Network security intelligence collection method, device, equipment and storage medium

A technology of network security and collection method, applied in the field of network security, can solve the problems of low efficiency, lack of standardized structure of intelligence information, lack of continuity of human intelligence collection mode, etc., to achieve the effect of expanding the scope of collection and improving the efficiency of collection and processing

Inactive Publication Date: 2019-11-05
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the advent of the 5G era and the development of mobile Internet and multimedia technologies, in addition to traditional text, some intelligence information also exists in the form of pictures or videos. These unstructured data often need to be processed by professionals with knowledge of network security. Only after artificial extraction and summarization can it be used to formulate the security protection strategy of the system. This human-based intelligence collection mode lacks continuity, high cost and low efficiency, and cannot cope with the increasingly large-scale big data intelligence information.
Moreover, artificial intelligence information often lacks a standardized structure, and cannot be directly used for follow-up intelligent analysis of network security like the structured data of security logs generated by security devices such as IPS, IDS, and firewalls.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security intelligence collection method, device, equipment and storage medium
  • Network security intelligence collection method, device, equipment and storage medium
  • Network security intelligence collection method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The core of this application is to provide a method for collecting network security information, which can continuously and large-scale collect network security information on the Internet, effectively improves the efficiency of information collection, and avoids manual collection at the same time , which reduces the collection cost; another core of the present application is to provide a network security intelligence collection device, equipment and computer-readable storage medium, which also have the above-mentioned beneficial effects.

[0045] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security intelligence collection method. The method comprises the steps: starting a web crawler according to a received collection instruction, carrying out the information crawling through the web crawler, and obtaining a network security intelligence resource; classifying the network security intelligence resources to obtain text files and non-text files; calling a file conversion tool according to the file type of the non-text file, and converting the non-text file into a text file by utilizing the file conversion tool; performing information extraction onthe text file according to a preset information standard format specification to obtain target content; standardizing the target content through a preset standardized data generation model to obtain standardized network security information. According to the method, the network security intelligence on the Internet can be continuously acquired on a large scale. The information acquisition efficiency is effectively improved. The invention further discloses a network security intelligence acquisition device, equipment and a computer readable storage medium, which all have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network security information collection method, and also to a network security information collection device, equipment, and computer-readable storage medium. Background technique [0002] Cyber ​​security defense and threat intelligence early warning are becoming one of the important tasks in various industries. The first priority of building a high wall of information security defense is to obtain accurate and reliable cyber security threat intelligence. Cyber ​​Threat Intelligence (Cyber ​​Threat Intelligence) refers to network-oriented Intelligence information in the security field can analyze specific attack methods and identify malicious software and Trojan horses through intelligence. Therefore, collecting network security intelligence, on the one hand, can understand the development trend of network security threats, and help to formulate countermeasu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/951G06F16/906G06F16/33G06F17/22
CPCG06F16/334G06F16/906G06F16/951
Inventor 张光益许爱东明哲杨航陈霖
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products