CN109598120A - Security postures intelligent analysis method, device and the storage medium of mobile terminal - Google Patents
Security postures intelligent analysis method, device and the storage medium of mobile terminal Download PDFInfo
- Publication number
- CN109598120A CN109598120A CN201811356911.2A CN201811356911A CN109598120A CN 109598120 A CN109598120 A CN 109598120A CN 201811356911 A CN201811356911 A CN 201811356911A CN 109598120 A CN109598120 A CN 109598120A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- security postures
- security
- data
- analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses security postures intelligent analysis method, device and the storage mediums of a kind of mobile terminal, are related to network technique field.The method comprise the steps that obtaining the marked security postures data of mobile terminal, the marked security postures data include mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;Extract the corresponding security postures feature of the marked security postures data;Based on the security postures feature, security postures analysis model is trained;The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.The present invention is able to ascend the network security defence capability of mobile terminal.
Description
Technical field
The present invention relates to the security postures intelligent analysis methods of network technique field more particularly to a kind of mobile terminal, dress
It sets and storage medium.
Background technique
With the continuous development of network technology, the use of mobile terminal is also increasingly popularized, and it is not retrievable general to become user
It is equipped all over using.The analysis of the network safety situation of mobile terminal and the acquisition of potential risk hidden danger also become urgently to be resolved
Problem.Currently, mobile terminal under different application scene there are different risk hidden danger, the type of security risk is more, and situation
It is complicated, it is difficult to which that comprehensive analysis in real time is carried out to the Network Situation of mobile terminal.
Summary of the invention
The embodiment of the present invention provides security postures intelligent analysis method, device and the storage medium of a kind of mobile terminal,
It is able to solve the problem of can not carrying out comprehensive analysis to the security postures that mobile terminal carries out.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of security postures intelligent analysis method of mobile terminal, comprising:
The marked security postures data of mobile terminal are obtained, the marked security postures data include that mobile terminal is different
Normal behavioral data, mobile terminal potential threat data or running of mobile terminal situation data;
Extract the corresponding security postures feature of the marked security postures data;
Based on the security postures feature, security postures analysis model is trained;
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
With reference to first aspect, in the first possible implementation of the first aspect, the peace obtained by training
Full Study on Trend model carries out security postures analysis to mobile terminal, comprising:
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal, obtains safe state
Potential analysis grade, the security postures analytical grade include: high-risk situation, middle danger situation, low danger situation or security postures.
With reference to first aspect, in the second possible implementation of the first aspect, the method also includes:
Based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information data.
The possible implementation of second with reference to first aspect, in the third possible implementation of first aspect
In, the method also includes:
To the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or warning information number
According to being visualized;
Wherein, the content of the visual presentation further includes following any one or any combination: capture in predetermined period
Mobile terminal safety total number of events, security incident quantity category statistics, security incident quantity by threat degree statistics, safety
Early warning notification sum, safe early warning are notified to category statistics, mobile terminal liveness ranking, mobile terminal press the use feelings in region
Condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
With reference to first aspect, in a fourth possible implementation of the first aspect, the peace obtained by training
Full Study on Trend model carries out security postures analysis to mobile terminal, comprising:
Obtain the mobile terminal data, the mobile terminal data includes that the user information of mobile terminal, movement are soft or hard
Part resource, system log, using log, alarm log and error log;
The mobile terminal data is inputted into the security postures analysis model that the training obtains, is obtained to described mobile whole
The security postures at end analyze result.
Second aspect, the embodiment of the present invention provide a kind of security postures intellectual analysis device of mobile terminal, comprising:
Module is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures data
Including mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module, for extracting the corresponding security postures feature of the marked security postures data;
Training module is trained security postures analysis model for being based on the security postures feature;
Analysis module, the security postures analysis model for being obtained by training carry out security postures point to mobile terminal
Analysis.
In conjunction with second aspect, in the first possible implementation of the second aspect,
The analysis module is also used to the security postures analysis model obtained by training, carries out safety to mobile terminal
Study on Trend, obtains security postures analytical grade, and the security postures analytical grade includes: high-risk situation, middle danger situation, low danger
Situation or security postures.
