Big data-based security interception rule updating method and artificial intelligence security system

A security system and artificial intelligence technology, applied in the field of big data, can solve the problem of not considering matching, and it is difficult to guarantee the effect of vulnerability repair, so as to improve the matching degree and improve the effect of vulnerability repair.

Inactive Publication Date: 2021-08-10
深圳市合美鑫精密电子有限公司
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in related technologies, the pre-fixing of vulnerabilities does not consider matching with interception application services (such as application services provided by third...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data-based security interception rule updating method and artificial intelligence security system
  • Big data-based security interception rule updating method and artificial intelligence security system
  • Big data-based security interception rule updating method and artificial intelligence security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0020] figure 1 It is an interactive schematic diagram of a big data-based security interception rule update system 10 provided by an embodiment of the present disclosure. The system 10 for updating security interception rules based on big data may include an artificial intelligence security system 100 and an Internet service terminal 200 communicatively connected to the artificial intelligence security system 100 . figure 1 The shown big data-based security interception rule update system 10 is only a feasible example, and in other feasible embodiments, the big data-based security interception rule update system 10 may also only include figure 1 At least some of the components shown may also include other components.

[0021] In an embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a big data-based security interception rule updating method and an artificial intelligence security system, and the method comprises the steps: carrying out the matching of a security interception rule cluster of an information security operation framework for intercepting an application service according to a service risk vulnerability; and screening a plurality of target screening security interception rule clusters for the service risk vulnerability according to the security interception service interval of each security interception rule in the security interception rule clusters, and performing vulnerability pre-repair according to the target screening security interception rule clusters. According to the technical scheme, the security interception rule characteristics of the information security operation framework for intercepting the application service are considered, and the security interception service interval of the security interception rule is also considered, so that the matching degree with the intercepted application service can be improved during vulnerability pre-repair, and the vulnerability repair effect can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of big data, and for example, relates to a method for updating security interception rules based on big data and an artificial intelligence security system. Background technique [0002] Internet risk control is usually based on big data and belongs to the data application layer. For Internet service providers, the core value of risk control lies in the identification of information security risks. For example, the number and variety of security risks on the Internet is increasing, and today a large number of malware samples can be continuously detected, most of which are well-targeted, use stealth methods to steal confidential data, and are themselves constantly evolving . [0003] Information security risk is the process of discovering, understanding, assessing, and mitigating risks and their underlying vulnerabilities, as well as understanding the impact on information, information systems, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/23G06F21/55G06F21/57
CPCG06F21/552G06F21/577G06F16/23
Inventor 尹晓兵古丽波莫正兵黄昌源
Owner 深圳市合美鑫精密电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products