Supercharge Your Innovation With Domain-Expert AI Agents!

Threat intelligence data sensing method and device, electronic device and storage medium

A technology of intelligence data and perception devices, applied in the field of network security, can solve the problems of low detection efficiency of network threat attacks and achieve the effect of improving detection efficiency

Active Publication Date: 2021-01-05
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF17 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a threat intelligence data perception method, device, electronic device and storage medium, so as to at least solve the problem of low detection efficiency of network threat attacks in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence data sensing method and device, electronic device and storage medium
  • Threat intelligence data sensing method and device, electronic device and storage medium
  • Threat intelligence data sensing method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ordinary skill in the art relevant to the content disclosed in this application, the technology disclosed in this application Some design, manufacturing or production changes based on the content are just conventional technical means, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a threat intelligence data sensing method and device, an electronic device and a storage medium. The sensing method of the threat intelligence data comprises the following steps: obtaining the threat intelligence data; inputting the threat intelligence data into a reinforcement learning model to obtain a behavior expectation table, the reinforcement learning model being trained based on a Qlearning algorithm; and determining an attack source of the threat intelligence data according to the behavior expectation table. Through the method and the device, the problem of low detection efficiency of the network threat attack in related technologies is solved, and the detection efficiency of the network threat attack is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a threat intelligence data perception method, device, electronic device and storage medium. Background technique [0002] With the continuous progress of my country's information technology, more and more leaks involving the field of computer information have caused more and more impact on the country and individuals. Therefore, obtaining the attack source in real time and quickly has become a key point. However, a large amount of threat intelligence data is difficult to manually find out the source of the attack in a short period of time, which leads to the problem of low detection efficiency of network threat attacks. Therefore, in the case of limited manpower, using advanced computer information security technology to conduct real-time and rapid analysis of clues has become an urgent problem to be solved. [0003] In related technologies, all network acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/302H04L63/1416H04L63/1425
Inventor 杨春雷范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More