到集群的多个数据节点上,可设置复制份数;读取数据,计算程序根据元数据从数据节点并行读取需要处理的数据块;计算分析,根据业务逻辑对数据进行分布式计算和分析;返回结果,汇总所有数据节点的计算结果,将组装最终结果返回给用户或应用程序。Specifically, this embodiment also provides a local security management method, including: the big data unit adopts a distributed storage architecture, including the following steps: data preprocessing, preprocessing of cleaning, denoising and formatting the original data set, and Process the data into a structured data format; segment the data and divide the large data set into multiple data blocks according to certain rules; create metadata and record the metainformation of the data source, data format and storage location metadata of each data block , and store metadata in the Master node; store data blocks, copy the data blocks to multiple data nodes in the cluster, and set the number of copies; read data, and the calculation program reads the metadata from the data nodes in parallel and needs to be processed Data blocks; calculation and analysis, perform distributed calculation and analysis on data according to business logic; return results, summarize the calculation results of all data nodes, and return the final assembled results to the user or application.
应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换,而不脱离本发明技术方案的精神和范围,其均应涵盖在本发明的权利要求范围当中。It should be noted that the above embodiments are only used to illustrate the technical solution of the present invention rather than to limit it. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solution of the present invention can be carried out. Modifications or equivalent substitutions without departing from the spirit and scope of the technical solution of the present invention shall be included in the scope of the claims of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311291873.8A CN117596009A (en) | 2023-10-08 | 2023-10-08 | Local security management system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311291873.8A CN117596009A (en) | 2023-10-08 | 2023-10-08 | Local security management system and method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN117596009A true CN117596009A (en) | 2024-02-23 |
Family
ID=89918954
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311291873.8A Withdrawn CN117596009A (en) | 2023-10-08 | 2023-10-08 | Local security management system and method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117596009A (en) |
-
2023
- 2023-10-08 CN CN202311291873.8A patent/CN117596009A/en not_active Withdrawn
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN117879970B (en) | Network security protection method and system | |
| US20230011004A1 (en) | Cyber security sandbox environment | |
| US12407712B2 (en) | Artificial intelligence cyber security analyst | |
| US20230135660A1 (en) | Educational Tool for Business and Enterprise Risk Management | |
| CN112651006B (en) | Power grid security situation sensing system | |
| US20210273961A1 (en) | Apparatus and method for a cyber-threat defense system | |
| US20230132703A1 (en) | Capturing Importance In A Network Using Graph Theory | |
| US20220360597A1 (en) | Cyber security system utilizing interactions between detected and hypothesize cyber-incidents | |
| WO2025035511A1 (en) | Active defense system and method for unknown threat | |
| US9961047B2 (en) | Network security management | |
| GB2601919A (en) | Cyber Defence System | |
| CN119205351A (en) | A method and device for tracking and tracing asset risks | |
| Bezas et al. | Comparative analysis of open source security information & event management systems (siems) | |
| CN101452469A (en) | Software safety defect library system based on attack mode and management method thereof | |
| CN118214605A (en) | Cross-regional group company network security management method and system | |
| CN113240116B (en) | Wisdom fire prevention cloud system based on class brain platform | |
| AU2022306862A1 (en) | Cyber security system utilizing interactions between detected and hypothesize cyber-incidents | |
| CN118802230A (en) | Safety analysis system | |
| CN119276543A (en) | An adaptive network security early warning system and method based on deep learning | |
| Grahn et al. | Analytics for network security: A survey and taxonomy | |
| CN113709170A (en) | Asset safe operation system, method and device | |
| CN115766235A (en) | Network security early warning system and early warning method | |
| WO2025027053A1 (en) | Processing cybersecurity telemetry data | |
| CN117596009A (en) | Local security management system and method | |
| Gnatyuk et al. | Software System for Cybersecurity Events Correlation and Incident Management in Critical Infrastructure |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WW01 | Invention patent application withdrawn after publication | ||
| WW01 | Invention patent application withdrawn after publication |
Application publication date: 20240223 |