Unlock instant, AI-driven research and patent intelligence for your innovation.

Security portrait processing method based on network security big data and network security system

A network security and processing method technology, applied in the direction of electronic digital data processing, digital data protection, computer security devices, etc., can solve the problems of limited accuracy and generation efficiency of security portraits, reduce configuration learning costs, improve accuracy and generation efficiency , Improve the effect of reference value

Inactive Publication Date: 2021-10-01
丁祥云
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the solutions of related technologies, the accuracy and generation efficiency of security portraits are very limited in the way of separate analysis and sorting by users based on data analysis tools.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security portrait processing method based on network security big data and network security system
  • Security portrait processing method based on network security big data and network security system
  • Security portrait processing method based on network security big data and network security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The solutions of the embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.

[0036] In the following description, for the purpose of illustration rather than limitation, specific details such as specific system structures, interfaces, and technologies are presented for a thorough understanding of the specific embodiments of the present disclosure.

[0037] In the field of network security analysis, security portraits are an orderly sequence of portraits that describe security service users' overall understanding of a certain network security protection cloud service, which can help security service users quickly understand a network security protection cloud service, reducing the amount of initial understanding. The time cost of network security behavior events. Current techniques for generating security portraits often rely on manual extraction of security portraits, which is time-consuming and inefficien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security portrait processing method based on network security big data and a network security system. Based on the behavior transition probability between each network security behavior event and a network security protection cloud service as well as and the security behavior description component of each network security behavior event, a group of network security behavior events are ordered, and then a group of ordered security portraits for the network security protection cloud service are automatically generated based on an ordered network security behavior event set. Therefore, a more reasonable and accurate network security portrait list can be automatically generated, the configuration learning cost of the network security protection cloud service can be reduced, the time cost for preliminarily knowing a large number of network security behavior events is reduced, and the security portrait precision and generation efficiency are effectively improved; in addition, the existence order of the generated security portraits can further improve the reference value of the final security portraits.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and for example, relates to a security portrait processing method based on network security big data and a network security system. Background technique [0002] With the rapid economic development, science and technology are also constantly improving. The network has become an indispensable and important part of the current social production and life, bringing great convenience to users. At the same time, the network system is also suffering from certain security threats, which has brought adverse effects on people's normal use of the network system. Especially in the era of big data, a large amount of important information is stored in the network system. Once a security problem occurs in the network system, it will cause great losses. [0003] Based on this, in related technologies, for some key network security protection cloud services, users need to analyze the network se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/62G06K9/62
CPCG06F21/577G06F21/6218G06F18/23213G06F18/2415
Inventor 丁祥云
Owner 丁祥云