2025-12-27 216.73.216.41
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 37027-2025
GB/T 37027-2025   Cybersecurity technology―Criteria for determing network attack and network attack incident (English Version)
Standard No.: GB/T 37027-2025 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 14500 words Translation Price(USD):435.0 remind me the price change

Email:

Implemented on:2025-9-1 Delivery: via email in 1~5 business day

→ → →

,,2025-9-1,7AC2321BB1834B011741845669027
Standard No.: GB/T 37027-2025
English Name: Cybersecurity technology―Criteria for determing network attack and network attack incident
Chinese Name: 网络安全技术网络攻击和网络攻击事件判定准则
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2025-02-28
Implemented on: 2025-9-1
Status: valid
Superseding:GB/T 37027-2018 Information security technology—Specifications of definition and description for network attack
Target Language: English
File Format: PDF
Word Count: 14500 words
Translation Price(USD): 435.0
Delivery: via email in 1~5 business day
GB/T 37027-2025 Cybersecurity technology―Criteria for determing network attack and network attack incident English, Anglais, Englisch, Inglés, えいご This is a draft translation for reference among interesting stakeholders. The finalized translation (passing through draft translation, self-check, revision and verification) will be delivered upon being ordered. ICS 35.030 CCS L 80 National Standard of the People's Republic of China GB/T 37027-2025 Replaces GB/T 37027-2018 Cybersecurity technology - Criteria for determing network attack and network attack incident 网络安全技术 网络攻击和网络攻击事件判定准则 (English Translation) Issue date: 2025-02-28 Implementation date: 2025-09-01 Issued by the State Administration for Market Regulation the Standardization Administration of the People's Republic of China Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Descriptive information elements 6 Determination conditions 7 Counting methods Annex A (Informative) Typical types of attack targets Annex B (Informative) Typical network attack processes Annex C (Informative) Typical determination methods for network attacks and network attack incidents Annex D (Informative) Overview of network attacks and network attack incidents Annex E (Informative) Information elements and counting examples for describing network attacks and network attack incidents Bibliography Cybersecurity technology - Criteria for determing network attack and network attack incident 1 Scope This document establishes the descriptive information elements, determination and counting methods for network attacks and network attack incidents. This document is applicable to guiding organizations in conducting activities such as monitoring and analysis, situational awareness, and information reporting of network attacks and network attack incidents. 2 Normative references The following documents contain requirements which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 20986-2023 Information security technology - Guidelines for category and classification of cybersecurity incidents GB/T 30279-2020 Information security technology - Guidelines for categorization and classification of cybersecurity vulnerability 3 Terms and definitions The terms and definitions defined in GB/T 20986-2023 and GB/T 30279-2020 as well as the following apply to this document. 3.1 network attack acts that use information network technologies and various means to exploit security vulnerabilities and flaws existing in the network to interfere with, control, or damage the network, affecting its normal operation, as well as steal, abuse, tamper with, or destroy network data, endangering data security 3.2 network attack incident security incident caused or potentially caused by a network attack (3.1) that results in business losses or harms 4 Abbreviations The following abbreviations apply to this document. APT: advanced persistent threat ARP: address resolution protocol AS: autonomous system BGP: border gateway protocol DNS: domain name system HTTP: hypertext transfer protocol IOC: indicators of compromise IP: internet protocol WLAN: wireless local area network 5 Descriptive information elements 5.1 Network attacks The basic descriptive information elements for network attacks are shown in Table 1. The extended descriptive information elements for network attacks are shown in Table 2. 5.2 Network attack incidents The basic descriptive information elements for network attack incidents are shown in Table 3. The extended descriptive information elements for network attack incidents are shown in Table 4. 6 Determination conditions 6.1 Overview of determination The determination of network attacks and network attack incidents refers to identifying different network attacks and network attack incidents within a specific determination period by combining with determination methods (see Annex D). In the determination process, if the relevant determination conditions are met, it can be considered that the corresponding network attack or network attack incident has been identified. 