Multi-source heterogeneous vulnerability information duplicate removal and grading methods and apparatuses

A multi-source heterogeneous and loophole technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of long calculation time, decreased reliability, inconsistent description accuracy, etc., to reduce computational complexity, The effect of improving accuracy and reducing resource consumption

Inactive Publication Date: 2018-02-16
CHINA MOBILE GRP GUANGDONG CO LTD +1
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Using the above calculation method, because the total number of feature words is equal to the dimension of the vector space, when the number of feature words contained in the vulnerability information is large, the more dimensions formed by the vector space, the longer the corresponding calculation time; in addition, due to the vulnerability The description accuracy of the feature words contained in the intelligence is not consistent. Therefore, when the vulnerability intelligence contains too many feature words, the reliability of the results obtained by the above calculation method will also decrease.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-source heterogeneous vulnerability information duplicate removal and grading methods and apparatuses
  • Multi-source heterogeneous vulnerability information duplicate removal and grading methods and apparatuses
  • Multi-source heterogeneous vulnerability information duplicate removal and grading methods and apparatuses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0053] It should be noted that the method embodiments provided by the embodiments of the present invention may be executed in a mobile terminal, a computer terminal or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal for a multi-source heterogeneous vulnerability information deduplication met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose multi-source heterogeneous vulnerability information duplicate removal and grading methods and apparatuses. In the vulnerability information duplicate removal process, firstly weight values of extracted feature words in whole vulnerability information contents are calculated; secondly according to calculated weight value results, the feature words with the weight values sorted in front are selected as effective feature words of vulnerability information; and finally the vulnerability information which the effective feature words can be matched with is classified and grouped to realize vulnerability information duplicate removal. According to the duplicate removal method provided by the invention, vector space dimension calculation is not required, so that the calculation complexity can be lowered; and moreover, the feature words with the weight values sorted in front are screened out to serve as the effective feature words, and a few interference feature words are removed, so that the accuracy of a correlation judgment result can be improved. Likewise, in the information grading process, firstly the feature words of the vulnerability information are extracted; secondly the extracted feature words are subjected to expression analysis of emotional semantics; and through the analysis, the risk levels of the vulnerability information can be obtained.

Description

technical field [0001] The invention relates to the field of computer network information security, in particular to a method for deduplication of multi-source heterogeneous vulnerability information, a classification method and a device. Background technique [0002] With the continuous development of social informatization, network security vulnerabilities are also increasing. Correspondingly, a variety of organizations that release vulnerability intelligence information have emerged, such as authoritative vulnerability databases such as NVD and CNNVD, and professional security manufacturers such as SecurityFocus. For the vulnerability management system, it is necessary to determine the repeatability and relevance of the vulnerability information obtained from the above-mentioned multiple information sources, and finally form unique and effective vulnerability information. [0003] For multi-source heterogeneous vulnerability deduplication, distance calculation based on V...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 何庆林满佳许敬伟周乐坤宋岍龙邓晓东关闯生高峰张建军苏砫
Owner CHINA MOBILE GRP GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products