Text data-oriented threat intelligence knowledge graph construction method

A technology of knowledge graph and text data, applied in the fields of unstructured text data retrieval, text database clustering/classification, special data processing applications, etc. Problems such as poor recognition effect

Active Publication Date: 2020-01-21
SICHUAN UNIV +1
View PDF11 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) In view of the high content complexity and difficulty in implementation of the mainstream threat intelligence format, how to design a knowledge map suitable for the threat intelligence field based on the existing information security field ontology and threat intelligence standards, combined with threat in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text data-oriented threat intelligence knowledge graph construction method
  • Text data-oriented threat intelligence knowledge graph construction method
  • Text data-oriented threat intelligence knowledge graph construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application.

[0054] Threat intelligence technology is considered to be one of the effective means to combat advanced persistent attacks. Threat intelligence information based on text data is written by security researchers, which has higher accuracy and richer attack process information. Therefore, the present invention proposes a text data-oriented threat intelligence knowledge map construction method for how to extract structured and high-quality threat intelligence information from unstructured text information and display reasonably. The specific technical scheme is as follows.

[0055] Such as figure 1 The main architecture diagram of the system is shown, and the related design and deployment architecture of the threat awareness system are introduced in detail. Such as figure 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a text data-oriented threat intelligence knowledge graph construction method. The functions of automatically extracting the key information from the text threat intelligence data and constructing the threat intelligence knowledge graph are realized. The invention provides a threat intelligence knowledge graph construction method for text data. The method comprises the following steps: defining an ontology structure in the threat intelligence field; using a threat intelligence named entity recognition model based on multiple factors and a threat intelligence entity relation extraction model based on a graph neural network to obtain threat intelligence entities and relation triples from text data, and finally storing information through a graph database to form a threat intelligence knowledge graph.

Description

technical field [0001] The present invention designs a text data-oriented threat intelligence knowledge map construction system, which extracts threat intelligence entities and relationship triplets in text data through a multi-factor-based threat intelligence named entity recognition model and a graph neural network-based threat intelligence relationship extraction model Groups constitute a threat intelligence knowledge map. It aims to automatically and accurately extract named entities of threat intelligence from a large amount of threat text intelligence, extract threat intelligence entities and relationships to form triples, and generate threat intelligence knowledge graphs. Background technique [0002] With the expansion of Internet applications, a large number of businesses of various government and enterprise units need to be directly connected to the Internet to work. However, the network security situation is still severe, and network attacks occur frequently, thre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/36G06F16/35H04L29/06
CPCG06F16/35G06F16/367H04L63/1433
Inventor 黄诚方勇姜政伟彭嘉毅杨悦
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products