A method and system for actively verifying suspicious threat indicators based on open source information
An indicator and suspicious technology, applied in the field of active verification of suspicious threat indicators, can solve the problems of inability to monitor open intelligence sources, incomplete open intelligence sources, and high cost, and achieve the effect of avoiding low intelligence coverage, easy implementation, and low cost.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention will be described in further detail below through specific embodiments and accompanying drawings.
[0039] This embodiment provides an active verification system for suspicious threat indicators based on open source information, such as figure 1 As shown, it includes: query design module, information collection module, data processing module, model training module, and index verification module.
[0040] The query design module is used to design a specific query statement to complete the query combination of suspicious threat indicators and specific scenarios, so as to quickly locate all public information related to suspicious threat indicators on the Internet;
[0041] The information collection module is used to collect and crawl the result information retrieved on the Internet according to specific query statements, so as to provide knowledge basis for the later verification of suspicious threat indicators.
[0042] The data processing module ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


