Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network information security monitoring and early warning method

A technology for network information and security monitoring, which can be used in network data retrieval, security communication devices, network data indexing, etc., and can solve problems such as waste of police resources.

Active Publication Date: 2022-07-01
CHINA CRIMINAL POLICE UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current dark web analysis and research content, most of the sensitive events in the dark web are discovered based on classification, sensitive words, etc., or the academic research on the dark web is carried out, without considering that the dark web is anonymous and everyone can publish , deliberate camouflage and other characteristics lead to the important feature of a large number of false information in the dark network, and there are many sensitive events in the dark network, if the authenticity of the news is not evaluated and the importance is analyzed, it will lead to a large number of police resources. Wasted on detection of disinformation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network information security monitoring and early warning method
  • Network information security monitoring and early warning method
  • Network information security monitoring and early warning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purposes, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Thus, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments of the present application, every other em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network information security monitoring and early warning method. The method comprises the following steps: acquiring network information of a to-be-monitored category in a target site; based on a RoFormer-Sim model, generating a text vector from the text data after integration processing, wherein the text vector comprises semantic content of the text data; according to the text vector, carrying out clustering analysis on commodity information which is the same as and / or similar to the semantic content in the dark online shopping mall to obtain a clustering center of the network information of the to-be-monitored category; performing similarity calculation based on the text data of the clustering center in the dark web forum to obtain a text similarity value; and according to the clustering center and the text similarity value, completing scoring of the security status of the network information of the to-be-monitored category. According to the method, the security condition of the related data of the dark web is evaluated, the final evaluation result is displayed in a scoring manner, the trueness and importance of the security condition of the related data of the dark web are in direct proportion to the score obtained by evaluation, the evaluation is more comprehensive, and real-time evaluation and early warning are performed.

Description

technical field [0001] The present application relates to the technical fields of information security, network monitoring and electronic data forensics, and in particular, to a network information security monitoring and early warning method. Background technique [0002] Dark web sites are a general term for a type of web sites active in the dark web space. Such web sites cannot be directly searched and accessed through conventional browsers, and access channels need to be configured with specific software and services. Due to its layer-by-layer encryption and untraceable characteristics, although the dark web has powerful performance in protecting users' privacy, the hidden service websites developed by it are very easy to breed all kinds of crimes that use the network as a link tool. Under the premise of strong anonymity of dark web sites, how to effectively analyze dark web content and obtain investigative clues has become the key to dark web research. Many scholars at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F40/194G06F40/289G06F40/30G06F16/951G06F16/35G06K9/62G06Q40/04H04L9/40
CPCG06F40/194G06F40/30G06F16/35G06F40/289G06Q40/04G06F16/951H04L63/20G06F18/23213
Inventor 汤艳君刘丛睿王子祎明泰龙
Owner CHINA CRIMINAL POLICE UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products