Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information network unified vulnerability multi-dimensional security intelligence collection, analysis and management system

A technology of information network and intelligence collection, applied in the field of information network security, can solve problems such as inconvenient management, and achieve the effect of improving the level of security management

Pending Publication Date: 2021-04-06
GUIZHOU POWER GRID CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies in the prior art, the present invention provides a multi-dimensional security intelligence collection, analysis and management system for information network unified vulnerabilities, which can solve the data collection, analysis, processing, and post-processing of the existing information network unified vulnerabilities and multi-dimensional security intelligence collection, analysis and management system. Inconvenient management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information network unified vulnerability multi-dimensional security intelligence collection, analysis and management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] As shown in the figure, the information network unified vulnerability multi-dimensional security intelligence collection analysis management sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information network unified vulnerability multi-dimensional security intelligence collection, analysis and management system. The system comprises an intelligence data collection module, a manual identification module, a simulation test module, an input solution module, an input information standardization module and a vulnerability intelligence information base module. According to the information network unified vulnerability multi-dimensional security intelligence collection, analysis and management system, for collected original security intelligence, firstly, manual identification is carried out, credibility and possible harmfulness of the original security intelligence are preliminarily evaluated, then the security intelligence is submitted to the simulation test system module for test verification, and a general solution is given, so that a solution is provided for subsequent repair or reinforcement inpu. After the original security intelligence is analyzed and verified, the intelligence, the solution and other achievement information are normalized to form a vulnerability intelligence information specification required by the system, and the vulnerability intelligence information specification is stored in a vulnerability intelligence information base, so that the vulnerability intelligence information is convenient to use or manage by the system.

Description

technical field [0001] The invention relates to the technical field of information network security, in particular to an information network unified vulnerability multi-dimensional security intelligence collection, analysis and management system. Background technique [0002] As the country's requirements for network information security become more and more comprehensive, many units have deployed a variety of network information security equipment to improve their network security protection level, strengthen their own network security protection, and improve their own network security management level. The objects of intelligence data analysis in the field of network information security are generally the protection logs and traffic of various network security devices. Scan result information, WEB application security information, etc. The processing of these information follows the three main stages of data collection, data storage, and data analysis. [0003] The state...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1433H04L41/14
Inventor 魏力鹏王皓然严彬元班秋成周泽元吕嵘晶刘俊荣陶佳冶周琳妍方继宇
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products