Construction method of virtual identity knowledge graph for network threat discovery

A technology of virtual identity and knowledge graph, which is applied in the field of network virtual identity tracking, can solve problems such as time-consuming, and achieve the effect of improving efficiency

Active Publication Date: 2019-06-11
INSPUR COMMON SOFTWARE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the method of network traceability is mainly to collect the virtual identity information related to the fingerprint from the Internet after finding the fingerprint of the attacker in a network attack event, which usually takes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method of virtual identity knowledge graph for network threat discovery
  • Construction method of virtual identity knowledge graph for network threat discovery
  • Construction method of virtual identity knowledge graph for network threat discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0055] as attached figure 1 As shown, the method for constructing a virtual identity knowledge map oriented to network threat discovery of the present invention, the steps are:

[0056] (1) Collect the user's virtual identity information through various means, including:

[0057] Collect user registration information of different Internet websites, store each group of user registration information in the user registration information table, and each group of user registration information includes multiple identity data;

[0058] Targeted crawling of user personal data disclosed in the specified website, and storing each group of user personal data in the user personal data table, each group of user personal data includes multiple identity data;

[0059] Based on the virtual identity information of the user crawled by the search engine, each s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing a virtual identity knowledge map oriented to network threat discovery, which belongs to the field of network virtual identity tracking. The technical problem to be solved is how to reduce the time for collecting virtual identity information so as to improve the efficiency of network tracking and traceability; The steps are: (1) Collecting the virtual identity information of users through various means, including: collecting user registration information on different Internet websites; directional crawling of user personal data disclosed in designated websites; crawling of users’ virtual identity information based on search engines. Identity information; (2), combine multiple sets of user registration information in the user registration information table to generate data table I, (3), combine data table I and user personal data table to generate data table II; (4), combine virtual The identity information table and data table II are combined to generate a virtual identity knowledge graph. Find identity information through virtual identity knowledge graph, reduce the time of collecting virtual identity information, and improve the efficiency of network traceability.

Description

technical field [0001] The invention relates to the field of network virtual identity tracking, in particular to a method for constructing a virtual identity knowledge map oriented to network threat discovery. Background technique [0002] Faced with the increasing number of network security incidents, it is difficult to deter and attack attackers only by relying on passive technical means to protect and detect deliberate network intrusions and attacks. To locate the attackers and implement corresponding punishments or sanctions, only then can network attackers be effectively contained. At present, the method of network traceability is mainly to collect the virtual identity information related to the fingerprint from the Internet after finding the fingerprint of the attacker in the network attack event, which usually takes a lot of time. How to reduce the time of collecting virtual identity information to improve the efficiency of network traceability has become an urgent p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L2463/146
Inventor 郑洁
Owner INSPUR COMMON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products