Supercharge Your Innovation With Domain-Expert AI Agents!

Information perception method and information security system based on big data and artificial intelligence

An information security system and information perception technology, applied in the fields of electronic digital data processing, computer security devices, special data processing applications, etc., can solve the problem of insufficient situational awareness information, not considering the deep correlation of threat attack intelligence, and affecting developers. The effect of security protection configuration and other issues to achieve the effect of improving the amount of situational awareness information

Active Publication Date: 2021-08-24
铭台(北京)科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the information security situational awareness process of related technologies, the current security situational awareness process does not take into account the deep correlation of actual threat and attack intelligence, resulting in intelligence-related situational awareness information obtained from the security situational awareness control of the target situational awareness operating object Insufficient amount, which may affect the effect of security protection configuration by subsequent developers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information perception method and information security system based on big data and artificial intelligence
  • Information perception method and information security system based on big data and artificial intelligence
  • Information perception method and information security system based on big data and artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present disclosure will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments.

[0019] figure 1 It is an interactive schematic diagram of an information perception system 10 based on big data and artificial intelligence provided by an embodiment of the present disclosure. The information perception system 10 based on big data and artificial intelligence may include an information security system 100 and a digital service platform 200 communicatively connected with the information security system 100 . figure 1 The shown information perception system 10 based on big data and artificial intelligence is only a feasible example, and in other feasible embodiments, the information perception system 10 based on big data and artificial intelligence may also only include figure 1 At least some of the components shown may also ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an information perception method and an information security system based on big data and artificial intelligence, and the method comprises the steps: obtaining current threat attack information of a target situation awareness operation object in a target security situation awareness channel and the current threat attack information of other situation awareness operation objects in the target security situation awareness channel; determining attack information relation parameters between the current threat attack information of the target situation awareness operation object and current threat attack information of other situation awareness operation objects, and determining a security situation awareness relation graph according to the attack information relation parameters; carrying out security situation awareness control on the target situation awareness operation object according to the security situation awareness relation graph, so that the security situation awareness process is more matched with deep association information of actual threat attack information; therefore, the situation awareness information amount associated with the intelligence obtained by performing security situation awareness control on the target situation awareness operation object can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of information security, in particular, to an information perception method and an information security system based on big data and artificial intelligence. Background technique [0002] As the scale and complexity of Internet information continue to increase, Internet information attack technologies continue to innovate, and new attack tools emerge in large numbers, traditional Internet information security technologies appear powerless, information security attacks are inevitable, and information security problems are becoming more and more serious. Therefore, it is necessary to Conduct information security situational awareness. [0003] Information security situation refers to the current state and changing trend of the entire information composed of various information Internet service operating conditions, information behaviors, and user behaviors. Information security situational awareness ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F16/36
CPCG06F21/552G06F16/367
Inventor 尹晓兵古丽波莫正兵黄昌源
Owner 铭台(北京)科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More