Security portrait processing method based on network security big data and network security system
A network security and processing method technology, applied in the direction of electronic digital data processing, digital data protection, computer security devices, etc., can solve the problems of limited accuracy and generation efficiency of security portraits, reduce configuration learning costs, improve accuracy and generation efficiency , Improve the effect of reference value
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The solutions of the embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.
[0036] In the following description, for the purpose of illustration rather than limitation, specific details such as specific system structures, interfaces, and technologies are presented for a thorough understanding of the specific embodiments of the present disclosure.
[0037] In the field of network security analysis, security portraits are an orderly sequence of portraits that describe security service users' overall understanding of a certain network security protection cloud service, which can help security service users quickly understand a network security protection cloud service, reducing the amount of initial understanding. The time cost of network security behavior events. Current techniques for generating security portraits often rely on manual extraction of security portraits, which is time-consuming and inefficien...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


