A test method, device and equipment for an intelligence analysis engine
An analysis engine and testing method technology, applied in the field of intelligence analysis engine testing methods, equipment and readable storage media, and devices, can solve problems such as low test efficiency and limited test data coverage, so as to improve test efficiency and coverage. efficiency, improve reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] The first embodiment of the test method for an intelligence analysis engine provided by the application is introduced below, see figure 1 , embodiment one includes:
[0053] S101. Collect threat intelligence data to obtain a first threat intelligence data set.
[0054] Due to the huge amount of threat intelligence (tens of millions), in practical applications, high-performance search engines (including but not limited to Elasticsearch) can be used for data collection. Then the threat intelligence data is preprocessed, including data parsing, standardization, filling and other processes, and finally the threat intelligence data is stored, specifically in the form of a JSON document, to obtain the first threat intelligence data set.
[0055] S102. Generate a threat label for each piece of threat intelligence data in the first threat intelligence data set according to the data content of the threat intelligence data.
[0056] Then, according to the data content of the th...
Embodiment 2
[0070] The following begins to introduce in detail the second embodiment of the test method of an intelligence analysis engine provided by the application, see figure 2 , embodiment two specifically includes:
[0071] S201. Collect threat intelligence data, and store the threat intelligence data. Generate threat tags for each piece of threat intelligence data.
[0072] Suppose the threat intelligence data A is as follows: threat type: Trojan, threat source type: IP, threat source address: 1.2.3.4, data source credibility: 0.6, intelligence source credibility: 0.8.
[0073] Then the threat label of the threat intelligence data A is: threat type: Trojan horse, threat source type: IP, data source credibility: 0.6, intelligence source credibility: 0.8.
[0074] S202. Acquire the intelligence analysis rules of the intelligence analysis engine, perform data standardization on the intelligence analysis rules, and obtain a plurality of key-value pair data, each key-value pair data ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


