Unlock instant, AI-driven research and patent intelligence for your innovation.

Information generation method for security interception big data analysis, and artificial intelligence system

A technology of information generation and artificial intelligence, applied in the field of information security analysis, can solve problems such as loss, and achieve the effect of improving reliability and pertinence

Inactive Publication Date: 2021-11-30
山东锐金数据服务有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Nevertheless, many current security incidents still occur frequently. Once important or sensitive data is lost, the loss and impact must be very serious.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information generation method for security interception big data analysis, and artificial intelligence system
  • Information generation method for security interception big data analysis, and artificial intelligence system
  • Information generation method for security interception big data analysis, and artificial intelligence system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 It is an interactive schematic diagram of an information generation system 10 for security interception big data analysis provided by an embodiment of the present application. The information generation system 10 for big data analysis of security interception may include an artificial intelligence system 100 and a security interception service system 200 communicatively connected with the artificial intelligence system 100 . figure 1 The shown information generating system 10 for analyzing big data for security interception is only a feasible example, and in other feasible embodiments, the system 10 for generating information for analyzing big data for security interception may also only include figure 1 At least some of the components shown may also include other components.

[0021] In some independently conceived design ideas, the artificial intelligence system 100 and the security interception service system 200 in the information generation system 10 for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an information generation method for security interception big data analysis, and an artificial intelligence system. The method comprises the following steps: obtaining malicious resource field distribution which corresponds to security interception event data and is used for expressing malicious resource fields of the security interception event data according to a malicious resource decision model, and reading at least two security vulnerability field clusters, wherein the security vulnerability field clusters are used for expressing malicious resource fields of security vulnerability associated data under corresponding security vulnerabilities, and the security vulnerabilities of the security vulnerability associated data are obtained by mining based on a security event knowledge graph of the security vulnerability associated data; and finally, according to the malicious resource field distribution and each security vulnerability field cluster, obtaining a security vulnerability collection parameter between the security interception event data used for determining the security vulnerability probability graph of the security interception event data and the security vulnerability associated data corresponding to each security vulnerability. Therefore, the reliability and pertinence of security vulnerability analysis can be improved in the security vulnerability analysis process.

Description

technical field [0001] The present application relates to the technical field of information security analysis, and specifically relates to an information generation method and an artificial intelligence system for security interception big data analysis. Background technique [0002] With the rapid development of Internet information technology, there are more and more developments for cloud services. Cloud services can provide users with massive mobile Internet information services, such as smart medical services, e-commerce services, etc. However, in the process of providing these mobile Internet information services, a large amount of data information will be generated, how to effectively protect the security of these data information is a problem worth thinking about. At present, major Internet service providers usually configure related interception services to intercept suspicious attack sources. Nevertheless, many security incidents still occur frequently at present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/55G06F16/36
CPCG06F21/577G06F21/55G06F16/367
Inventor 何景隆林楠
Owner 山东锐金数据服务有限公司