Method and system for updating network threat information

A technology of intelligence information and update method, which is applied in the update field of cyber threat intelligence information, and can solve problems such as the inability to update high-frequency intelligence information.

Active Publication Date: 2019-07-05
武汉思普崚技术有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that high-frequency intelligence information cannot be updated in a targeted and timely manner when there are a large number of servers, this application discloses a method and system for updating network threat intelligence information through the following embodiments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating network threat information
  • Method and system for updating network threat information
  • Method and system for updating network threat information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]In order to solve the problem that high-frequency intelligence information cannot be updated in a targeted and timely manner when the number of servers is large, this application discloses a method and system for updating network threat intelligence information through the following embodiments.

[0045] In each embodiment of this application, network threat intelligence information refers to an information set that can help discover threats and deal with threats based on data. Through network threat intelligence information, vulnerabilities can be repaired before attacks occur. Purpose. Open source intelligence services refer to websites or companies that can provide users with data services related to cyber threat intelligence information. Open source intelligence services usually store the latest intelligence information. The hit log refers to the record generated by the hit intelligence information when the device is running. Each hit log records the time, user and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for updating network threat information. In the method, a log generated by hitting the high-frequency information in the equipment end is processed to form the summary data, the summary data is fed back to the information server through the cloud platform, and the information server places the summary data in the information acquisition queue accordingto the fed back summary data, so that when the basic information is acquired from the open source information, the updating information corresponding to the high-frequency information can be preferentially acquired according to the summary data. Updating information corresponding to the acquired high-frequency information is compared with the original high-frequency information; according to themethod, whether the high-frequency information is updated or not can be judged, and if yes, the updating information corresponding to the high-frequency information is sent to the equipment end through the cloud platform, so that the equipment end can update the high-frequency information in time in a targeted manner.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and system for updating network threat intelligence information. Background technique [0002] With the development of network technology, there will inevitably be some security holes in network devices connected to the Internet, which pose a threat to the security of network information. In order to improve the security of network information, various security vendors and enterprises actively promote the sharing of network threat intelligence information. Cyber ​​threat intelligence information refers to the information set that can help discover threats and deal with them. Cyber ​​threat intelligence information is also called intelligence information. In the process of sharing network threat intelligence information, various security vendors obtain a large amount of basic information from open source intelligence through the intelligence server, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1425H04L63/1441H04L67/10
Inventor 李登云
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products