Network threat intelligence-oriented annotation corpus generation method and electronic device

An intelligence and network technology, applied in network data retrieval, electronic digital data processing, natural language data processing, etc., can solve problems such as labeling corpus noise data, and achieve the effect of reducing the workload of manual labeling

Active Publication Date: 2020-10-30
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the technical problems existing in the prior art, the purpose of the present invention is to provide a network threat intelligence-oriented labeling corpus generation method and an electronic device. Annotate the corpus for automatic annotation, generate large-scale training corpus, and propose automatic denoising and cross-validation methods to solve the problem of noisy data in the annotated corpus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat intelligence-oriented annotation corpus generation method and electronic device
  • Network threat intelligence-oriented annotation corpus generation method and electronic device
  • Network threat intelligence-oriented annotation corpus generation method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the present invention better understood by those skilled in the art, and to make the purpose, technical method and advantages of the present invention clearer, the method proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] In the present invention, a method and system for generating tagged corpus oriented to network threat intelligence is designed, the schematic diagram is shown in the attached figure 1 . The idea of ​​this method is to first construct the network threat intelligence unstructured corpus and the structured triple knowledge base; then define the labeling and encoding scheme of named entities and relationships in the field of network threat intelligence; Carry out automatic labeling to generate large-scale ini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network threat intelligence-oriented annotation corpus generation method and an electronic device, and the method comprises the steps of extracting a safety entity in a structured threat intelligence data training set, mapping each piece of structured threat intelligence data into a (head entity, relation type and tail entity) triple, and obtaining a head entity set and atail entity set; extracting security entities in the to-be-labeled text, and obtaining sentences containing at least one security entity belonging to the head entity set and at least one security entity belonging to the tail entity set; judging a relationship type contained in the sentence; annotating each (head entity, relationship type and tail entity) triple of all sentences to obtain an initial annotation data set, and then obtaining a denoised annotation data set. According to a remote supervision theory, existing structured network threat intelligence data is utilized to label unlabeledcorpora, large-scale training corpora are generated, and an automatic denoising and cross validation method is provided to solve the problem that noise data exists in the labeled corpora.

Description

technical field [0001] The invention belongs to the field of computer network security, and in particular relates to a method and an electronic device for generating marked corpus for network threat intelligence. Background technique [0002] With the development of information science and technology, the integration of network information space and social and economic life is gradually deepening, the scope of influence of network security threats is becoming wider and wider, and the consequences of customized network attacks are also more serious. At the same time, global cyberspace frequently suffers from increasingly complex and covert attacks. For example, in recent years, the number and scope of advanced persistent threats (Advanced Persistent Threat) and targeted attacks (Targeted Attack) worldwide have shown an increasing trend, posing a great threat to cyberspace. Facing the increasingly complex and severe network security situation, Cyber ​​Threat Intelligence (Cyb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F40/295G06F40/211G06F16/955
CPCG06F40/295G06F40/211G06F16/9566
Inventor 苏长鑫江钧杨沛安姜政伟李小萌王旭仁
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products