Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security policy optimization processing method and device based on big data

A technology of security policy and processing method, which is applied in the field of security policy optimization processing based on big data, and can solve problems such as inaccurate prevention policies and lack of training data

Active Publication Date: 2019-09-20
东方财富信息股份有限公司
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a big data-based security policy optimization processing method and device to solve the problems in the related art that the manual definition of defense policies against network attacks is not precise enough and the prevention policies are lack of training data through machine learning training models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy optimization processing method and device based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.

[0020] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0021] It s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security policy optimization processing method and device based on big data. The method comprises the steps of obtaining an uploaded log file uploaded by a user and a prevention strategy corresponding to the log file; under the condition that the number of the log files corresponding to the predetermined prevention rules reaches a threshold value, inputting the log files and the prevention rules as training data into a pre-configured machine learning model for training to obtain a training model corresponding to the prevention rules; inputting the to-be-identified log file into a plurality of training models respectively, and obtaining a probability value of the log file corresponding to each training model; and prompting the combined prevention strategy to an uploader of the predetermined log file. According to the method and device, the problems of inaccurate manual definition of the prevention strategy for the network attack and lack of training data for making the prevention strategy through the machine learning training model in the prior art are solved, and the dependence on people in the process of making the prevention strategy is reduced.

Description

technical field [0001] The present application relates to the field of machine learning, and in particular, to a method and apparatus for optimizing a security policy based on big data. Background technique [0002] In the prior art, there are various types of network attacks. At present, the prevention of network attacks basically relies on manual formulation of strategies. This requires every network administrator to have extensive experience, which is impossible to some extent. [0003] With the development of machine learning, many machine learning models have been open sourced. A very important premise is that a large amount of training data is required to formulate a network attack defense strategy through machine learning. Network attacks and their corresponding defense strategies are generally not easy to obtain as training data as a single administrator. Therefore, the machine learning model is easy to build, but the difficulty is how to obtain a large amount of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N20/00
CPCG06N20/00H04L63/20
Inventor 章伟郭兴华
Owner 东方财富信息股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products