Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A threat intelligence ioc reputation analysis method

An analysis method and reputation technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve the problems of inaccurate threat intelligence source data, lack of failure mechanism of threat intelligence, etc., and achieve the effect of ensuring data failure mechanism

Active Publication Date: 2022-04-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention solves the problem that in the prior art, there are a large number of third-party threat intelligence data sources, and all parties do not have a unified evaluation mechanism to evaluate the data sources when using the data sources, resulting in inaccurate data of a large number of threat intelligence sources and lack of threat intelligence The issue of failure mechanism provides an optimized threat intelligence IOC reputation analysis method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threat intelligence ioc reputation analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0028] The invention relates to a threat intelligence IOC reputation analysis method, which achieves the purpose of having a reliable reputation evaluation system for threat intelligence IOCs in various channels, and dynamically adjusts the evaluation system to ensure an effective mechanism

[0029] In this invention, in fact, the IOC of threat intelligence collection mainly comes from three data sources: security vendor’s own equipment (including the company’s use of equipment to capture data in project practice), purchased security vendor data, and open source intelligence data. Among them, for third-party open source intelligence data sources, security vendor data cannot judge the data production process and data evaluation mechanism, and in the actual production process, due to technical, geograp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a threat intelligence IOC credibility analysis method, which comprises the steps of obtaining the threat intelligence IOC, analyzing and establishing network threat behavior activities and communities, and dynamically optimizing the established model at preset intervals. In the present invention, the threat intelligence IOC reputation scoring model is established mainly based on the traffic data and log data of the self-owned equipment and the data shared with the third party, as well as the attacker and data source characteristics obtained through deep mining of the data in each project through technical means, which can satisfy The use of data from various data sources satisfies the verification of the credibility of data sources in the existing threat intelligence source sharing system, and solves the problem that there are a large number of inaccurate threat intelligence source data in the existing market and the lack of failure mechanisms for threat intelligence, so that no matter whether it is collected by three parties Open source data sources and traffic analysis in self-owned equipment can be evaluated for credibility. The system can dynamically adjust the model structure over time to ensure the data failure mechanism.

Description

technical field [0001] The invention belongs to the technical field of digital information transmission, such as telegram communication, and in particular relates to a threat intelligence IOC credibility analysis method. Background technique [0002] Threat intelligence has been used in military and production processes in ancient times, and has become one of the hot words in cyber security in recent years. [0003] With the gradual development of threat intelligence in China, the number of companies with internal threat intelligence research teams is increasing rapidly. At the same time, related products, platforms, and intelligence data designed on the Internet have also increased accordingly. How to do a good job in the foundation of threat intelligence-data checks, establish a reliable data reputation evaluation system, and establish an effective evaluation mechanism for the data used by platforms or products has become a pain point in the use of threat intelligence toda...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/20H04L63/302
Inventor 罗毓环范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products