Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security equipment knowledge reasoning method, device and system and storage medium

A technology of network security and knowledge reasoning, which is applied in the field of data processing of network security equipment, can solve problems such as process dispersion and reasoning result errors, and achieve accurate results

Active Publication Date: 2021-08-13
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reasoning method of the existing network security equipment derives a new judgment through simple one or several known judgments, without taking into account the whole process of the system and the relationship between each other in the whole reasoning process, the whole process is relatively Discrete, the results of reasoning generally have large errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security equipment knowledge reasoning method, device and system and storage medium
  • Network security equipment knowledge reasoning method, device and system and storage medium
  • Network security equipment knowledge reasoning method, device and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] refer to figure 1 This example discloses a network security device knowledge reasoning method, and the method includes:

[0038] S101: Real-time network security device acquired data acquired data, multi-fused the acquired data to obtain a directional view of the relationship between the network security devices;

[0039] It should be noted that the entire method of the present invention is to operate in real time, and the data acquisition of the network security device acquired in step S101, and the data acquired every time the subsequent steps are performed.

[0040] Among them, the distributed network security device includes a distributed network controller, a host controller, a core controller, a host security agent, a firewall, a secure communication module, and more.

[0041] Among them, the acquired data includes various work information of the device ID, the device, such as the network controller receives job information from the host controller. Each network secur...

Embodiment 2

[0065] This embodiment is mainly to disclose a network security device knowledge, including a processor, and a memory, the memory being stored with a computer program, the computer program is implemented when executed by a processor. . The processor can be one or more processors, the memory can be one or more memories, and the specific implementation process can be referred to the above method embodiment, and details are not described herein again.

Embodiment 3

[0067] This embodiment discloses a computer readable storage medium, which is characterized in that a computer program is stored, and the computer program is executed by the processor to perform the method steps described herein. The specific implementation process can be referred to the above method embodiments, and details are not described herein again.

[0068] The storage medium can be a disk, an optical disk, a read only memory, a ROM or Random Abbssmemory, RAM, and the like.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security equipment knowledge reasoning method, device and system and a storage medium, and the method comprises the steps: obtaining data collected by distributed deployment network security equipment in real time, and carrying out the multiple fusion to obtain a knowledge state directed graph containing the directed relationship between the network security equipment; making the directed relationship of the knowledge state directed graph into a multivariate matrix, and sending the multivariate matrix into a risk reasoning state machine constructed by a pre-trained multi-layer deep neural network to obtain a state prediction result containing the directed relationship between the network security devices; and comparing the obtained state prediction result with a knowledge state directed graph obtained based on data collected by the network security equipment at the next moment, and if the state prediction result is inconsistent with the knowledge state directed graph, judging that a security risk situation occurs. According to the method, device and system, safety risks are found in time, active defense is achieved, the whole process of the system and the mutual relation are considered in the whole reasoning process, the whole process is highly integrated, and the reasoning result is more accurate.

Description

Technical field [0001] The present invention relates to the field of network security equipment data processing, and more particularly to a network security device knowledge, a method, apparatus, system, and storage medium. Background technique [0002] The reasoning method is to understand objective reality, get new knowledge, knowledge thrust in network security equipment can help predict the problem of discovering network security equipment. The existing network security equipment is derived from a simple one or more known judgments, and has been derived from a new judgment. It does not take the entire process of the system and the relationship between the entire reason, the entire process is compared. The results of discrete, reasoning generally have a large error. Inventive content [0003] The technical problem to be solved by the present invention is that the results of the above reasoning of the prior art generally have a defect in error, providing a network security dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/36G06N3/04G06N3/08G06N5/04
CPCG06F16/367G06N3/08G06N5/04G06N3/045
Inventor 戚建淮周杰郑伟范宋晶唐娟刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products