Security policy optimization processing method and device based on big data

A security policy and processing method technology, applied in the field of security policy optimization processing based on big data, can solve problems such as lack of training data and inaccurate prevention strategies, and achieve the effect of reducing human dependence

Active Publication Date: 2021-10-08
东方财富信息股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a big data-based security policy optimization processing method and device to solve the problems in the related art that the manual definition of defense policies against network attacks is not precise enough and the prevention policies are lack of training data through machine learning training models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy optimization processing method and device based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0020] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0021] It should be noted that the terms "first" and "second...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a big data-based security policy optimization processing method and device. The method includes: obtaining an upload log file uploaded by a user and a defense policy corresponding to the log file; when the number of log files corresponding to a predetermined defense rule reaches a threshold, inputting the log file and the defense rule as training data into a pre-configured The machine learning model is trained to obtain the training model corresponding to the prevention rule; the log files to be identified are respectively input into multiple training models, and the probability value corresponding to the log file and each training model is obtained; the combined prevention Policy hints to uploaders of scheduled log files. The present application solves the problems in the related art that the manual definition of defense strategies against network attacks is not precise enough and the prevention strategies are lack of training data for formulating defense strategies through machine learning training models. This reduces the dependence on people in the process of formulating prevention strategies.

Description

technical field [0001] The present application relates to the field of machine learning, in particular, to a big data-based security policy optimization processing method and device. Background technique [0002] In the existing technology, there are many kinds of network attacks. At present, the prevention of network attacks basically relies on manual formulation of strategies. This requires every network administrator to have rich experience, which is impossible to some extent. [0003] With the development of machine learning, many machine learning models have been open sourced. An important prerequisite for formulating a network attack prevention strategy through machine learning is the need for a large amount of training data. Network attacks and their corresponding prevention strategies are generally not easy to obtain as training data for individual administrators. Therefore, the machine learning model is easy to build, but the difficulty is how to obtain a large a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06N20/00
CPCG06N20/00H04L63/20
Inventor 章伟郭兴华
Owner 东方财富信息股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products