Unlock instant, AI-driven research and patent intelligence for your innovation.

Network intelligence analysis method and device

An analytical method, a technique of intelligence, applied in the field of network security

Active Publication Date: 2022-08-02
WEBRAY TECH BEIJING CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a network intelligence analysis method and device, which are used to solve the defect that only known loopholes and threats can be analyzed in the prior art, and realize the effect of intelligence analysis on unknown potential risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intelligence analysis method and device
  • Network intelligence analysis method and device
  • Network intelligence analysis method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0045] Combine below Figure 1-Figure 5 Describe the network intelligence analysis method and device of the present invention.

[0046] The network intelligence analysis method of the embodiment of the present invention can be applied to a satellite network system, by processing the captured target message to realize the analysis of the unknown risk of the high imitation protocol interaction, and then to respond t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for analyzing network intelligence. The method includes: determining a target IP address corresponding to a target message, and determining target Payload information corresponding to the target message; querying an intelligence feature database for the target IP address and Target payload information; when at least one of the target IP address and the target payload information is queried, determine the target risk level of the target message based on the risk level corresponding to the target IP address and / or the risk level corresponding to the target payload information. The network intelligence analysis method of the present invention, by matching the IP address of the target message and the target payload information with the IP address of the known message and the payload information of the known message in the intelligence feature database respectively, can analyze the process of protocol interaction. Risk analysis can be performed on packets with unknown risks, and potential unknown risks can be discovered in time.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for analyzing network intelligence. Background technique [0002] With the development of network technology, the security of terrestrial network systems and satellite network systems is becoming more and more important. In related technologies, the CVE (Common Vulnerabilities & Exposures) vulnerabilities disclosed on the Internet, public network asset information and IP (Internet Protocol, Internet Protocol) reputation information are crawled in the form of crawlers, and then the public network on the Internet is obtained. Security Intelligence. [0003] In the related technology, targeted protection of network systems is performed by obtaining information about potential threats that have been disclosed on the Internet and information about captured danger sources, but it is impossible to conduct intelligence analysis for unknown risks. SUMMARY O...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408
Inventor 王照旗权晓文王晶王明鑫王忠新
Owner WEBRAY TECH BEIJING CO LTD