Threat analysis method and device and threat analysis system
A threat analysis and demand technology, applied in security devices, neural learning methods, biological neural network models, etc., can solve the problems of high false positive rate of threat analysis, low accuracy of threat analysis, and prolonged operation, so as to reduce false positives efficiency, improve user experience, and improve efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] This embodiment provides a threat analysis method, such as figure 1 shown, including:
[0057] S01: Set the initial value and maximum value of the number of iterations to obtain threat analysis requirements.
[0058] S02: Obtain a summary of information collection required for threat analysis.
[0059] S03: Collect and analyze threat analysis requirements based on information collection, and obtain threat analysis results.
[0060] S04: Determine whether the threat analysis results meet the evaluation conditions for in-depth analysis. If yes, end. If not, execute S02, and execute S05: analyze the threat analysis requirements again according to the latest information collection summary and the last threat analysis result, and obtain the threat analysis result of this time; at the same time, add 1 to the current iteration number.
[0061] Then execute S04 until the iteration number is equal to the maximum value and end.
[0062] That is, after S05, it also includes: S0...
Embodiment 2
[0066] This embodiment provides a threat analysis method, including:
[0067] S01: Set the initial value and maximum value of the number of iterations to obtain threat analysis requirements.
[0068] Wherein, the initial value of setting iteration number is 0 or 1; the maximum value of iteration number is 50.
[0069] S02: Obtain a summary of information collection required for threat analysis.
[0070] In this embodiment, the threat analysis requirement and the collection and summary of information required for the threat analysis are acquired through a mechanism of active reporting every preset time.
[0071] Of course, it is also possible to obtain the threat analysis requirements and the information collection and summary required for threat analysis through the mechanism of regular inquiry.
[0072] S03: Collect and analyze threat analysis requirements based on information collection, and obtain threat analysis results.
[0073] In this embodiment, methods for analyzin...
Embodiment 3
[0100] This embodiment provides a threat analysis device, such as Image 6 As shown, it includes: setting module 1, which is used to set the initial value and maximum value of the number of iterations. The obtaining module 2 is used to obtain threat analysis requirements, and is also used to obtain information collection and summary required for threat analysis. The analysis module 3 is used to analyze threat analysis requirements based on information collection and summary, and obtain threat analysis results; it is also used to re-analyze threat analysis requirements based on the latest information collection summary and last threat analysis results, and obtain this threat analysis result. The judging module 4 is used to judge whether the threat analysis result satisfies the in-depth analysis evaluation condition; it is also used to judge whether the number of iterations is equal to the maximum value. The accumulating module 5 is used for accumulating the number of iteration...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


