Knowledge base constructing method oriented to network safety

A network security and construction method technology, applied in relational databases, database models, structured data retrieval, etc., can solve problems such as slow system operation and occupation of too many system resources.

Active Publication Date: 2018-07-06
NAT UNIV OF DEFENSE TECH +1
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On your computer, there are some processes running in the background, some processes that take up too many system resources, some that make the system run slowly, and some processes that may be spyware or trojan horses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Knowledge base constructing method oriented to network safety
  • Knowledge base constructing method oriented to network safety
  • Knowledge base constructing method oriented to network safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0045]In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0046] The present invention is achieved through the following technical solu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a knowledge base constructing method oriented to network safety. The method comprises the steps of 1, constructing a network safety field body, and forming a basic and fundamental framework of a network safety knowledge base; 2, based on the constructed body, integrating the existing network safety knowledge base, and fusing heterogeneous structuralized network safety knowledge into a unified knowledge base; 3, training a named entity identifier with network safety, identifying an entity relevant to network safety from a short text relevant to network safety, and updating knowledge extracted from the short text to the network safety knowledge base, so that the network safety knowledge base is constantly updated and iterated.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a network security-oriented knowledge base construction method. Background technique [0002] At present, there are already some knowledge bases for some aspects of the network security field. For example, CVE is a vulnerability database in which all vulnerabilities are assigned a uniform number, which is defined by MITR as a uniform format. Snort has established a rich rule base for detecting intrusions. Some well-known domestic anti-virus suppliers have also established huge information bases about viruses. In addition, the Internet has become the main source of knowledge and information, and there are many network security-related contents on the Internet, such as security blogs, hacker forums, security bulletins, etc., which are dense areas of network security information. Making full use of network security-related information from various knowledge bases and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F17/27G06F21/56
CPCG06F16/288G06F16/367G06F16/374G06F21/56G06F40/284
Inventor 尚怀军江荣贾焰周斌李爱平杨树强韩伟红李润恒徐镜湖安伦亓玉璐杨行马凯王伟林佳
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products