Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security vulnerability mining method and system based on artificial intelligence

A network security and vulnerability mining technology, applied in the field of information security, can solve problems such as poor use effect, and achieve the effect of improving speed and effect

Pending Publication Date: 2022-05-27
STATE GRID HEBEI ELECTRIC POWER RES INST +1
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention proposes a network security loophole mining method and system based on artificial intelligence, which solves the problem of poor use effect of the network security loophole mining method in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security vulnerability mining method and system based on artificial intelligence
  • Network security vulnerability mining method and system based on artificial intelligence
  • Network security vulnerability mining method and system based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts are all related to the protection scope of the present invention.

[0052] like figure 1 As shown, the flow chart of the method for mining network security vulnerabilities in this embodiment includes:

[0053] Obtain multiple malicious file samples that have been successfully attacked;

[0054] Based on the deep learning method, a classification model is trained according to the attack behavior data of the malicious file samples, and the multiple malicious samples are classified;

[0055] According to the classification resul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and provides a network security vulnerability mining method and system based on artificial intelligence, and the network security vulnerability mining method comprises the steps: obtaining a plurality of successfully attacked malicious file samples; based on a deep learning method, a classification model is trained according to the attack behavior data of the malicious file samples, and the multiple malicious samples are classified; constructing a vulnerability database according to a classification result; calling a vulnerability database, and respectively sending vulnerability detection data packets to the plurality of monitoring terminals; and analyzing feedback data sent by the monitoring terminal to obtain a vulnerability detection result. Through the technical scheme, the problem of poor use effect of a network security vulnerability mining method in the prior art is solved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular, to a method and system for mining network security loopholes based on artificial intelligence. Background technique [0002] With the development of the Internet of Things and electronic technology, the power system has realized intelligent management, from the bottom monitoring terminal to management, and then to the overall operation and maintenance process management, using data mining, processing, computing and other means to efficiently carry out various tasks. Coordinate, schedule, and guide the efficient and safe maintenance of data center infrastructure. At the same time, since the development of monitoring terminals usually adopts open source frameworks, there will inevitably be program loopholes, resulting in security loopholes in the power monitoring network. [0003] In order to avoid malicious attacks, the usual method is to use a variety of vulnerability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F21/57
CPCH04L63/1433H04L63/1416G06F21/577G06F2221/034Y04S40/20
Inventor 郗波左晓军郭禹伶侯波涛常杰王颖
Owner STATE GRID HEBEI ELECTRIC POWER RES INST