6.2 Determination conditions for network attacks 6.2.1 Network scanning and probing attacks A network scanning and probing attack is determined to have occurred if one of the following conditions is met: a) Within a certain time period, the number of network requests targeting ports, paths, configurations, etc. exceeds the normal threshold range, or the content of network requests is traversal and constructive; b) Network traffic or device/system/software logs contain characteristics of network scanning software, such as unique string features of a certain type of network scanning software in the UA and Cookie fields of HTTP headers. 6.2.2 Phishing attacks A phishing attack is determined to have occurred when information disseminated through the network (such as web pages, web emails, software, files, images, etc.) is fraudulent or forged, and there are situations such as inducing visitors to submit important data, personal information, download malware, or obtain economic benefits by scanning QR codes for money transfers. 6.2.3 Vulnerability exploitation attacks A vulnerability exploitation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain string characteristics of typical vulnerability exploitation attack packets; b) Network traffic or device/system/software logs contain characteristics of vulnerability exploitation tools, such as relevant string features in the UA and Cookie fields of HTTP headers. 6.2.4 Backdoor exploitation attack A backdoor exploitation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain characteristics of backdoor exploitation attack packets, such as features of backdoor exploitation tools or code; b) Networks, applications, or operating systems contain traces of backdoor exploitation, such as the existence of web backdoor executable files or login behaviors of backdoor accounts. 6.2.5 Backdoor implantation attack A backdoor implantation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain characteristics of backdoor implantation attack packets, such as features of backdoor implantation tools or code; b) Networks, applications, or operating systems contain traces of backdoor implantation, such as the detection of backdoor files that allow attackers to obtain greater privileges, or the existence of an implanted backdoor account.
Code of China
Standard
GB/T 37027-2025  Cybersecurity technology―Criteria for determing network attack and network attack incident (English Version)
Standard No.GB/T 37027-2025
Statusvalid
LanguageEnglish
File FormatPDF
Word Count14500 words
Price(USD)435.0
Implemented on2025-9-1
Deliveryvia email in 1~5 business day
Detail of GB/T 37027-2025
Standard No.
GB/T 37027-2025
English Name
Cybersecurity technology―Criteria for determing network attack and network attack incident
Chinese Name
网络安全技术网络攻击和网络攻击事件判定准则
Chinese Classification
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2025-02-28
Implemented on
2025-9-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 37027-2018 Information security technology—Specifications of definition and description for network attack
Language
English
File Format
PDF
Word Count
14500 words
Price(USD)
435.0
Keywords
GB/T 37027-2025, GB 37027-2025, GBT 37027-2025, GB/T37027-2025, GB/T 37027, GB/T37027, GB37027-2025, GB 37027, GB37027, GBT37027-2025, GBT 37027, GBT37027
Introduction of GB/T 37027-2025
GB/T 37027-2025 Cybersecurity technology―Criteria for determing network attack and network attack incident English, Anglais, Englisch, Inglés, えいご This is a draft translation for reference among interesting stakeholders. The finalized translation (passing through draft translation, self-check, revision and verification) will be delivered upon being ordered. ICS 35.030 CCS L 80 National Standard of the People's Republic of China GB/T 37027-2025 Replaces GB/T 37027-2018 Cybersecurity technology - Criteria for determing network attack and network attack incident 网络安全技术 网络攻击和网络攻击事件判定准则 (English Translation) Issue date: 2025-02-28 Implementation date: 2025-09-01 Issued by the State Administration for Market Regulation the Standardization Administration of the People's Republic of China Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Descriptive information elements 6 Determination conditions 7 Counting methods Annex A (Informative) Typical types of attack targets Annex B (Informative) Typical network attack processes Annex C (Informative) Typical determination methods for network attacks and network attack incidents Annex D (Informative) Overview of network attacks and network attack incidents Annex E (Informative) Information elements and counting examples for describing network attacks and network attack incidents Bibliography Cybersecurity technology - Criteria for determing network attack and network attack incident 1 Scope This document establishes the descriptive information elements, determination and counting methods for network attacks and network attack incidents. This document is applicable to guiding organizations in conducting activities such as monitoring and analysis, situational awareness, and information reporting of network attacks and network attack incidents. 