Vulnerability utilization risk evaluation method based on multi-source word embedding and knowledge map

A technology of knowledge graph and risk assessment, which is applied in the field of vulnerability exploitation risk assessment and vulnerability exploitation risk assessment based on multi-source word embedding and knowledge graph. Describe the distribution of vulnerable products, hazard levels, repair patches, etc., to achieve the effect of improving accuracy

Inactive Publication Date: 2019-02-15
WUHAN UNIV
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented system allows us to evaluate different types of threats through an ensemble of data sources with varying degrees of impact or damage (attack methods). It also considers factors like network security scenarios, risk levels associated with each type of threat, and other aspects such as correlations among them. By analyzing these features over time we aimed at developing models that accurately predict potential future exposure to potentially malicious activities.

Problems solved by technology

This patented technical problem addressed in this patents relates to improving understanding about threats that may be used against computer networks or cybersecurity organizations through analysis from various sources like databases with different types of weaknesses. Current methods only rely heavily upon manual inspections and human judgment, making them difficult to identify specific areas where issues could occur due to hidden holes caused by external factors like weather conditions or physical damage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability utilization risk evaluation method based on multi-source word embedding and knowledge map
  • Vulnerability utilization risk evaluation method based on multi-source word embedding and knowledge map
  • Vulnerability utilization risk evaluation method based on multi-source word embedding and knowledge map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0021] please see figure 1 , a method for assessing the risk of vulnerability exploitation based on multi-source word embedding and knowledge graph provided by the present invention, comprising the following steps:

[0022] Step 1: According to the information security knowledge graph, construct the data source ontology related to network security, and then obtain the latest online information in real time from different online data sources;

[0023] In this embodiment, when constructing a data source ontology related to network security, the specific method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability utilization risk evaluation method based on multi-source word embedding and a knowledge map. The method comprises steps of building data source bodies associated with network security according to an information security knowledge map, then acquiring latest online information from different online data sources; preprocessing data and performing word vectorizatio by using word embedding; mapping data underwent word vectorization to a relation chart between entities and entities according to the knowledge map; and building a vulnerability utilization riskevaluation model by combining historical data sets and the knowledge map, evaluating vulnerability utilization risk, and delivering evaluation basis for vulnerability utilization risks. In the method,vulnerability utilization possibility is evaluated more comprehensively by combining network attack development logics, with the knowledge map as a reference, the method provides valuable reference for security defense, further, the method provides a reliability computing model, so that information really associated with vulnerability utilization prediction can be found in massive fragment information, and evaluation is more accurate.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products