Unlock instant, AI-driven research and patent intelligence for your innovation.

Threat analysis method and device and threat analysis system

A threat analysis and demand technology, applied in the direction of security devices, neural learning methods, biological neural network models, etc., can solve the problems of low threat analysis accuracy, high threat analysis false alarm rate, and prolonged operation, so as to improve user experience , reduce the false alarm rate and improve efficiency

Active Publication Date: 2022-08-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of 5G and artificial intelligence, the current manual operation method used in security threat analysis has gradually been unable to adapt to the growing demand for hacker attacks, resulting in inconvenient operation (the operator must log in to the system and operate at the same time, all rely on manual operation) , extended operation time, high rate of false alarms in threat analysis, and low accuracy of threat analysis have become increasingly prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat analysis method and device and threat analysis system
  • Threat analysis method and device and threat analysis system
  • Threat analysis method and device and threat analysis system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a threat analysis method, such as figure 1 shown, including:

[0057] S01: Set the initial value and the maximum value of the number of iterations to obtain the threat analysis requirements.

[0058] S02: Obtain a summary of information collection required for threat analysis.

[0059] S03: According to the information collection, summarize and analyze the threat analysis requirement, and obtain the threat analysis result.

[0060] S04: Determine whether the threat analysis result satisfies the in-depth analysis evaluation condition. If yes, end. If not, execute S02, and execute S05: analyze the threat analysis requirement again according to the latest information collection summary and the last threat analysis result, and obtain the current threat analysis result; at the same time, add 1 to the current iteration number.

[0061] Then execute S04 until the number of iterations is equal to the maximum value.

[0062] That is, after S05, it als...

Embodiment 2

[0066] This embodiment provides a threat analysis method, including:

[0067] S01: Set the initial value and the maximum value of the number of iterations to obtain the threat analysis requirements.

[0068] Among them, the initial value of the number of iterations is set to 0 or 1; the maximum number of iterations is 50.

[0069] S02: Obtain a summary of information collection required for threat analysis.

[0070] In this embodiment, the threat analysis requirement and the information collection summary required for the threat analysis are obtained through a mechanism of actively reporting every preset time.

[0071] Of course, the threat analysis requirements and the information collection summary required for threat analysis can also be obtained through a mechanism that is regularly asked.

[0072] S03: According to the information collection, summarize and analyze the threat analysis requirement, and obtain the threat analysis result.

[0073] In this embodiment, the m...

Embodiment 3

[0100] This embodiment provides a threat analysis device, such as Image 6 As shown, it includes: setting module 1, which is used to set the initial value and the maximum value of the number of iterations. The obtaining module 2 is used to obtain the threat analysis requirements, and is also used to obtain the information collection summary required for the threat analysis. The analysis module 3 is used to analyze the threat analysis requirements according to the information collection and summary, and obtain the threat analysis results; and is also used to analyze the threat analysis requirements again according to the latest information collection summary and the last threat analysis results, and obtain the current threat analysis results. The judgment module 4 is used for judging whether the threat analysis result satisfies the depth analysis evaluation condition; and is also used for judging whether the number of iterations is equal to the maximum value. The accumulation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a threat analysis method and device and a threat analysis system. The method includes: S01: setting an initial value and a maximum value of the number of iterations to obtain threat analysis requirements; S02: obtaining information collection summary required for threat analysis; S03: analyzing threat analysis requirements according to the information collection summary, and obtaining threat analysis results; S04: Determine whether the threat analysis result satisfies the deep analysis evaluation conditions; if yes, end; if not, execute S02, and execute S05: analyze the threat analysis requirements again according to the latest information collection summary and the last threat analysis result, and obtain the current threat At the same time, add 1 to the current number of iterations; then execute S04 until the number of iterations is equal to the maximum value and end; the analysis results include operation delay, threat analysis accuracy rate, and threat analysis false positive rate. The method can shorten the operation delay of threat analysis, reduce the false alarm rate of threat analysis, and improve the accuracy of threat analysis.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a threat analysis method and device and a threat analysis system. Background technique [0002] With the rapid development of artificial intelligence, artificial intelligence, also known as machine intelligence, refers to the intelligence exhibited by machines made by humans. Generally artificial intelligence refers to the technology of rendering human intelligence through ordinary computer programs. Artificial intelligence has been generally recognized by the industry as one of the main trends in the evolution of the next generation of technology. Facing the increasingly urgent demand for artificial intelligence, the rapid and continuous development of artificial intelligence-based security threat analysis methods is of great significance. [0003] With the rapid development of 5G and artificial intelligence, the current manual operation method used in securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/121G06N3/04G06N3/08H04W12/122
CPCH04W12/08G06N3/088G06N3/045
Inventor 王智明徐雷陶冶于城智晓欢
Owner CHINA UNITED NETWORK COMM GRP CO LTD