Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security event structure hierarchical processing method and device

A technology of network security and event structure, which is applied in the field of hierarchical processing of network security event structure, can solve problems such as event connection cannot be processed, and achieve the effects of simple consistency adjustment process, improved accuracy, and improved acquisition efficiency

Active Publication Date: 2022-03-04
GUANGXI UNIV FOR NATITIES
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above problems, the object of the present invention is to propose a method and device for hierarchical processing of network security event structure, the method and device for hierarchical processing of network security event structure through Hierarchical processing combined with variable refinement method, using polynomial algebra and differential algebra to improve the accuracy of calculation, and using fuzzy analytic hierarchy process to make the consistency adjustment process more concise and weight calculation simpler, which solves the complexity of traditional weight calculation The problem is that by extracting event data from the data managed by the security event management model of the host time window, the efficiency of event data acquisition is greatly improved, and event data acquisition is faster, and based on the Tri-Training event relationship classification method for detailed processing The final event structure is processed, which effectively solves the problem that the connection between events after hierarchical processing cannot be handled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security event structure hierarchical processing method and device
  • Network security event structure hierarchical processing method and device
  • Network security event structure hierarchical processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] according to figure 1 , 2 As shown, this embodiment provides a network security event structure hierarchical processing method, including the following steps:

[0033] Step 1, based on the security event management model of the host time window, extract the data information of the network security event, and establish a tree index system as the node resource information of the network security event as the data source;

[0034] Where the safety event management model of the host window, the data of the security event is collected from the network, and stored, preprocessing, and related operations, and then stores the data stored by the network security event stored from the security event management model of the host time window. Extract the corresponding data information;

[0035] Step II. Establish a network security event assessment model according to the characteristics of the tree index system and the network system structure and evaluate the network security event fro...

Embodiment 2

[0052] according to image 3 , 4 As shown, this embodiment provides a network security event structure hierarchical processing method, including the following steps:

[0053] Step 1, based on the security event management model of the host time window, extract the data information of the network security event, and establish a tree index system as the node resource information of the network security event as the data source;

[0054] Where the safety event management model of the host window, the data of the security event is collected from the network, and stored, preprocessing, and related operations, and then stores the data stored by the network security event stored from the security event management model of the host time window. Extract the corresponding data information;

[0055] Step II. Establish a network security event assessment model according to the characteristics of the tree index system and the network system structure and evaluate the network security event from...

Embodiment 3

[0071] according to Figure 5 , 6 As shown, this embodiment provides a network security event structure hierarchical processing method, including the following steps:

[0072] Step 1, based on the security event management model of the host time window, extract the data information of the network security event, and establish a tree index system as the node resource information of the network security event as the data source;

[0073] Where the safety event management model of the host window, the data of the security event is collected from the network, and stored, preprocessing, and related operations, and then stores the data stored by the network security event stored from the security event management model of the host time window. Extract the corresponding data information;

[0074] Step II. Establish a network security event assessment model according to the characteristics of the tree index system and the network system structure and evaluate the network security event fro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hierarchical processing method and device for a network security event structure. The device comprises a data acquisition module, a data division module, a data processing module and a post-processing module, according to the method, hierarchical processing is combined with a variable element refinement method, the calculation accuracy is improved through polynomial algebra and differential algebra, meanwhile, the consistency adjustment process is more concise through the fuzzy analytic hierarchy process, weight calculation is simpler, the problem of complexity of traditional weight calculation is solved, and the method is suitable for large-scale popularization and application. By extracting the event data from the data managed by the security event management model of the host time window, the event data acquisition efficiency is greatly improved, the event data acquisition is quicker, and the refined event structure is processed based on the Tri-Training event relationship classification method, so that the processing efficiency is improved. The problem that events cannot be processed due to contact after hierarchical processing is effectively solved.

Description

Technical field [0001] The present invention relates to the field of network security event processing, and more particularly to a network security event structure hierarchical treatment method and apparatus. Background technique [0002] In computer science and control theory, control engineering, the composition and structure of concurrent systems is increasingly complex, and the scale is increasing, and efficiently modeling and verifying such systems become more difficult. The formal method has been developed for decades of research and development, providing a good frame support for concurrent system modeling, corresponding technology and theory have been applied to various aspects of computer science and control engineering; [0003] In the increasingly complex concurrency system design and verification, more concurrent uncertainty brought more concurrently due to many small events in the sub-event structure that is refinered through the refinement. Sexual, making the proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/901G06F16/906G06F16/9035G06N7/02
CPCG06F16/9027G06F16/906G06F16/9035G06N7/02
Inventor 汤卫东李华旭李盛楠刘勇
Owner GUANGXI UNIV FOR NATITIES