Security threat intelligence management method and system based on big data, storage medium and terminal

A technology of big data and basic data, applied in the computer field, can solve problems such as reducing network security defense capabilities

Active Publication Date: 2020-06-23
重庆特斯联智慧科技股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the output of threat intelligence is based on attack scenarios and virus samples that have already occurred, when unkn

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security threat intelligence management method and system based on big data, storage medium and terminal
  • Security threat intelligence management method and system based on big data, storage medium and terminal
  • Security threat intelligence management method and system based on big data, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them.

[0054] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0056]In the description...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security threat intelligence management method and system based on big data, a storage medium and a terminal. The method comprises the steps of obtaining a data set pre-stored in a data warehouse; inputting each piece of data in the data set into a preset data analysis layer to generate threat intelligence which comprises static threat intelligence and dynamic threat intelligence; and performing network security defense based on the threat information. Therefore, by adopting the embodiment of the invention, the security defense capability of the whole network can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a big data-based security threat intelligence management method, system, storage medium and terminal. Background technique [0002] With the development of Internet technology, network attack methods are showing a trend of diversification and AI. At the same time, the open source of attack tools makes the threshold of network attack lower, which leads to the increase of enterprise defense costs and the gradual decline of defense capabilities, especially for the current AI (artificial intelligence) attacks, due to the use of AI technology to fully simulate real user scenario operations, have led to an exponential increase in the difficulty of enterprise defense. [0003] At present, in network defense technology, virus samples are first analyzed and open-source intelligence is collected, then virus samples are analyzed through a sandbox system and security experts analyz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/1441
Inventor 陈士超李学庆
Owner 重庆特斯联智慧科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products