Network threat discovery method

A discovery method and network technology, applied in electrical components, transmission systems, etc., can solve the problems of lack of early warning and monitoring, lack of intelligent learning to discover new threats, single network threat discovery method, etc., to improve situational awareness and early warning The effect of prevention and control ability

Active Publication Date: 2019-04-30
GUANGDONG POWER GRID CO LTD INFORMATION CENT +1
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem mainly solved by the present invention is to provide a network threat discovery method, which solves the technical problems in the prior art that the network threat discovery method is single, lacks early warning and monitoring, and does not have intelligent learning to discover new threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat discovery method
  • Network threat discovery method
  • Network threat discovery method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to facilitate the understanding of the present invention, the present invention will be described in more detail below in conjunction with the accompanying drawings and specific embodiments. Preferred embodiments of the invention are shown in the accompanying drawings. However, the present invention can be implemented in many different forms and is not limited to the embodiments described in this specification. On the contrary, these embodiments are provided to make the understanding of the disclosure of the present invention more thorough and comprehensive.

[0019] It should be noted that, unless otherwise defined, all technical and scientific terms used in this specification have the same meaning as commonly understood by those skilled in the technical field of the present invention. Terms used in the description of the present invention are only for the purpose of describing specific embodiments, and are not used to limit the present invention.

[0020] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network threat discovery method. The network threat discovery method comprises the steps of vulnerability information monitoring, information analysis and abnormal information capture. Wherein normalization monitoring is carried out on public network vulnerability release information through vulnerability information monitoring, classification and early warning are carried out on potential novel threat information hidden in an information text through information analysis, and network threat capturing and early warning are carried out on Web abnormal behaviors throughabnormal information capturing. According to the network threat discovery method provided by the invention, network threat early warning is effectively realized from multiple channels, particularly,a security threat entry vector model can be established through information analysis, the network threat discovery method has machine learning and updating capabilities on security threat information,and the situation awareness capability and the early warning prevention and control capability of network threat are greatly improved.

Description

technical field [0001] The invention belongs to the technical field of computer network security, in particular to a method for discovering network threats. Background technique [0002] The life cycle of a network security vulnerability can be divided into latent, growth, spread, outbreak, and recession stages. Generally, when it is known to the public, it has reached the stage of spread, outbreak, and decline. At this time, security vulnerabilities have often begun to cause substantial damage to security subjects sexual hazards. [0003] Network security early warning is to be able to conduct early discovery, early warning and early protection of potential network vulnerabilities or network threats from multiple angles and aspects, so as to overcome the shortcomings of using a single technical means for network threat early warning in the existing technology. Contents of the invention [0004] The technical problem mainly solved by the present invention is to provide a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 龙震岳吴勤勤沈伍强刘晔吴一阳
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products