Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting information data and computer readable storage medium

A technology of intelligence data and intelligence, applied in the field of information security, can solve problems such as missing the validity period of intelligence, and achieve the effect of improving accuracy and detection efficiency

Active Publication Date: 2021-10-12
CHINA TELECOM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, an enterprise server has been attacked by a large number of CC (Challenge Collapsar, challenge black hole). After retrieving the server logs and successfully tracing the source to the attacker's IP address, the enterprise found that no loss was suffered, so no measures were taken
Wait until the company discovers that the confidential information has been stolen before processing it. It is found that the traced IP address is invalid, and the validity period of the information has been missed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting information data and computer readable storage medium
  • Method and device for detecting information data and computer readable storage medium
  • Method and device for detecting information data and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0027] combine first figure 1 Some embodiments of the disclosed method of detecting intelligence data are described.

[0028] figure 1 A schematic flowchart of a method for detecting intelligence data according to some embodiments of the present disclosure is shown....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for detecting information data and a computer readable storage medium, and relates to the field of information security. The method for detecting the information data comprises the steps of obtaining target information data of a server subjected to a network attack from a server log; determining the existing duration of the target information data; extracting attack type features, information area features and information association features from the target information data; and inputting the existing duration, the attack type features, the information area features and the information association features into a pre-trained machine learning model to obtain a detection result, wherein the detection result indicates whether the target information data are invalid or not. Various features are extracted from the information data, whether the information data are invalid or not is detected through the machine learning model, and the accuracy of detecting whether the information data are invalid or not and the detection efficiency are improved.

Description

technical field [0001] The present disclosure relates to the field of information security, in particular to a method, device and computer-readable storage medium for detecting intelligence data. Background technique [0002] With the rapid increase of network information, the importance of information security issues is also increasing. [0003] When the server is under security threats such as network attacks, intelligence data will be obtained. Based on the analysis of intelligence data, existing information security problems can be discovered to a certain extent. [0004] However, intelligence data is a collection of information, and all information is time-sensitive. The effective time of intelligence data is usually short, and attackers may constantly replace some attack signature information in order to hide their tracks. For example, an enterprise server has been attacked by a large number of CCs (Challenge Collapsar, challenge black hole). After retrieving the ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N20/00
CPCH04L63/1425H04L63/302G06N20/00
Inventor 李天博牛剑锋李作潮马娜
Owner CHINA TELECOM CORP LTD