Threat analysis method and device and threat analysis system
A threat analysis and demand technology, applied in the direction of security devices, neural learning methods, biological neural network models, etc., can solve the problems of low threat analysis accuracy, high threat analysis false alarm rate, and prolonged operation, so as to improve user experience , reduce the false alarm rate and improve efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] This embodiment provides a threat analysis method, such as figure 1 shown, including:
[0057] S01: Set the initial value and the maximum value of the number of iterations to obtain the threat analysis requirements.
[0058] S02: Obtain a summary of information collection required for threat analysis.
[0059] S03: According to the information collection, summarize and analyze the threat analysis requirement, and obtain the threat analysis result.
[0060] S04: Determine whether the threat analysis result satisfies the in-depth analysis evaluation condition. If yes, end. If not, execute S02, and execute S05: analyze the threat analysis requirement again according to the latest information collection summary and the last threat analysis result, and obtain the current threat analysis result; at the same time, add 1 to the current iteration number.
[0061] Then execute S04 until the number of iterations is equal to the maximum value.
[0062] That is, after S05, it als...
Embodiment 2
[0066] This embodiment provides a threat analysis method, including:
[0067] S01: Set the initial value and the maximum value of the number of iterations to obtain the threat analysis requirements.
[0068] Among them, the initial value of the number of iterations is set to 0 or 1; the maximum number of iterations is 50.
[0069] S02: Obtain a summary of information collection required for threat analysis.
[0070] In this embodiment, the threat analysis requirement and the information collection summary required for the threat analysis are obtained through a mechanism of actively reporting every preset time.
[0071] Of course, the threat analysis requirements and the information collection summary required for threat analysis can also be obtained through a mechanism that is regularly asked.
[0072] S03: According to the information collection, summarize and analyze the threat analysis requirement, and obtain the threat analysis result.
[0073] In this embodiment, the m...
Embodiment 3
[0100] This embodiment provides a threat analysis device, such as Image 6 As shown, it includes: setting module 1, which is used to set the initial value and the maximum value of the number of iterations. The obtaining module 2 is used to obtain the threat analysis requirements, and is also used to obtain the information collection summary required for the threat analysis. The analysis module 3 is used to analyze the threat analysis requirements according to the information collection and summary, and obtain the threat analysis results; and is also used to analyze the threat analysis requirements again according to the latest information collection summary and the last threat analysis results, and obtain the current threat analysis results. The judgment module 4 is used for judging whether the threat analysis result satisfies the depth analysis evaluation condition; and is also used for judging whether the number of iterations is equal to the maximum value. The accumulation ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