In conjunction with second aspect, in a second possible implementation of the second aspect, described device further include:
Pushing module, for based on the security postures analysis to mobile terminal as a result, push security threat data and/or pre-
Alert information data.
In conjunction with second of possible implementation of second aspect, in the third possible implementation of second aspect
In, described device further include:
Display module, for the mobile terminal security postures analysis as a result, and the security threat data and/
Or warning information data are visualized;Wherein, the content of the visual presentation further includes following any one or appoints
Meaning combination: mobile terminal safety total number of events, the security incident quantity category statistics, security incident number captured in predetermined period
Amount by threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness ranking,
Service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking of the mobile terminal by region.
In conjunction with second aspect, in the fourth possible implementation of the second aspect,
The analysis module, is also used to obtain the mobile terminal data, and the mobile terminal data includes mobile terminal
User information, mobile software and hardware resources, system log, using log, alarm log and error log;And by the movement
Terminal data inputs the security postures analysis model that the training obtains, and obtains the security postures analysis knot to the mobile terminal
Fruit.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence, which is characterized in that the step of method that first aspect provides is realized when described program is executed by processor.
Security postures intelligent analysis method, device and the storage medium of mobile terminal provided in an embodiment of the present invention, pass through
The marked security postures data of mobile terminal are obtained, the marked security postures data include mobile terminal abnormal behaviour number
According to, mobile terminal potential threat data or running of mobile terminal situation data;It is corresponding to extract the marked security postures data
Security postures feature;Based on the security postures feature, security postures analysis model is trained;It is obtained by training
Security postures analysis model carries out security postures analysis to mobile terminal.Mobile terminal can be analyzed to obtain under different scenes
Incidence relation between feature extracts the status assessment standard with differentiation for different application scene, realize it is complicated,
The security postures perception and security risk prediction of mobile terminal, disclose propagation of the security incident in terminal network under changeable scene
Rule;Meanwhile the real-time push of terminal data is realized by terminal data acquisition interface, it is mobile whole in active analysis different scenes
The safe condition situation of change at end realizes that multi-source, the effective interactive and global of multidimensional information are shown, provides whole day for mobile terminal
Time, multi-faceted network security monitoring and emergency response, promote the network security defence capability of mobile terminal.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the security postures intelligent analysis method of the mobile terminal of the embodiment of the present invention;
Fig. 2 is another flow diagram of the security postures intelligent analysis method of the mobile terminal of the embodiment of the present invention;
Fig. 3 is the security postures intellectual analysis apparatus structure schematic diagram of the mobile terminal of the embodiment of the present invention;
Fig. 4 is another structural schematic diagram of the security postures intellectual analysis device of the mobile terminal of the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the security postures intellectual analysis device 500 of the mobile terminal of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
One embodiment of the invention provides a kind of security postures intelligent analysis method of mobile terminal, as shown in Figure 1, the side
Method includes:
101, the marked security postures data of mobile terminal are obtained, the marked security postures data include mobile whole
Hold abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data.
102, the corresponding security postures feature of the marked security postures data is extracted.
103, it is based on the security postures feature, security postures analysis model is trained.
104, the security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
It is based on the self-characteristic and network characteristic of mobile terminal in more scenes, acquisition is related for the embodiment of the present invention
Information of terminal user, system log, using the mass datas such as log, terminal software and hardware resources, alarm and error log carry out
Operation situation, fragility, risk etc. of the method for depth analysis, research and utilization data mining and machine learning from mobile terminal
Different dimensions extract the secure data characteristic information of mobile terminal, and extracting for different application scene and networking rule has
The status assessment standard of differentiation is classified using secure data of the big data point technology to different characteristic, is clustered, in terminal
Correlation rule is formed between secure data, using technologies such as machine learning and association analysis, realize mobile terminal multiple risk because
The analysis of element is traced, is traced to the source, and discloses security incident in terminal in propagation law, and then analyze mobile terminal general safety
Situation and threat trend prediction, disclose propagation law of the security incident in terminal network, mention for the unified control of intelligent terminal
For round-the-clock, multi-faceted safety guarantee.
