Cyber threat intelligence generation method and system

A network and intelligence technology, applied in the field of information processing, can solve problems such as complex types, large amounts of data, and unidentified

Inactive Publication Date: 2018-08-14
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a network threat intelligence generation method and system in order to overcome the problems of difficulty in extracting network threat intelligence information in the prior art, various types, large amounts of data and unmarked data, and inconvenient understanding for security managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cyber threat intelligence generation method and system
  • Cyber threat intelligence generation method and system
  • Cyber threat intelligence generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Below in conjunction with accompanying drawing and embodiment, the specific embodiment of the present invention is described in further detail. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0036] figure 1 It is a schematic diagram of the overall flow of a method for generating network threat intelligence according to an embodiment of the present invention, such as figure 1 As shown, the present invention provides a method for generating network threat intelligence, including:

[0037] S1, extracting keywords of network security incidents, using the keywords to collect text information of the network security incidents from the network;

[0038] S2, training the classification model of the text information, using the classification model to classify the text information, obtaining the text information contained in each category, and filtering the text information that does not b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cyber threat intelligence generation method and system. The method comprises the steps of collecting text information of a network security event from a network by utilizing akeyword; classifying the text information by utilizing a classification model, and filtering the text information not belonging to any category; extracting a security entity in each piece of the textinformation comprised in each category, and generating a text abstract of each piece of the text information comprised in each category, and according to the security entities and the text abstracts,forming intelligence information; and clustering the text information with the same timestamps, obtaining class text information corresponding to the timestamps, obtaining all class text information,related to the same network security event, of different timestamps, and sorting the intelligence information corresponding to all the class text information related to the same network security event according to a timestamp sequence. An intelligence tracking system taking an event chain as a presentation form is formed, so that security personnel can track the security event in real time, and the manpower resource cost of intelligence collection is reduced.

Description

technical field [0001] The present invention relates to the technical field of information processing, and more specifically, to a method and system for generating network threat intelligence. Background technique [0002] Threat intelligence is a fact based on knowledge, which is transmitted to a specific user through a certain media, affects the user's choice and decision-making, and is used to assist in solving specific problems. According to the definition of the Center for the Protection of National Infrastructure (CPNI), Cyber ​​Threat Intelligence (Cyber ​​Threat Intelligence) is intelligence information oriented to the field of network security. Through intelligence, specific attack methods can be analyzed to identify malicious To understand the development trend of network security threats, optimize and improve traditional security defense methods, and form a security strategy that can cope with diversified and persistent threats. [0003] With the development of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/3344G06F16/35G06F16/9535
Inventor 文辉李科李红朱红松孙利民
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products