Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for generating threat intelligence

A technology of intelligence and domain name information, applied in the field of network communication, it can solve problems such as poor real-time performance, poor security defense effect, and inability to detect malicious files in time, achieving good real-time performance and improving network security.

Active Publication Date: 2019-08-02
北京鸿享技术服务有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the present invention, the inventor found that the above-mentioned security software in the prior art has at least the following problems: most of the existing security software checks and kills malicious files according to the data access records, but, because the data access records have A certain lag leads to poor real-time performance, and it is impossible to discover the latest malicious files in time. Therefore, the security defense effect is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating threat intelligence
  • Method and device for generating threat intelligence
  • Method and device for generating threat intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0029] The embodiment of the present invention provides a method and device for generating threat intelligence, which can at least solve the technical problem that the traditional network defense method cannot timely discover the latest malicious files due to poor real-time performance.

[0030] figure 1 A flow chart of a method for generating threat intelligence provided by an embodiment of the present invention is shown. Such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generation method and device of threat intelligence. The method comprises the following steps: scanning and acquiring a plurality of white files contained in a sample set; extracting domain name information contained in each white file, and storing the domain name information in a preset white set; generating the threat intelligence aiming at an access request when the access request contains the domain name inexistent in the white set. Therefore, the generation method and device of the threat intelligence provided by the embodiment of the invention at least can solve the technical problem that the traditional network defense mode cannot immediately find the latest malicious file due to bad instantaneity.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method and device for generating threat intelligence. Background technique [0002] With the continuous development of communication technology, the Internet has been integrated into every aspect of life. However, as a derivative of the development of the Internet, hacking technology has also become pervasive, threatening network security increasingly seriously. For this reason, various defensive means have emerged to deal with hacker intrusions. For example, security software such as NetShield, anti-virus software, security guard, and network bodyguard can resist hacker intrusions to a certain extent and maintain network security. [0003] However, in the process of realizing the present invention, the inventor found that the above-mentioned security software in the prior art has at least the following problems: most of the existing security software checks and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 边亮陈雍刘嘉磊赵雨婷
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products