Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat intelligence named entity recognition method based on machine reading understanding

A named entity recognition and reading comprehension technology, applied in the field of threat intelligence named entity recognition based on machine reading comprehension, can solve the problems of less research, inability to represent ambiguity, and fuzzy classification of threat intelligence entities, so as to reduce requirements and improve The effect of recognition accuracy

Pending Publication Date: 2022-07-15
ZHEJIANG UNIV OF TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the one hand, the common problems of these traditional methods are that they cannot represent the ambiguity of words, and it is difficult to identify multi-layer nested entities, but there are a large number of such situations in threat intelligence and the classification of threat intelligence entities is relatively vague, which is also a threat A major difficulty in intelligence analysis
On the other hand, the current field-oriented NER research is relatively concentrated in scientific fields such as medicine and biology, and there is still little research in the field of threat intelligence for network security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat intelligence named entity recognition method based on machine reading understanding
  • Threat intelligence named entity recognition method based on machine reading understanding
  • Threat intelligence named entity recognition method based on machine reading understanding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0037] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0038] In order to overcome the difficulties in threat intelli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a threat intelligence named entity recognition method based on machine reading understanding, which comprises the following steps: performing sentence segmentation processing on threat intelligence, filtering sentences which do not contain network security professional vocabularies based on a network security professional lexicon, and obtaining a sentence set after filtering; sentences in the sentence set are taken one by one, and each entity in the sentences is marked with a question and answer pair; training a recognition model by using the labeled sentence set; and performing named entity recognition on the threat intelligence by using the trained recognition model. The threatening intelligence named entity recognition based on machine reading understanding can effectively solve the problems of fuzzy classification of threatening intelligence entities and entity nesting; the built problem is provided with entity hidden information, so that the recognition accuracy can be effectively improved; according to the method, entity recognition is converted into a classification matching problem from a sequence labeling problem, so that one sentence with a plurality of entities can generate a plurality of training samples, and the requirement on the number of sentences is reduced.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a threat intelligence named entity identification method based on machine reading comprehension. Background technique [0002] With the rapid development of network information technology, the security situation of cyberspace is becoming increasingly severe. To protect network security, we must not only outperform the attacker in technology, but also be ahead of the attacker in consciousness, pay enough attention to the "unknown unknown", and plan ahead. Opportunity to take. Therefore, the effective analysis of threat intelligence has important practical significance and scientific research value for the defense of organized, premeditated and various security threats. [0003] Threat intelligence analysis must be based on knowledge extraction and identify the corresponding entities and relationships. Currently named entity recognition NER mainly includes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F40/295G06F40/211G06K9/62G06N3/04
CPCG06F40/295G06F40/211G06N3/048G06F18/241
Inventor 吕明琪张炜钰朱添田陈铁明
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products