Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for generating threat intelligence

A technology of intelligence and articles, applied in the field of network security, can solve problems such as the lack of automated analysis methods

Active Publication Date: 2017-11-24
深圳市深信服信息安全有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Lack of automated analysis methods and tools to more comprehensively and quickly extract threat intelligence from these Internet open data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating threat intelligence
  • Method and system for generating threat intelligence
  • Method and system for generating threat intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0046] see below figure 1 , figure 1 It is a flow chart of a method for generating threat intelligence provided by the embodiment of this application;

[0047] Specific steps can include:

[0048] Step S101: Obtain source articles according to a preset cycle, and perform preprocessing on the source articles to generate text source articles;

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating threat intelligence. The method includes the steps of obtaining source articles according to a preset period, and conducting preprocessing on the source article to generate text source articles; conducting subject analysis on the text source articles, and screening out the text source articles relative to a safety subject; screening out a safety statement relative to IoC from the text source articles relative to the safety subject, and judging whether or not the safety statement is an IoC item; if yes, conducting standardized processing on the safety statement to generate standard IoC data. By using the method for generating the threat intelligence, the structurized threat intelligence can be automatically extracted and generated, procedures of analyzing and collating information in a manual mode cannot be involved, collating of the threat intelligence can be more orderly and quicker, and the method has a significant value on safety research and safety capability improvement. The invention also discloses a system for generating the threat intelligence, and the system is provided with the advantages above.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for generating threat intelligence. Background technique [0002] Today, with the rapid development of science and technology, ensuring network security has become a prerequisite for the development of Internet technology. Many security researchers and security vendors will publish technical research articles and security reports through Internet media to share technical details with peers and researchers. In the articles released by these security researchers and security vendors, there are some highly valuable information in terms of security technology, which is conducive to relevant technical personnel to achieve major breakthroughs in network security. [0003] Since these technical research articles and security reports usually exist as unstructured data, the extraction of valuable information from these technical research articles and security reports ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F17/27
CPCG06F16/9535G06F40/279
Inventor 梁玉赵振洋古亮蒋振超
Owner 深圳市深信服信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products