Unlock instant, AI-driven research and patent intelligence for your innovation.

Threat analysis method and device and threat analysis system

A threat analysis and demand technology, applied in security devices, neural learning methods, biological neural network models, etc., can solve the problems of high false positive rate of threat analysis, low accuracy of threat analysis, and prolonged operation, so as to reduce false positives efficiency, improve user experience, and improve efficiency

Active Publication Date: 2020-04-24
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of 5G and artificial intelligence, the current manual operation method used in security threat analysis has gradually been unable to adapt to the growing demand for hacker attacks, resulting in inconvenient operation (the operator must log in to the system and operate at the same time, all rely on manual operation) , extended operation time, high rate of false alarms in threat analysis, and low accuracy of threat analysis have become increasingly prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat analysis method and device and threat analysis system
  • Threat analysis method and device and threat analysis system
  • Threat analysis method and device and threat analysis system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a threat analysis method, such as figure 1 shown, including:

[0057] S01: Set the initial value and maximum value of the number of iterations to obtain threat analysis requirements.

[0058] S02: Obtain a summary of information collection required for threat analysis.

[0059] S03: Collect and analyze threat analysis requirements based on information collection, and obtain threat analysis results.

[0060] S04: Determine whether the threat analysis results meet the evaluation conditions for in-depth analysis. If yes, end. If not, execute S02, and execute S05: analyze the threat analysis requirements again according to the latest information collection summary and the last threat analysis result, and obtain the threat analysis result of this time; at the same time, add 1 to the current iteration number.

[0061] Then execute S04 until the iteration number is equal to the maximum value and end.

[0062] That is, after S05, it also includes: S0...

Embodiment 2

[0066] This embodiment provides a threat analysis method, including:

[0067] S01: Set the initial value and maximum value of the number of iterations to obtain threat analysis requirements.

[0068] Wherein, the initial value of setting iteration number is 0 or 1; the maximum value of iteration number is 50.

[0069] S02: Obtain a summary of information collection required for threat analysis.

[0070] In this embodiment, the threat analysis requirement and the collection and summary of information required for the threat analysis are acquired through a mechanism of active reporting every preset time.

[0071] Of course, it is also possible to obtain the threat analysis requirements and the information collection and summary required for threat analysis through the mechanism of regular inquiry.

[0072] S03: Collect and analyze threat analysis requirements based on information collection, and obtain threat analysis results.

[0073] In this embodiment, methods for analyzin...

Embodiment 3

[0100] This embodiment provides a threat analysis device, such as Image 6 As shown, it includes: setting module 1, which is used to set the initial value and maximum value of the number of iterations. The obtaining module 2 is used to obtain threat analysis requirements, and is also used to obtain information collection and summary required for threat analysis. The analysis module 3 is used to analyze threat analysis requirements based on information collection and summary, and obtain threat analysis results; it is also used to re-analyze threat analysis requirements based on the latest information collection summary and last threat analysis results, and obtain this threat analysis result. The judging module 4 is used to judge whether the threat analysis result satisfies the in-depth analysis evaluation condition; it is also used to judge whether the number of iterations is equal to the maximum value. The accumulating module 5 is used for accumulating the number of iteration...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threat analysis method and device and a threat analysis system. The method comprises the steps: S01, setting an initial value and a maximum value of the number of iterations,and obtaining a threat analysis demand; S02, acquiring, collecting and summarizing information required by threat analysis; S03, collecting, summarizing and analyzing threat analysis requirements according to the information, and obtaining a threat analysis result; S04, judging whether the threat analysis result meets a deep analysis evaluation condition or not: if so, ending, or else executing the step S02, and executing the step S05: analyzing the threat analysis demand again according to the latest information collection summary and the previous threat analysis result to obtain the threat analysis result, and adding 1 to the current number of iterations; and then executing S04 until the number of iterations is equal to the maximum value, wherein the analysis result comprises operation time delay, threat analysis accuracy and threat analysis false alarm rate. According to the method, the threat analysis operation time delay can be shortened, the false alarm rate of threat analysis isreduced, and the threat analysis accuracy is improved.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a threat analysis method and device and a threat analysis system. Background technique [0002] With the rapid development of artificial intelligence, artificial intelligence, also known as machine intelligence, refers to the intelligence shown by machines made by humans. Generally artificial intelligence refers to the technology of presenting human intelligence through ordinary computer programs. Artificial intelligence has been generally recognized by the industry as one of the main trends in the evolution of next-generation technologies. Facing the increasingly urgent demand for artificial intelligence, the rapid and continuous development of artificial intelligence-based security threat analysis methods is of great significance. [0003] With the rapid development of 5G and artificial intelligence, the current manual operation method used in security thre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08G06N3/04G06N3/08H04W12/122
CPCH04W12/08G06N3/088G06N3/045
Inventor 王智明徐雷陶冶于城智晓欢
Owner CHINA UNITED NETWORK COMM GRP CO LTD