Threat intelligence evaluation method and device, equipment and storage medium
An evaluation method and intelligence technology, applied in the field of network security, can solve the problems of low evaluation efficiency and inability to obtain comprehensive and accurate evaluation results, and achieve the effect of improving evaluation efficiency and accurate value evaluation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Figure 1A It is a flow chart of a method for evaluating threat intelligence provided by Embodiment 1 of the present invention. This embodiment is applicable to accurately evaluating the value of threat intelligence when threat information is obtained. This method can be implemented by the method in the embodiment of the present invention Threat intelligence evaluation device to perform, the device can be implemented by software and / or hardware, and integrated in electronic equipment, the method specifically includes the following steps:
[0033] S110. Obtain threat intelligence to be evaluated, and determine a data processing manner of the threat intelligence.
[0034] Among them, threat intelligence is a compromise identifier used to identify and detect threats, and can specifically include file hash values, Internet protocol addresses, domain names, program running paths, and registry entries; through threat intelligence, enterprises or organizations can identify curr...
Embodiment 2
[0050] figure 2 It is a flowchart of a method for evaluating threat intelligence provided by Embodiment 2 of the present invention. This embodiment is embodied on the basis of the above-mentioned embodiments. In this embodiment, according to the data processing method and content of threat intelligence, respectively Determining the first classification category and the second classification category of the threat intelligence, and determining the corresponding target classification category, and then determining the value score corresponding to the current threat intelligence, the method specifically includes:
[0051] S210. Obtain threat intelligence to be evaluated, and determine a data processing manner of the threat intelligence.
[0052] S220. Classify the threat information according to the data processing manner of the threat information, so as to obtain a first classification category of the threat information.
[0053] S230. Determine whether the threat information ...
Embodiment 3
[0063] image 3 It is a flowchart of a threat intelligence evaluation method provided by Embodiment 3 of the present invention. This embodiment is embodied on the basis of the above embodiments. In this embodiment, after obtaining the value score of threat intelligence, the corresponding quality score, and then obtain the comprehensive score corresponding to the threat intelligence, and obtain the comprehensive score corresponding to each intelligence source. The method specifically includes:
[0064] S310. Obtain threat intelligence to be evaluated, and determine a data processing manner of the threat intelligence.
[0065] S320. Classify the threat information according to the data processing manner of the threat information, so as to obtain a first classification category of the threat information.
[0066] S330. Acquire a value score of the threat intelligence according to the first category of the threat intelligence.
[0067] S340. Acquire the quality score of the thre...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


