Security event type determination method, device and system and storage medium

A security event and determination method technology, applied in the information field, can solve problems such as security threats of network equipment terminal equipment, missed detection and reporting of security events, etc., to reduce the probability of missed detection and reporting of security events, improve accuracy, and determine the method flexible effects

Pending Publication Date: 2021-01-26
SANGFOR TECH INC
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increasing types of characteristic attributes of current network security events and the frequent changes of various types of characteristic attributes, the threat intelligence technology in related technologies cannot accurately detect and determine the type of security events with changeable characteristic attributes, so it is easy to appear Missing detection and reporting of security events poses a huge threat to the security of network equipment and terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security event type determination method, device and system and storage medium
  • Security event type determination method, device and system and storage medium
  • Security event type determination method, device and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0065] It should be understood that the specific embodiments described here are only used to explain the embodiments of the present invention, and are not intended to limit the embodiments of the present invention.

[0066] The embodiments of the present invention relate to the field of information technology, and in particular, to a method, device, system, and computer-readable storage medium for determining a security event type.

[0067] Among related technologies, the mainstream threat intelligence technology mainly identifies security events by identifying IOCs including files, Uniform Resource Locators (Uniform Resource Locators, URLs), Internet Protocol (Internet Protocol, IP) addresses, and md5. Traces of the activity of the attacking organization are included in the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security event type determination method. The method comprises the steps of obtaining a to-be-determined security event set containing a plurality of to-be-determined securityevents; processing any to-be-determined security event in the to-be-determined security event set, and determining feature information of a preset dimension; and determining the type of any to-be-determined security event based on the feature information of the preset dimension. The invention further provides a safety event type determining device and system and a storage medium. According to thesecurity event type determination method provided by the invention, the accuracy of determining any to-be-determined security event type can be more flexibly improved, so that the probability of missing report of the security event is reduced, and the security is improved.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method, device, system and computer-readable storage medium for determining a security event type. Background technique [0002] Cyber ​​security incidents are detected and identified through threat intelligence technology. In related technologies, the characteristic data of suspected security events detected by the threat intelligence technology are only intrusion indicators (Indicators of Compromise, IOC). However, with the increasing types of characteristic attributes of current network security events and the frequent changes of various types of characteristic attributes, the threat intelligence technology in related technologies cannot accurately detect and determine the type of security events with changeable characteristic attributes, so it is easy to appear Missing detection and reporting of security events poses a huge threat to the security of network de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L29/06
CPCG06F21/566H04L63/1416H04L63/1441
Inventor 蒲大峰
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products