Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security traceability semantic recognition method based on prompt self-supervised learning

A network security and semantic recognition technology, applied in neural learning methods, semantic analysis, secure communication devices, etc., can solve the problems of insufficient data set resources, high cost of supervision data, redundant memory information, etc., to achieve low cost, low cost. The effect of cost intelligent processing and low semantic extraction

Active Publication Date: 2022-03-29
南京众智维信息科技有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The semantic recognition task of network security traceability under supervised learning requires a large amount of data to capture attack sources for information traceability, but the data set resources in the professional field of network security are not abundant, and the cost of manually annotated supervised data is too high;
[0006] (2) The same attention should be paid to the feature extraction of text sequences input by different roles in the war room, such as combat staff, general commander, and disposal personnel. In other words, the cyclic neural network model architecture remembers all the information in the war room text , which causes the key information in a sentence to depend on the physical position of the word in the sentence, not on the meaning of the word itself, which will lead to redundant memory information;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security traceability semantic recognition method based on prompt self-supervised learning
  • Network security traceability semantic recognition method based on prompt self-supervised learning
  • Network security traceability semantic recognition method based on prompt self-supervised learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Such as Figure 1 to Figure 3 As shown, this embodiment provides a method for semantic recognition of network security traceability based on prompt self-supervised learning.

[0034] This method uses the transformer model as the basic structure of the masked language model, and can carry out network security traceability semantic recognition on the text according to external information and contextual content, and can learn the hints of the masked language model for network security professional vocabulary that is not rich in data set resources. To fully mine the information of existing data, so as to achieve high-efficiency and low-cost network security traceability semantic recognition, so that machines can understand the intentions of real people.

[0035] First, given a chat record of a network security war room, the process of semantic traceability identification of this chat record is as follows:

[0036] Use all relevant text information in the professional fiel...

Embodiment 2

[0075] Such as Figure 1 to Figure 3 The entire process framework shown needs to be trained in advance, and the training phase is predicted in the same way as the testing phase, and the details are as follows:

[0076] Use the public dialogue dataset for pre-training: the pre-training task uses a mask language model based on prompt learning. When inputting text, a part of the sentence in the text is randomly covered. We set the ratio to 15%, of which the probability is 80%. Replace it with masked marks, 10% with other existing words, and 10% unchanged, and then let the deep model restore the masked replacement, and calculate the loss value between the predicted and real words.

[0077] After the pre-training is completed, the network model is fine-tuned 12,000 times with the open source dataset CMCSE (Comprehensive, Multi-Source Cyber-Security Events).

[0078] We initialize the network model with the parameters of the Chinese pre-trained Bert-base-cased released by Google, u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security traceability semantic recognition method based on prompt self-supervised learning. The method comprises the following steps: constructing a network security professional corpus; multidimensional enrichment is realized, and a data set for capturing an attack source in a dialogue is reconstructed; the transformer coding part identifies semantic features and carries out vectorization representation; decoding and selecting key semantics by using a transformer; training cross entropy loss with a real label, and training model parameters; iterating the optimization model for multiple times to output a corresponding label, and identifying a corresponding IP or domain name; according to the method, a transformer model is used as a basic structure of a mask language model, semantic recognition can be carried out on texts according to external information and context content, prompt learning of the mask language model can be carried out for network security specialized vocabularies with non-rich data set resources to fully mine information of existing data, and therefore high efficiency and high efficiency are achieved. And low-cost semantic extraction enables a machine to understand the intention of a real person.

Description

technical field [0001] The invention relates to the field of network security natural language processing, in particular to a method for identifying network security traceability semantics based on prompt self-supervised learning. Background technique [0002] With the development of the era of information and data, people's awareness of network security has gradually increased. The security confrontation driven by data and intelligence, and the level of automation and intelligence of technology platforms have increasingly become the focus of the struggle between offense and defense in cyberspace. Semantic recognition of network security traceability is one of the main tasks of intelligent security operations. The key technology of semantic recognition of network security traceability is to extract the core information blocks from the document consisting of chat records in the war room into summarized summaries. Semantic identification of security event traceability can be b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F40/30G06F16/35G06N3/04G06N3/08H04L9/40
CPCG06F40/30G06F16/353G06N3/084G06N3/088H04L63/1408H04L63/1425H04L63/1483G06F2216/03H04L2463/146G06N3/047G06N3/048G06N3/045
Inventor 胡牧孙捷车洵梁小川
Owner 南京众智维信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More