Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety device threat intelligence sharing method based on lightweight field body

A technology of domain ontology and security equipment, applied in the field of threat intelligence, it can solve problems such as the difficulty of interconnection and interoperability of threat intelligence information, the huge workload of information adaptation and transfer, and the consistency of the concept of threat intelligence interaction, so as to achieve scalability. The effect of strong sexual ability, strong conceptual consistency ability, and strong content correlation ability

Active Publication Date: 2017-05-31
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The format fields of the current protocol are strictly limited at the beginning of the design, which is poor in flexibility, difficult to expand, and limited in expressive ability;
[0005] (2) Content association of threat intelligence interaction between security devices
[0006] (3) Openness of interfaces for threat intelligence interaction between security devices
The protocol is mainly realized by the dedicated and closed modules developed by the manufacturers themselves, and the workload of information adaptation and transfer between multiple manufacturers is huge;
[0007] (4) The conceptual consistency of threat intelligence interaction between security devices
The definitions of the key elements of the protocol are not uniform and arbitrary, and it is difficult to form a consistent agreement and cognition on the concepts, terms and values ​​​​of the security field between devices of different manufacturers
[0008] The above problems make it extremely difficult to interconnect and interoperate threat intelligence information between devices of different manufacturers, and it is difficult to advance the automation process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety device threat intelligence sharing method based on lightweight field body
  • Safety device threat intelligence sharing method based on lightweight field body
  • Safety device threat intelligence sharing method based on lightweight field body

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings.

[0031] Such as figure 1 The overall framework of the present invention shown is composed of three different roles: information producer, information forwarder and information user. Intelligence producers are generally professional security analysis organizations that receive the information reported by the victim after the attacker launches an attack on information resources through the perception interface, and form intelligence and release it after processing, analysis, and arrangement; the producer is also responsible for detecting attacks. as well as the function of receiving and executing instructions from regulators. The intelligence forwarder is an ecological element that accurately collects, routes, and distributes intelligence information according to user needs, and transmits the user's demand feedback. The transmitter is generally composed of an intelligenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of threat intelligence and discloses a safety device threat intelligence sharing method based on a lightweight field body. The safety device threat intelligence sharing method comprises the following steps that 1, the lightweight body is adopted as an inter-device information communication medium, and a threat intelligence general-field body is established; 2, an intelligence producer localizes the threat intelligence general-field body, obtains original threat intelligence information from network space and converts and maps the original threat intelligence information into lightweight body knowledges; 3, an intelligence forwarding person forwards the lightweight body knowledges to an intelligence user based on body communication service; 4, the intelligence user converts and adapts the received lightweight body knowledges into locally dedicated strategy descriptions acting on operation of network space. The safety device threat intelligence sharing accuracy is improved, the expansibility, content correlation, interface opening and concept consistency capability of inter-device threat intelligence interaction is improved, and the threat intelligence sharing efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of threat intelligence, in particular to a security device threat intelligence sharing method based on a lightweight domain ontology. Background technique [0002] At present, cyberspace threats are continuously increasing, and incidents of cyber attacks, data theft, and financial fraud continue to emerge, which have brought great threats and hidden dangers to the safe operation of cyberspace. The importance of the intelligence role in this attacker-defender game cannot be overlooked. On the one hand, the attacker needs comprehensive information and intelligence on the target to launch precise and targeted attacks; on the other hand, due to the high degree of uncertainty of the attack, the defender relies more on the collection and processing of intelligence for effective deployment, control and response . Intelligence in cyberspace is to protect cyberspace resources from threats and is mainly used in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F16/211G06F16/951G06F21/604
Inventor 陈剑锋徐锐刘方李明桂
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products