Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security baseline learning method based on artificial intelligence

An information security and artificial intelligence technology, applied in the field of information security, can solve problems such as lack of humanization, inability to be perfectly applicable, and increased workload, so as to achieve security monitoring, strong self-learning ability and adaptability, and get rid of manual dependence. Effect

Pending Publication Date: 2020-12-22
IND INTERNET INNOVATION CENT (SHANGHAI) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current configuration of the information security baseline of the industrial Internet platform is mostly aimed at the security monitoring of the client itself, without fully considering the security of the network data packets sent by the user, so if a distributed denial of service attack (DDoS) occurs of service attack, DDOS), the existing information security baseline cannot detect
At the same time, based on the information security baseline that only considers the configuration requirements of the client's own security monitoring, the security of the server is not fully considered, so it is impossible to detect the abnormality of the server.
Due to the lack of security detection on the server, and this kind of information security baseline is relatively generalized and long-term, it is impossible to make a targeted security judgment for a certain interaction with the server
[0005] In addition, the current configuration of the information security baseline of the industrial Internet platform is usually set by the relevant staff artificially setting the security evaluation threshold, that is, making a rigid security evaluation based on index data, which not only lacks humanization, but also targets different Scenarios, the same configuration standard cannot be perfectly applied, which requires staff to set different security evaluation thresholds for different scenarios, which undoubtedly increases the workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security baseline learning method based on artificial intelligence
  • Information security baseline learning method based on artificial intelligence
  • Information security baseline learning method based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those skilled in the art can understand that in each embodiment of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0036] The first embodiment relates to an artificial intelligence-based...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security baseline learning method based on artificial intelligence. According to the method, a safety baseline training model is constructed based on the deep learning algorithm, and the finally obtained safety baseline classification model can show very strong self-learning ability and adaptive ability through training and learning, so the safety baseline classification model can be applied to different scenes in subsequent application, and the safety baseline classification model can be applied to different scenes; the information security baseline capable of evaluating the information security of the industrial Internet platform from multiple network layers and application layers is automatically generated, so dependence on manual work is eliminated, manual setting of workers is not needed, and working efficiency is improved. Moreover, as the training feature data used for constructing the security baseline classification model comes from datainvolved in the interaction process of the client and the server, the information security baseline configured based on the security baseline classification model can realize security monitoring of the client and improve the security of the server; and security monitoring of the server and the interaction process between the client and the server can be realized.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to an artificial intelligence-based information security baseline learning method. Background technique [0002] The Industrial Internet is the result of the convergence of global industrial systems with advanced computing, analytics, sensing technologies, and Internet connectivity. Its essence is to closely connect and integrate equipment, production lines, factories, suppliers, products and customers through an open and globalized industrial-grade network platform, and efficiently share various element resources in the industrial economy. Intelligent production methods reduce costs, increase efficiency, help the manufacturing industry to extend the industrial chain, and promote the transformation and development of the manufacturing industry. That is, through the connection between intelligent machines and eventually man-machine connecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06N3/04G06N3/08G06K9/62H04L29/06
CPCG06N3/08H04L63/205G06N3/047G06N3/045G06F18/24155G06F18/241
Inventor 郑忠斌王朝栋彭新张雪帆严明梁晓萌
Owner IND INTERNET INNOVATION CENT (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products