Network security named entity and relation joint extraction method and device based on transfer learning
A network security and named entity technology, applied in the field of network security, can solve problems such as error transmission, difficult association analysis, extraction, etc., to achieve the effects of reducing troubles, enhancing portability, and reducing dependence on expert experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] First, use the network security named entity and relationship joint labeling scheme to label the network security named entity and relationship in the network security threat intelligence. The labeling process can be completed by manual labeling and rule labeling; then use the natural language corpus to pre-train the deep neural network The structure represents the vector by extracting lexical features; finally, the deep neural network structure is optimized by using the network security named entity and relationship labeling dataset, and the conditional random field classification and labeling algorithm is trained to form a joint model of deep neural network and conditional random field to extract network security names. Entities and relationships, and then use network security named entities and relationships to build network security threat knowledge graphs;
[0037] refer to figure 1 , the detailed process is given below.
[0038] 1. Use the network security named ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

