Unlock instant, AI-driven research and patent intelligence for your innovation.

Network threat detection method and device

A threat detection and network technology, applied in the field of network security, can solve problems such as low detection efficiency, unstable detection results, and high professional requirements

Pending Publication Date: 2022-07-01
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the technical conception of the present disclosure, the inventors found that related technologies need to rely heavily on the time investment and experience accumulation of security analysts to detect network threats based on IOC data, which has high professional requirements, low detection efficiency, and poor detection results. unstable problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat detection method and device
  • Network threat detection method and device
  • Network threat detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for convenience of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It will be apparent, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0038] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. The terms "comprising", "comprising" and the like used herein indicate the presence of f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network threat detection method. The method comprises the following steps: acquiring threat index IOC data; performing feature extraction processing on the IOC data to obtain at least one threat index feature associated with the IOC data; a preset threat detection model is utilized to perform malicious rule matching operation based on the at least one threat index feature to obtain a malicious matching score, and the malicious matching score is determined according to the number of matched malicious rules and the type of the malicious rules; and under the condition that the malicious matching score is higher than a preset threshold value, determining that the IOC data is malicious IOC data. The invention further provides a network threat detection device, electronic equipment and a computer readable storage medium.

Description

technical field [0001] The present disclosure relates to the field of network security, and in particular, to a network threat detection method, a network threat detection device, an electronic device, a computer-readable storage medium, and a computer program product. Background technique [0002] With the diversified development of network attack methods and channels, network threats have shown rapid and vicious evolution, which puts forward higher requirements for network threat detection capabilities. IOC (Indicator of Compromise, threat intelligence) data is threat intelligence data that can describe threat event information. Based on IOC data, it is beneficial to realize network threat detection and external attack prevention. [0003] In the process of realizing the technical concept of the present disclosure, the inventor found that the related technology needs to rely heavily on the time investment and experience accumulation of security analysts to perform network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1441
Inventor 黄朝文陈劲路文超白敏李佳馨齐向东吴云坤
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC