Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat intelligence defense method and system

A technology of intelligence and intelligence database, applied in the field of threat intelligence defense methods and systems, and can solve problems such as low protection effect

Inactive Publication Date: 2020-10-20
云南电网有限责任公司信息中心 +1
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a threat intelligence defense method and system to solve the problem of low protection effect when the existing technology guarantees network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence defense method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0054] see figure 1 , is an overall flow chart of the threat intelligence defense method provided in the embodiment of the present application. Such as figure 1 As shown, the method includes the following steps:

[0055] S1. Obtain threat intelligence;

[0056] S2. Obtain a threat intelligence management platform based on the above threat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threat intelligence defense method and system. The method comprises the steps of acquiring threat intelligence; acquiring a threat information management platform based on thethreat information; performing collision matching on the threat intelligence management platform and the security big data analysis platform to obtain alarm information; performing normal scanning task screening processing on the alarm information to obtain threat alarm information; performing association analysis on the threat alarm information and a dynamic asset library, and positioning a threat source corresponding to the threat alarm information; and blocking the threat alarm information and the threat source. According to the invention, the network security can be effectively ensured.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a threat intelligence defense method and system. Background technique [0002] With the development of science and technology, computer networks are also becoming more and more popular. Due to the openness, interconnection and various connection methods of computer networks, network users often face network attacks from network hackers. Therefore, in the face of various threats that invade the network, it is very important to ensure network security. [0003] In terms of ensuring network security, the existing technology generally deploys security products such as firewalls and intrusion detection systems to implement security defense methods such as attack behavior perception, log collection and analysis, and security notification. These security products compare the network security events to be detected with cloud data, and if threat intelligence is found, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/302H04L63/1441
Inventor 苏永东杨本富周靖胡健肖鹏颜颖王海林唐旭玥丁林盛陆宗奎单巧梅王俊
Owner 云南电网有限责任公司信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products