Threat intelligence processing method and device, computing equipment and storage medium

A processing method and intelligence technology, applied in the field of network security, can solve problems such as the inability to effectively utilize threat intelligence source data, and achieve the effect of effective utilization and improved identification

Pending Publication Date: 2021-09-21
北京信安天途科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the problem that only a small amount of threat intelligence can be identified in related technologies, and the effective use of threat intelligence source data cannot be realized, embodiments of the present inve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence processing method and device, computing equipment and storage medium
  • Threat intelligence processing method and device, computing equipment and storage medium
  • Threat intelligence processing method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work are protected by the present invention. scope.

[0043] A large amount of threat intelligence source data comes from the alarm or situation review analysis of the user's security attack, or the analysis report made by a well-known security vendor or security technical team. These large amounts of scattered information need to be comprehensively correlated. In order to better form threat intell...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a threat intelligence processing method and device, computing equipment and a storage medium. The method comprises the steps of obtaining unstructured data in threat intelligence source data; performing word segmentation processing on the unstructured data to obtain a plurality of pieces of intelligence knowledge; performing semantic understanding on each piece of intelligence knowledge by using a natural language processing technology to obtain a semantic expression of each piece of intelligence knowledge; and associating each piece of intelligence knowledge with a known threat intelligence type according to the semantic expression of each piece of intelligence knowledge and the known threat intelligence type. According to the scheme, the recognition quantity of the threat intelligence can be improved, and then effective utilization of the threat intelligence source data is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, and in particular, to a threat intelligence processing method, device, computing device, and storage medium. Background technique [0002] With the continuous progress and development of information technology, the security of large-scale cyberspace increasingly depends on the extraction, understanding, construction and sharing of threat intelligence. Threat intelligence can be expressed against specific attack vectors used by attackers in a specific industry or geographic area to inform decision-making in threat response. [0003] Threat intelligence source data includes unstructured data, semi-structured data, and structured data. For unstructured data, such as emails, web pages, and text, it needs to be converted into natural language for analysis. In the related art, when extracting threat intelligence from unstructured data, a neural network model is generally...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/33G06F40/289G06F40/30
CPCG06F16/3344G06F40/289G06F40/30
Inventor 王晓波徐菲郑然德谢兰天
Owner 北京信安天途科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products