Method and device for generating threat intelligence

A technology of intelligence and clustering algorithm, applied in the field of network communication, it can solve the problems of inability to detect malicious files in time, poor security defense effect, and poor real-time performance, and achieve the effect of improving network security, good real-time performance, and timely discovery.

Active Publication Date: 2016-10-26
360 TECH GRP CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the present invention, the inventor found that the above-mentioned security software in the prior art has at least the following problems: most of the existing security software checks and kills malicious fi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating threat intelligence
  • Method and device for generating threat intelligence
  • Method and device for generating threat intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0029] The embodiment of the present invention provides a method and device for generating threat intelligence, which can at least solve the technical problem that the traditional network defense method cannot timely discover the latest malicious files due to poor real-time performance.

[0030] figure 1 A flow chart of a method for generating threat intelligence provided by an embodiment of the present invention is shown. Such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for generating threat intelligence. The method comprises the steps of scanning and obtaining multiple malicious files included in a sample set; classifying the multiple malicious files according to a preset classification rule; extracting domain name information included in various categories of malicious files according to file structure characteristics of the various categories of malicious files; and storing the domain name information into a preset black set and generating the threat intelligence according to the black set. Thus, by the method and device for generating the threat intelligence disclosed by the invention, the technical problem that the latest malicious file cannot be timey found out by a traditional network defense method due to relatively poor instantaneity can at least be solved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method and device for generating threat intelligence. Background technique [0002] With the continuous development of communication technology, the Internet has been integrated into every aspect of life. However, as a derivative of the development of the Internet, hacking technology has also become pervasive, threatening network security increasingly seriously. For this reason, various defensive means have emerged to deal with hacker intrusions. For example, security software such as NetShield, anti-virus software, security guard, and network bodyguard can resist hacker intrusions to a certain extent and maintain network security. [0003] However, in the process of realizing the present invention, the inventor found that the above-mentioned security software in the prior art has at least the following problems: most of the existing security software checks and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/53
CPCG06F21/53G06F21/562G06F21/566
Inventor 边亮陈雍刘嘉磊赵雨婷
Owner 360 TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products