Network security knowledge graph construction method and device and computer equipment

A technology of network security and knowledge graph, applied in the direction of semantic tool creation, unstructured text data retrieval, electrical components, etc., to improve the detection effect and complete the detection effect

Active Publication Date: 2019-06-21
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF8 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide a network security knowledge map construction method and device, computer equipment, and comp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security knowledge graph construction method and device and computer equipment
  • Network security knowledge graph construction method and device and computer equipment
  • Network security knowledge graph construction method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0032] It should be noted that the term "first\second\third" involved in this embodiment of the present invention is only to distinguish similar objects, and does not represent a specific ordering of objects. Understandably, "first\second\third Three" are interchangeable in a specific order or sequence where permissible. It should be understood that the terms "first\second\third" are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or described herein.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security knowledge graph construction method and device, computer equipment and a computer storage medium. The network security knowledge graph construction method comprises the following steps: extracting attack source information and attack target information from a preset network security knowledge base, and respectively identifying an attack entity associatedwith the attack source information and an attacked entity associated with the attack target information; detecting a threat alarm event between the attack entity and the attacked entity, and determining a relationship between entities according to the threat alarm event; and respectively extracting asset attributes of the asset entities, and constructing a network security knowledge graph according to the asset entities, the asset attributes and the relationship between the entities. According to the invention, the network security problem of the target network can be detected more completely, and the detection effect of the network security problem is improved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method and device for constructing a network security knowledge graph, computer equipment, and a computer storage medium. Background technique [0002] With the rapid development of network technology, the network has been widely used in people's life and work. Network security maintenance is an important part of network technology, which can provide users with a safe and stable network environment, and is an important guarantee for the smooth progress of various activities based on the network. The detection of network security issues such as network attack detection can effectively prevent network security issues. Traditional network security detection technologies need to detect various network security issues separately, which has limitations and easily affects the detection effect of network security issues. Contents of the invention [0003] Based on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F16/36
Inventor 易思瑶陶文伟苏扬张文哲刘松梁志宏胡朝辉吴佩泽郑伟文陈鹏
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products