Threat intelligence oriented security knowledge graph construction method and system
A technology of security knowledge and construction method, applied in the field of computer network security, can solve the problems of multi-source heterogeneity of threat intelligence, weak information analysis ability, etc., and achieve the effect of improving analysis ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0031] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the objectives, features, and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further detailed below with reference to the accompanying drawings and examples. instruction of.
[0032] In the present invention, a set of threat intelligence-oriented security knowledge graph system is designed, which can effectively solve the above-mentioned problems, and the system includes the following:
[0033] Such as figure 1 Shown is the overall flow chart of the security knowledge map system. The data collection module 100 collects threat intelligence data from the network, and routes it to the knowledge extraction module (including the entity extraction module 400 and the relationship extraction module 500) through the corresponding message queue module 200, and extract...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap