Network threat intelligence automatic extraction method based on deep learning

A deep learning and automatic extraction technology, applied in the field of network security, can solve the problems of low intelligence recognition accuracy and intelligence entity disorder, and achieve the effect of improving accuracy

Pending Publication Date: 2020-08-18
BEIJING UNIV OF POSTS & TELECOMM
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current method of intelligence extraction is prone to the prediction results of intelligence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat intelligence automatic extraction method based on deep learning
  • Network threat intelligence automatic extraction method based on deep learning
  • Network threat intelligence automatic extraction method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0028] TI (Threat Intelligence) defines knowledge based on evidence, including scenarios, mechanisms, indicators, meanings, and actionable recommendations. Among the network security defense methods, the use of known CTI (Cyber ​​Threat Intelligence) to defend against attacks from unknown threats is an active defense method that uses detection and analysis as a means. Compared with traditional passive defense, active defense has excellen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network threat intelligence automatic extraction method based on deep learning, which can obtain intelligence source data and judge the data structure type of the intelligence source data. If the data structure type is an unstructured type, inputting the intelligence source data into a pre-trained intelligence entity identification model to obtain each intelligence entity in the intelligence source data, the intelligence entity identification model being a neural network model obtained by training based on preset characters and front and back positionconstraint conditions of the characters by using the intelligence sample data; and according to a preset combination form, combining the information entities to obtain the network threat information.According to the invention, a pre-trained information entity identification model can be used to carry out automatic extraction of network threat information; and the position constraint conditions introduced by the information entity identification model during training limit the front-back position relationship of the characters in the information entity, so that the out-of-order result of theinformation entity is reduced, and the accuracy of network threat information identification is improved.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to a method for automatically extracting network threat intelligence based on deep learning. Background technique [0002] With the rapid development of Internet technology, all kinds of data are uploaded to the Internet, and network information security has become a focus of various organizations. In order to avoid threats to themselves, it is necessary to defend against attacks by attackers. In network security defense methods, the use of known network threat intelligence to defend against unknown threats is an active defense method that uses detection and analysis as a means. Threat intelligence is knowledge based on evidence, including scenarios, mechanisms, indicators, meanings, and actionable recommendations. This knowledge is intelligence information related to threats faced, and there is evidence that the organization may be threatened. Cyber ​​threat intelligence is th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/951G06F16/9535G06N3/08G06N3/04
CPCG06F16/951G06F16/9535G06N3/08G06N3/045G06N3/044
Inventor 李小勇武涵高雅丽郭宁
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products