首页> 外国专利> METHOD AND DEVICE FOR DETECTING ATTACK ON NETWORK HOSTS USING NETWORK ATTACK INTENSITY CALCULATION METHOD BASED ON COMPUTING RESOURCE CAPACITY

METHOD AND DEVICE FOR DETECTING ATTACK ON NETWORK HOSTS USING NETWORK ATTACK INTENSITY CALCULATION METHOD BASED ON COMPUTING RESOURCE CAPACITY

机译:基于计算资源容量的网络攻击强度计算方法检测网络主机攻击的方法和装置

摘要

A network host attack detection method using a network attack strength measurement technique based on a computing resource capacity is disclosed. That is, (a) the endpoint threat analysis system, according to a predetermined time schedule, (i) the first to the Nth hosts-N is an integer greater than or equal to 1-the first to M1 endpoint switches connected to at least some of the -M1 Is an integer of 1 or more and N or less-A process of acquiring 1_1 to N_1 row resource data corresponding to the first to Nth hosts through a predetermined network sensor operating in conjunction with and (ii) each Through the first to M2th endpoint agents corresponding to the first to Nth hosts-M2 is an integer of 1 or more and N or less -, the 1_2 to N_2th row resources corresponding to each of the first to Nth hosts Performing a process of obtaining data; (b) The endpoint threat analysis system includes: (i) first to Nth energies corresponding to the first to Nth hosts with reference to the planned throughput modeling formula and the 1_1 to N_1 raw resource data A process for generating animation data and (ii) first to Nth reference resource data corresponding to the first to Nth hosts with reference to the planned capacity modeling formula and the 1_2 to N_2 row resource data Performing a process to generate a; And (c) the endpoint threat analysis system, with reference to the first to Nth energy estimation data and the first to Nth reference resource data, first to Nth hosts corresponding to the first to Nth hosts. Disclosed is a method comprising the step of generating an Nth opponent attack threat.
机译:公开了一种基于计算资源容量的网络攻击强度测量技术的网络主机攻击检测方法。也就是说,(a)终点威胁分析系统,根据预定时间表,(i)第一个到第n个主机-n是一个大于或等于1的整数 - 第一到M1端点开关至少连接到一些-M1是通过与(II)一起运行的预定网络传感器获取与第一至第n个主机相对应的1或更低的整数。首先,对应于第一至第n个主机-M2的第M2个端点代理是1或更多且n或更低的整数 - ,与执行获取数据的过程的第一到第n个主机中的每一个对应的1_2至n_2th行资源; (b)(b)端点威胁分析系统包括:(i)首先参考计划的吞吐量建模公式和1_1到N_1原始资源数据对应于第一至第n个主机的第n个能量是生成动画数据的过程和(ii)首先参考与第一个到第n个主机对应的资源数据,参考计划容量建模公式和1_2到N_2行资源数据执行一个生成一个生成过程的资源数据; (c)端点威胁分析系统,参考第一到第n个能量估计数据和第一至第n个参考资源数据,首先到第一个到第一个到第n个主机的第n个主机。公开了一种方法,包括产生第n个对手攻击威胁的步骤。

著录项

  • 公开/公告号KR102244128B1

    专利类型

  • 公开/公告日2021-04-23

    原文格式PDF

  • 申请/专利权人

    申请/专利号KR1020200135579

  • 发明设计人 권현철;유진상;

    申请日2020-10-19

  • 分类号H04L29/06;G06F21/55;G06F21/57;H04L12/26;

  • 国家 KR

  • 入库时间 2022-08-24 18:27:24

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号