Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network threat analysis method and device, electronic equipment and storage medium

A technology of threat analysis and network equipment, applied in the field of network information security, can solve problems such as time-consuming

Active Publication Date: 2020-03-10
HARBIN ANTIY TECH
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This analysis method requires a lot of manpower and consumes a lot of time
Moreover, due to the confrontation and uncertainty in the field of network security, existing automated analysis techniques (such as machine learning, data mining, statistical analysis, etc.) cannot achieve comprehensive analysis of network threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat analysis method and device, electronic equipment and storage medium
  • Network threat analysis method and device, electronic equipment and storage medium
  • Network threat analysis method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0050] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] Attached below figure 1 , explain in detail the solutions provided by the embodiments of the present invention, figure 1 It is a flow chart of a network threat analysis method provided by an embodiment of the present invention, and the subject of implementation in the embodiment of the present invention is an electronic device. The electronic device may be a terminal device, such as a personal computer, a desktop computer, and the like. The electronic device can also be a server. Such as figure 1 As shown,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network threat analysis method and device, electronic equipment and a storage medium, and relates to the field of network information security. The method comprises the following steps: acquiring historical data of network equipment in a current network environment; performing semantic processing on the historical data according to a preset semantic tagtype to obtain tag data; creating a threat knowledge graph according to the label data and a stored network environment threat mode; constructing a threat analysis model through the threat knowledge graph and pre-configured threat sample data; when current data of network equipment is received, inputting the current data into the threat analysis model to obtain a threat analysis result of the current data; and updating the threat knowledge graph according to the threat analysis result. According to the method, effective fusion of artificial experience and an automatic analysis technology is realized, and the adversarial resistance and uncertainty in the field of network security can be resisted more comprehensively.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a network threat analysis method, device, electronic equipment and storage medium. Background technique [0002] At present, the cyberspace security situational awareness system based on big data belongs to the category of emerging high-tech fields. In the field of backbone network and national-level cyberspace security, establish an all-weather and all-round security situation awareness system. At the same time, by gathering and sharing security data, it can provide a basic platform and data support for security intelligence sharing and security analysis collaboration. [0003] In the existing network security monitoring and security disposal management platform, when analyzing network threats, technicians judge the emerging network threats based on their own work experience, and classify the threats. This analysis method requires a lot of manpower and takes a lot of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F16/36
CPCH04L63/1433H04L63/1416
Inventor 孙可人万晓慧孙晋超肖新光
Owner HARBIN ANTIY TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More