Unlock instant, AI-driven research and patent intelligence for your innovation.

Security assessment method and device, computer system and medium

A security assessment and security protection technology, applied in the field of information security, which can solve the problems of uneven protection levels and no protection capabilities.

Active Publication Date: 2020-10-30
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different protection methods and protection levels adopted by various parties, there is currently no systematic evaluation method for the protection capabilities of such malicious text attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security assessment method and device, computer system and medium
  • Security assessment method and device, computer system and medium
  • Security assessment method and device, computer system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0032] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security assessment method, and relates to the field of information security, and the method comprises the steps: constructing a malicious text sample; sending the malicious text sample to a to-be-tested server; determining an attack state of the malicious text sample for the to-be-tested server based on a response result of the to-be-tested server for the malicious text sample; and based on the attack state, determining a security protection level of the to-be-tested server for the malicious text. The invention further provides a security assessment device, a computersystem and a medium.

Description

technical field [0001] The present disclosure relates to the field of information security, and more specifically, to a security assessment method, device, computer system and medium. Background technique [0002] With the rapid development of the Internet and smart devices, natural language processing technology based on machine learning and deep learning has been widely used in many business scenarios such as text classification, language modeling, machine translation, and question answering systems, greatly improving information processing efficiency. At the same time, malicious text attacks against these application scenarios are also gradually increasing. Attackers mix a large amount of abusive texts, pornographic texts, political violence and terrorism content, various spam advertisements, etc. in the network text interaction content to attract public attention. , defrauding users to click and then implement phishing or fraud, which has a great impact on Internet cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/35
CPCH04L63/1416H04L63/1433H04L63/1441G06F16/353
Inventor 周京程佩哲金驰张诚
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA