首页> 外国专利> Network attack signature generation

Network attack signature generation

机译:网络攻击签名生成

摘要

A method to identify a network attack based on a signature of malicious network traffic. An attacker at Host 0 may be able to gain access to Host 1 or Host 2 by exploiting vulnerabilities in the services sv0-sv5 to create a series of exploits or attack steps. An Attack Detector 220 applies a Traffic Filter 222 to the Network Traffic 234 to identify a subset of the traffic. The subset only includes traffic that is associated with services that are both: i) identified by data modelling relationships between vulnerabilities such as Attack Graph 230, ii) identified by IDS 232 as currently being under attack. The Signature Generator 224 creates an attack signature based upon this filtered traffic. The signature may be used by the Traffic Monitor 226 to identify the network attack and to flag it as Network Attack Identification 250.
机译:一种基于恶意网络流量签名识别网络攻击的方法。主机0上的攻击者可以通过利用服务sv0-sv5中的漏洞创建一系列利用或攻击步骤来访问主机1或主机2。攻击检测器220将流量过滤器222应用于网络流量234,以识别流量的子集。该子集仅包括与以下两项服务相关联的流量:i)通过漏洞之间的数据建模关系(例如攻击图230)标识; ii)IDS 232标识为当前受到攻击的流量。签名生成器224基于该过滤的流量来创建攻击签名。流量监控器226可以使用该签名来识别网络攻击,并将其标记为网络攻击识别250。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号