Network security data association analysis method, device and equipment and storage medium

A data association and network security technology, applied in the field of network security, can solve the problems of one-sided security analysis results, wasting analyst time, and inundating security threats.

Active Publication Date: 2021-03-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF14 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, when analyzing network security-related data, analysts usually manually analyze each network security-related data, but this method of separate analysis leads to one-sided security analysis results, often with a large number of false positives, Not only wastes valuable analyst time, but also has the potential to overwhelm real security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security data association analysis method, device and equipment and storage medium
  • Network security data association analysis method, device and equipment and storage medium
  • Network security data association analysis method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] see figure 1 , which shows a flow chart of a network security data association analysis method provided by an embodiment of the present invention, which may include:

[0040] S11: Collect data that can represent the current security situation of the network as a sample, extract corresponding information from the sample as knowledge according to the preset business logic, and use the knowledge to construct a knowledge map.

[0041] A network security da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security data association analysis method and device, equipment and a storage medium, and the method comprises the steps: collecting data capable of representing thecurrent security condition of a network as a sample, extracting corresponding information from the sample as knowledge according to a preset business logic, and constructing a knowledge graph throughthe knowledge; respectively extracting features from each preset rule to obtain corresponding rule features, wherein the rule is data representing that the network has a security threat; and carryingout deep search on the knowledge graph, and if knowledge matched with any rule feature exists in the knowledge graph, determining that the knowledge is a knowledge identification risk matched with anyrule feature. According to the invention, the accuracy and effectiveness of network security analysis can be improved while the network security analysis time is reduced.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically, relates to a network security data association analysis method, device, equipment and storage medium. Background technique [0002] Network security-related data are diverse and complex, including security threat intelligence data, vulnerability information, network environment asset data, network security event data, and expert knowledge of security incident response. In the existing technology, when analyzing network security-related data, analysts usually manually analyze each network security-related data, but this method of separate analysis leads to one-sided security analysis results, often with a large number of false positives, Not only is the analyst's precious time wasted, but the real security threat is likely to be overwhelmed. Contents of the invention [0003] The purpose of the present invention is to provide a network security data assoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/36G06F16/335G06F16/31G06F16/2455
CPCG06F16/367G06F16/313G06F16/335G06F16/24564
Inventor 李雨含范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products