Threat intelligence oriented security knowledge graph construction method and system

A technology of security knowledge and construction method, applied in the field of computer network security, can solve the problems of multi-source heterogeneity of threat intelligence, weak information analysis ability, etc., and achieve the effect of improving analysis ability

Active Publication Date: 2019-06-07
INST OF INFORMATION ENG CAS
View PDF5 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a threat intelligence-oriented security knowledge map construction method and system. By applying the knowledge map technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence oriented security knowledge graph construction method and system
  • Threat intelligence oriented security knowledge graph construction method and system
  • Threat intelligence oriented security knowledge graph construction method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the objectives, features, and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further detailed below with reference to the accompanying drawings and examples. instruction of.

[0032] In the present invention, a set of threat intelligence-oriented security knowledge graph system is designed, which can effectively solve the above-mentioned problems, and the system includes the following:

[0033] Such as figure 1 Shown is the overall flow chart of the security knowledge map system. The data collection module 100 collects threat intelligence data from the network, and routes it to the knowledge extraction module (including the entity extraction module 400 and the relationship extraction module 500) through the corresponding message queue module 200, and extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a threat intelligence oriented security knowledge graph construction method and system. The method comprises the following steps: 1) acquiring structured data and unstructureddata of threat intelligence; 2) performing knowledge extraction on the collected structured data and unstructured data to obtain a threat information entity and a relationship between entities; 3) constructing a graph-based ontology mode, in which nodes represent threat information entities and edges represent relationships among the threat information entities; and 4) storing the threat information entity extracted in the step 2) and the relationship between the entities into a graph database according to the graph-based ontology mode constructed in the step 3) to form a knowledge graph of the threat information. The graph database is further used to provide a query service and a visual display function. According to the method, the knowledge graph technology is applied to the field of threat intelligence, the security knowledge graph oriented to the threat intelligence is constructed, dispersed intelligence is fused, and meanwhile the analysis capability of the threat information isimproved.

Description

technical field [0001] The invention belongs to the field of computer network security, and relates to a method for constructing a knowledge graph, and more specifically, to a method and system for constructing a security knowledge graph oriented to threat intelligence. Background technique [0002] In recent years, the cyberspace security environment has become increasingly complex. With the advancement of technology, the cyber attacks launched by criminals have become more and more advanced and covert. In particular, advanced persistent threat (APT) attacks have shown frequent occurrences, and traditional defense measures cannot meet the requirements. current security needs. In this context, threat intelligence, an emerging technology, emerged as the times require. Threat intelligence describes security entities and associated relationships in cyberspace, provides decision-making basis for threat response, and has become the cornerstone of building a new generation of cyb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/9038G06F16/904G06F16/953G06F9/54
Inventor 王天姜波江钧杜翔宇卢志刚姜政伟
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products