Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability knowledge mining method and system based on graph

A knowledge mining and vulnerability technology, applied in the field of graph-based vulnerability knowledge mining, which can solve problems such as difficulty in analyzing vulnerabilities.

Active Publication Date: 2021-04-16
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF16 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is very difficult to fully analyze vulnerabilities by cross-referencing vulnerability information globally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability knowledge mining method and system based on graph
  • Vulnerability knowledge mining method and system based on graph
  • Vulnerability knowledge mining method and system based on graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] All features disclosed in all embodiments in this specification (including any appended claims, abstract and drawings), or steps in all methods or processes implicitly disclosed, except for mutually exclusive features and / or steps, can be used as Combining and / or extending, replacing in any way.

[0038] In 2012, Google proposed the concept of knowledge graph, which provides the ability to integrate, manage and analyze multi-source heterogeneous data by storing a large number of knowledge entities and the relationship between entities. The knowledge map preserves expert experience and reasoning rules, realizes cognition of the objective world through entity and relationship mining, and generates new knowledge from existing knowledge.

[0039] Based on the above information, the present invention collects vulnerability-related data published on the Internet, extracts the attributes and relationships between each vulnerability entity, constructs a cyberspace security vuln...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability knowledge mining method and system based on a graph, and the method comprises the steps: S1, collecting vulnerability data disclosed in the field of network space safety, importing vulnerability data into a database, and constructing a vulnerability knowledge graph; S2, performing vulnerability knowledge mining and the like based on the constructed knowledge graph; fusing multi-source heterogeneous public vulnerability information to form a unified knowledge representation form; obtaining closed-loop knowledge from the product manufacturer to the vulnerability information to the attack method through associated query and derivation of the knowledge graph; and mining more vulnerability-related knowledge based on an algorithm of the knowledge graph.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically, to a method and system for mining vulnerability knowledge based on graphs. Background technique [0002] Network security issues have always been accompanied by the rapid development of the Internet information age. For security practitioners, obtaining and managing massive high-quality vulnerability data is of key value, and it is also an indispensable part of complete cyberspace security. However, software information (CPE), vulnerability data (CVE, CNNVD, CNVD), software defects (CWE), vulnerability POC (exploitDB) and other knowledge are stored in different websites in different forms. Therefore, it is very difficult to fully analyze vulnerabilities by globally cross-referencing vulnerability information. It is of practical significance to develop a unified representation of vulnerability knowledge, integrate information across resource boundaries, and integrate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06N5/02
Inventor 和达刘杰王一凡孙治陈剑锋
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products