Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cyberspace threat knowledge extraction method and device

A network space and knowledge extraction technology, applied in character and pattern recognition, special data processing applications, instruments, etc., can solve problems that cannot be applied well

Active Publication Date: 2020-08-28
NAT UNIV OF DEFENSE TECH
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, it is necessary to address the above technical problems and provide a cyberspace threat knowledge extraction method and device that can solve the hidden entity and relationship extraction problem that traditional structured information extraction technology cannot be well applied to the cyberspace threat knowledge graph.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cyberspace threat knowledge extraction method and device
  • Cyberspace threat knowledge extraction method and device
  • Cyberspace threat knowledge extraction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0049] In one embodiment, such as figure 1 As shown, a cyberspace threat knowledge extraction method is provided, including the following steps:

[0050] Step 102, according to the pre-trained multi-label classifier, extract the ontology concept of the text to be extracted and the relationship between the ontology concepts.

[0051] A multi-label classifier is a model for semantic classification based on labels, such as the existing RNN model, CNN model, etc.

[0052] Ontology is the concept on the upper layer of the map. Generally speaking, ontology has no practical mea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cyberspace threat knowledge extraction method and device. The cyberspace threat knowledge extraction method comprises the steps of extracting ontology concepts of a to-be-extracted text and relationships among the ontology concepts according to a pre-trained multi-label classifier; extracting examples corresponding to the ontology concepts in the text to be extracted according to a pre-trained multi-class classifier of each ontology concept; and according to the entities corresponding to the ontology concepts and the relationship between the ontology concepts, determining the relationship between the instances. By adopting the cyberspace threat knowledge extraction method, the extraction problem of cyberspace threat knowledge in the unstructured text can be wellsolved by combining the hidden entity and the ontology relationship.

Description

technical field [0001] The present application relates to the technical field of knowledge graphs, in particular to a method and device for extracting cyberspace threat knowledge. Background technique [0002] Perceive cyberspace threats from all dimensions and from multiple perspectives, especially the intelligent and systematic recognition of tactics, combat techniques, vulnerabilities and products associated with advanced sustainable threat attacks, which will help improve the country and enterprises’ scientific knowledge of cyber threats. defense ability. In order to fully understand cyberspace threats, STIX 2.0 (Structured Threat Information Expression) describes cyberspace threat information from 12 components such as attack patterns, attack activities, and actions. Aiming at the structured language description of STIX 2.0, MITER has constructed ATT&CK framework (A Globally Accessible Knowledge base of CyberAdversary Tactics and Techniques), CAPEC attack pattern (Comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/36G06F16/35G06K9/62
CPCG06F16/367G06F16/355G06F18/241G06F18/214
Inventor 丁兆云黄松平刘蔚柯刘凯朱承朱先强刘斌汤罗浩刘毅周鋆
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products