Risk detection method, device, equipment and storage medium

A technology of risk detection and equipment, applied in the field of information security, can solve problems such as high computational overhead, poor interpretability, and difficult convergence of results

Active Publication Date: 2021-05-14
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantage is that iterative calculation is usually required, and the calculation overhead is high on massive data sets, the results are difficult to converge, and the interpretability is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk detection method, device, equipment and storage medium
  • Risk detection method, device, equipment and storage medium
  • Risk detection method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In the following, only certain exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not restrictive.

[0054] figure 1 A flowchart showing a risk detection method according to an embodiment of the present invention. figure 2 A structural block diagram of a risk detection system according to an embodiment of the present invention is shown. In an implementation manner, a risk detection system may be used to implement the risk detection method of the embodiment of the present invention.

[0055] like figure 1As shown, the risk detection method of the embodiment of the present invention may include:

[0056] Step S101, obtain the subgraph structure of the target node, the subgraph structure includes node ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention proposes a risk detection method, device, device, and storage medium, wherein the method includes obtaining the subgraph structure of the target node, and the subgraph structure includes the node neighbors of the target node at multiple time points within a preset time period Snapshot, the node neighbor snapshot includes the association relationship between the target node and at least one associated node of the target node; obtain the time series vector list of the target node according to the subgraph structure; input the time series vector list into the risk detection model to obtain the risk detection result of the target node. The method of the embodiment of the present invention can integrate multi-source heterogeneous threat intelligence data, thereby constructing a time-series association network formed by node characteristics and node association relationships under long-term performance, and realizing node sceneization through association learning and time series prediction risk prediction.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a risk detection method, device, equipment and storage medium. Background technique [0002] With the increasing amount of information, there are more and more malicious documents, malicious webpages, malicious execution files, etc. Therefore, it is extremely important to carry out risk detection on intelligence information to improve information security. For risk detection of intelligence information, graph structure information can be extracted by artificially constructing features. For example: artificially construct measurement indicators such as degree centrality, betweenness centrality and close centrality, use statistical values ​​such as the number of accounts associated with devices, and combine the characteristics of a certain node neighborhood of the associated network to conduct risk analysis. This scheme is based on artificially constructed fea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/08G06F16/28
CPCG06F21/56G06N3/084G06F16/284G06F18/214
Inventor 徐超朱林熊蜀光
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products