Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security situation analysis method

A technology of information security and analysis method, which is applied in the field of information security situation analysis, can solve the problems such as the reduction of information security prevention rate and the decrease of the effect of information security situation analysis of information data, and achieve the effect of increasing the information security prevention rate and improving the effect

Inactive Publication Date: 2022-05-13
北京国信网联科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problems that the current information security situation analysis technology still has the problem that the information data has changed when the situation analysis results are formed, which leads to the reduction of the information security situation analysis effect and the reduction of the information security prevention rate. Information Security Situation Analysis Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security situation analysis method
  • Information security situation analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] refer to figure 1 , an information security situation analysis method, comprising the following steps:

[0027] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability database, and malicious code database. The information acquisition is divided into two parts: active acquisition and passive acquisition. Passive acquisition is the acquisition of IP address segments, domain name information, email addresses, document image data, addresses, organizational structure, technical architecture used by the target system, and public business information. Active acquisition is performed by professionals using equipment sharing connections to obtain information sharing qualifications After obtaining the qualification, professionals will search and store the required security information one-to-one;

[0028] S2: Feature extraction: After obtaining the information, ...

Embodiment 2

[0034] refer to figure 1 , an information security situation analysis method, comprising the following steps:

[0035] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability databases, and malicious code databases;

[0036] S2: Feature extraction: After obtaining the information, professionals will store all the information in the same storage location of the computer, and the computer will first classify all the information data, and after the classification is completed, the same type of data will be screened by the computer to remove duplication data, and send all the remaining data production files to the desktop, and the professionals receive the files from the desktop, and perform secondary screening on the files according to the classification, and extract the abnormal data in the classification, after the abnormal data is extracted, the abnormal data i...

Embodiment 3

[0042] refer to figure 1 , an information security situation analysis method, comprising the following steps:

[0043] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability database, and malicious code database. The information acquisition is divided into two parts: active acquisition and passive acquisition. Passive acquisition is the acquisition of IP address segments, domain name information, email addresses, document image data, addresses, organizational structure, technical architecture used by the target system, and public business information. Active acquisition is performed by professionals using equipment sharing connections to obtain information sharing qualifications After obtaining the qualification, professionals will search and store the required security information one-to-one;

[0044] S2: Feature extraction: After obtaining the information, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security situation analysis, in particular to an information security situation analysis method, and aims to solve the problem that the information security situation analysis effect is reduced due to the fact that information data is changed when a situation analysis result is formed in the existing information security situation analysis technology. In order to solve the problem that the information security prevention rate is reduced in the prior art, the invention provides the following scheme that the method comprises the following steps of S1, information acquisition, S2, feature extraction, S3, situation assessment, S4, judgment, S5, deep learning and S6, real-time updating. The situation analysis effect is improved, the information security prevention rate is increased, and the accuracy of situation analysis is improved by establishing a learning model for deep learning.

Description

technical field [0001] The invention relates to the technical field of information security situation analysis, in particular to an information security situation analysis method. Background technique [0002] Situation analysis is an environment-based, dynamic, and holistic ability to understand security risks. It is based on security big data and a way to improve the ability to discover, identify, understand, analyze, and respond to security threats from a global perspective. Ultimately, It is for decision-making and action, and for the implementation of security capabilities. With the advancement of science and technology and the development of society, the concept and connotation of information security are constantly evolving. At present, information security is in the acceleration period of the era of cyberspace security. The difference from the era of information security is that the network boundary is gradually blurring or disappearing. Traditional boundary securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62G06N3/04G06F16/2455
CPCG06F21/577G06F16/2455G06N3/045G06F18/241G06F18/25
Inventor 詹越王龙华苗棋江
Owner 北京国信网联科技有限公司