2 Normative references The following documents contain requirements which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 20986-2023 Information security technology - Guidelines for category and classification of cybersecurity incidents GB/T 30279-2020 Information security technology - Guidelines for categorization and classification of cybersecurity vulnerability 3 Terms and definitions The terms and definitions defined in GB/T 20986-2023 and GB/T 30279-2020 as well as the following apply to this document. 3.1 network attack acts that use information network technologies and various means to exploit security vulnerabilities and flaws existing in the network to interfere with, control, or damage the network, affecting its normal operation, as well as steal, abuse, tamper with, or destroy network data, endangering data security 3.2 network attack incident security incident caused or potentially caused by a network attack (3.1) that results in business losses or harms 4 Abbreviations The following abbreviations apply to this document. APT: advanced persistent threat ARP: address resolution protocol AS: autonomous system BGP: border gateway protocol DNS: domain name system HTTP: hypertext transfer protocol IOC: indicators of compromise IP: internet protocol WLAN: wireless local area network 5 Descriptive information elements 5.1 Network attacks The basic descriptive information elements for network attacks are shown in Table 1. The extended descriptive information elements for network attacks are shown in Table 2. 5.2 Network attack incidents The basic descriptive information elements for network attack incidents are shown in Table 3. The extended descriptive information elements for network attack incidents are shown in Table 4. 6 Determination conditions 6.1 Overview of determination The determination of network attacks and network attack incidents refers to identifying different network attacks and network attack incidents within a specific determination period by combining with determination methods (see Annex D). In the determination process, if the relevant determination conditions are met, it can be considered that the corresponding network attack or network attack incident has been identified. 6.2 Determination conditions for network attacks 6.2.1 Network scanning and probing attacks A network scanning and probing attack is determined to have occurred if one of the following conditions is met: a) Within a certain time period, the number of network requests targeting ports, paths, configurations, etc. exceeds the normal threshold range, or the content of network requests is traversal and constructive; b) Network traffic or device/system/software logs contain characteristics of network scanning software, such as unique string features of a certain type of network scanning software in the UA and Cookie fields of HTTP headers. 6.2.2 Phishing attacks A phishing attack is determined to have occurred when information disseminated through the network (such as web pages, web emails, software, files, images, etc.) is fraudulent or forged, and there are situations such as inducing visitors to submit important data, personal information, download malware, or obtain economic benefits by scanning QR codes for money transfers. 6.2.3 Vulnerability exploitation attacks A vulnerability exploitation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain string characteristics of typical vulnerability exploitation attack packets; b) Network traffic or device/system/software logs contain characteristics of vulnerability exploitation tools, such as relevant string features in the UA and Cookie fields of HTTP headers. 6.2.4 Backdoor exploitation attack A backdoor exploitation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain characteristics of backdoor exploitation attack packets, such as features of backdoor exploitation tools or code; b) Networks, applications, or operating systems contain traces of backdoor exploitation, such as the existence of web backdoor executable files or login behaviors of backdoor accounts. 6.2.5 Backdoor implantation attack A backdoor implantation attack is determined to have occurred if one of the following conditions is met: a) Network traffic or device/system/software logs contain characteristics of backdoor implantation attack packets, such as features of backdoor implantation tools or code; b) Networks, applications, or operating systems contain traces of backdoor implantation, such as the detection of backdoor files that allow attackers to obtain greater privileges, or the existence of an implanted backdoor account.
Contents of GB/T 37027-2025
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 37027-2025, GB 37027-2025, GBT 37027-2025, GB/T37027-2025, GB/T 37027, GB/T37027, GB37027-2025, GB 37027, GB37027, GBT37027-2025, GBT 37027, GBT37027