Local information generation method and device, equipment and storage medium
A generation method and storage medium technology, applied in the field of network security, can solve problems such as negative impact on analysis capabilities, uncontrollable users, and difficulty in tracking and tracing analysis results, achieving high real-time performance, improved credibility, and easy traceability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] see figure 1 , figure 1 It is a schematic flowchart of a method for generating local intelligence disclosed in the embodiment of this application. Such as figure 1 As shown, the method of the embodiment of the present application includes the following steps:
[0053] 101. Obtain alarm logs based on several data sources;
[0054] 102. Collision the alarm log with the intelligence database, and obtain the first intelligence data related to the alarm log;
[0055] 103. Extract several indicator data based on the alarm log and the first intelligence data;
[0056] 104. Generate second intelligence data based on several indicator data and first intelligence data;
[0057] 105. Save the alarm log and the second intelligence data in a local storage space.
[0058]In the embodiment of the present application, since the first intelligence data is used in addition to the original alarm log data in the production process of the second intelligence data, the input source of ...
Embodiment 2
[0102] see figure 2 , figure 2 It is a schematic structural diagram of a local intelligence generation device disclosed in the embodiment of the present application. Such as figure 2 As shown, the device of the embodiment of the present application includes the following functional modules:
[0103] A data acquisition module 201, configured to acquire alarm logs based on several data sources;
[0104] A data collision module 202, configured to collide the alarm log with the intelligence database, and obtain first intelligence data related to the alarm log;
[0105] A data extraction module 203, configured to extract several indicator data based on the alarm log and the first intelligence data;
[0106] A data generation module 204, configured to generate second intelligence data based on several indicator data and the first intelligence data;
[0107] The data storage module 205 is configured to store the alarm log and the second intelligence data in a local storage sp...
Embodiment 3
[0112] see image 3 , image 3 It is a schematic structural diagram of a local intelligence generating device disclosed in the embodiment of this application. Such as image 3 , the equipment of the embodiment of the present application includes:
[0113] A memory 301 storing executable program codes;
[0114] a processor 302 coupled to the memory 301;
[0115] The processor 302 invokes the executable program code stored in the memory 301 to execute the method for generating local information in Embodiment 1 of the present application.
[0116] The device in the embodiment of the present application executes the local intelligence generation method. On the one hand, by colliding the alarm log with the intelligence database, more and more timely first intelligence data can be obtained, which is different from only using the alarm log to generate the second intelligence. Compared with data, it can generate a more accurate and real-time second intelligence database based on ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


