Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network space security big data intelligent analysis method and computer readable medium

A network security and cyberspace technology, applied in the field of intelligent analysis of cyberspace security big data and computer readable media, can solve the problem of low effectiveness and accuracy of big data security intelligent analysis, insufficient big data security business presentation and monitoring and early warning forms , single source of big data and other issues, to achieve the effect of protecting the core assets of customers

Inactive Publication Date: 2019-06-07
安徽谛听信息科技有限公司
View PDF6 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to efficiently integrate urban and regional multi-source cyberspace security big data information resources to solve the problem of single source of urban cyberspace security big data, low effectiveness and accuracy of big data security intelligent analysis, lack of cyber threat intelligence information sharing on big data security platforms, Issues such as big data security business presentation and insufficient monitoring and early warning forms are important issues facing urban cyberspace security big data governance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network space security big data intelligent analysis method and computer readable medium
  • Network space security big data intelligent analysis method and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0073] Example 1: Event Correlation

[0074] Event correlation supports the search of event characteristics, can save and visualize the search track, helps to restore the event attack process, and discover the source of the attack, and at the same time realizes statistics on the characteristics of all security events that have occurred within a certain period of time. The event features include basic features (such as cross-site scripting (XSS) attacks, SQL injection attacks, automated threats), communication features (such as various communication protocols such as http, https, ftp, etc.). Event correlation can be divided into rule-based event correlation, single event correlation, multi-event correlation, event search, event attack process restoration, etc. To be introduced below.

[0075] a. Rule-based event correlation:

[0076]The system has a built-in visual rule editor, and users can define association rules based on logical expressions and statistical conditions, and...

example 2

[0095] Example 2: Sample Association

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network space security big data intelligent analysis method and a computer readable medium. The method comprises the following steps: acquiring network security related data;Restoring the acquired data, and carrying out different preprocessing operations on different types of network security related data; Extracting the preprocessed data and analyzing the preprocessed data to realize network security monitoring; And displaying the network security monitoring result. On the basis of a big data technology, data characteristics of continuous increase, complex types, various sources and the like of data in safety analysis are solved, and enterprise threats such as advanced continuous malicious attacks and internal violation behaviors can be effectively detected by using a user and entity behavior analysis technology at the same time.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for intelligently analyzing network space security big data and a computer-readable medium. Background technique [0002] In 2016, the state released the "Evaluation Indicators for New Smart Cities", and network security was written into the evaluation indicators as a first-level indicator, reflecting the importance and strategic position of network security. In the planning, design and construction of new smart cities, cyberspace security has become an important factor restricting urban development and an important component of new smart city construction. [0003] However, urban cyberspace security incidents emerge in endlessly; information resource integration cloud platform security protection issues are prominent; industry data sharing and fusion lead to data security; cyberspace security responsibility boundaries are not clear. Emerging information technologies suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 甘小伟赵义
Owner 安徽谛听信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products