Unlock instant, AI-driven research and patent intelligence for your innovation.

A threat analysis method and system based on application software big data

A technology for application software and threat analysis, applied in the direction of platform integrity maintenance, etc., can solve the problems of low accuracy and reliability of vulnerability update

Active Publication Date: 2022-07-19
宁夏网信创安信息技术服务有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to improve this problem and avoid the security of user information, the common method is to update the application software for vulnerabilities. However, this method still has certain implementation defects. One of the implementation defects is the accuracy and reliability of vulnerability updates. low, and the inventor found after in-depth research that the cause of the above-mentioned defects appeared in the loophole detection link

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threat analysis method and system based on application software big data
  • A threat analysis method and system based on application software big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Hereinafter, the terms "first", "second" and "third" etc. are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first", "second" or "third" etc. may expressly or implicitly include one or more of that feature.

[0037] figure 1 A schematic flowchart of a threat analysis method based on application software big data provided by an embodiment of the present invention is shown. The threat analysis method based on application software big data can be implemented by a threat analysis service system, and the threat analysis service system can include a memory and a processor. ; the memory is coupled to the processor; the memory is used to store computer program code, the computer program code comprising computer instructions; wherein, when the processor executes the computer instructions, the threat analysis service is enabled The sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a threat analysis method and system based on application software big data. Based on the differential description analysis, the connection between the descriptions of each abnormal interaction event is obtained, and the local focus attention of the abnormal operation event description is obtained based on the differential description analysis and records. The index is used to ensure the degree of attention between different abnormal operation event descriptions, so that the more significant operational threat information in the abnormal operation event description can be quickly and accurately identified. Then, the intrusion attack preference based on the optimized abnormal operation event description mining is described Vulnerability security threat detection avoids the waste of resources and precision destruction caused by the connection between interactive operational threats with less attention (such as some non-critical operational threats or operational threats that do not cause significant data and information loss). To a certain extent, the accuracy and credibility of vulnerability security threat detection are guaranteed.

Description

technical field [0001] The invention relates to the technical field of big data and software analysis, in particular to a threat analysis method and system based on application software big data. Background technique [0002] Application software refers to various programming languages ​​that users can use, as well as a collection of application programs compiled in various programming languages. Application software is part of the software provided to meet the application requirements of users in different fields and different problems. Application programs can broaden the application field of computer systems and amplify the functions of hardware. [0003] With the continuous development of information technology, application software faces more and more challenges, such as some vulnerability threats that may threaten user information security. In order to improve this problem and avoid the security of user information, the commonly used method is to update the applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/57
Inventor 庞涛
Owner 宁夏网信创安信息技术服务有限公司