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature
Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene
The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through
Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes
Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal
Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
Further embodiment of this invention provides a kind of security postures intelligent analysis method of mobile terminal, as shown in Fig. 2, described
Method includes:
201, the marked security postures data of mobile terminal are obtained, the marked security postures data include mobile whole
Hold abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data.
202, the corresponding security postures feature of the marked security postures data is extracted.
203, it is based on the security postures feature, security postures analysis model is trained.
Wherein, security postures analysis model is the foundation using safety index as assessment, from multiple dimensions (such as fragile dimension
Degree, Risk Dimensions, threat dimension etc.) terminal security situation is described, by terminal security situation with quantitative evaluation result
Form is presented.In addition, in addition to security postures value to be generated reflect mobile terminal whether safety other than, it is also necessary to have corresponding assessment
Method, cooperation security postures value tell what kind of safety problem may occur for network administrator, provide can for reference, believable comment
Estimate probability, has prevent and protecting operation for target, and provide corresponding solution.
For in real time, efficiently and accurately perceive mobile terminal safety situation, utilize the local weighted support based on machine learning
Vector regression algorithm, to the user information of mobile terminal, mobile terminal self-information, system log, running log, alarm and mistake
Accidentally the secure datas such as log are associated analyzes with merger, and there are the security information of internal association for integration, forms self study safety
Situation feature database.
204, the security postures analysis model obtained by training carries out security postures analysis to mobile terminal, is pacified
Full Study on Trend grade.
Wherein, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger situation or security postures.
In embodiments of the present invention, high-risk rank represents mobile terminal safety situation and is in high state of necessity, it is proposed that takes phase immediately
Measure is answered to repair security risk existing for it;Middle danger rank represents mobile terminal safety situation and is in medium critical shape
State, it is proposed that corresponding measure is taken to repair its security risk;Low danger rank represents mobile terminal safety situation and is in low danger
Dangerous state;Safety representatives mobile terminal is currently in safe condition.
Optionally, step 204 can specifically include: obtain the mobile terminal data, the mobile terminal data includes
The user information of mobile terminal moves software and hardware resources, system log, using log, alarm log and error log;By institute
It states mobile terminal data and inputs the security postures analysis model that the training obtains, obtain the security postures to the mobile terminal
Analyze result.
For the embodiment of the present invention, security incident monitoring data interface is responsible for receiving the safety from terminal data Intelligent treatment
The terminal securities event-monitoring data such as event, alarm and error-logging information find all kinds of peaces of terminal using analysis result in time
Total event, and quick search and positioning can be carried out to all kinds of security incidents of terminal.
Received security incident monitoring data includes but is not limited to: Time To Event, event type, event title, thing
Part grade (basic, normal, high), affiliated unit, cell-phone number, IP address, Event origin, alarm time of origin, alarm/type of error,
Problem program alerts source (terminal manages the security protections class App such as app, 360 mobile guards, Tencent mobile phone manager), is interior in detail
Appearance and other error-logging informations etc..
205, based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information number
According to.
For the embodiment of the present invention, safety push is responsible for receiving the peace from terminal data Intelligent treatment with warning data interface
Full threat and warning information data carry out the front end push of control platform to potential security threat and early warning are shown.
Received safety push includes but is not limited to warning data: when phone number, IP address, affiliated unit, notification
Between, notification title, circulation scope, notification source, notification state (wait notify, notified, it is to be processed, processing in, be completed) etc..
206, to the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or early warning believe
Breath data are visualized.
Wherein, the content of the visual presentation further includes following any one or any combination: capture in predetermined period
Mobile terminal safety total number of events, security incident quantity category statistics, security incident quantity by threat degree statistics, safety
Early warning notification sum, safe early warning are notified to category statistics, mobile terminal liveness ranking, mobile terminal press the use feelings in region
Condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
For the embodiment of the present invention, statistical report form data-interface is responsible for receiving after terminal data Intelligent treatment mining analysis
Terminal security statistical data, and visualized in the form of daily paper, weekly, monthly magazine, annual report etc..
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature
Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene
The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through
Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes
Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal
Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
Further embodiment of this invention provides a kind of security postures intellectual analysis device of mobile terminal, as shown in figure 3, described
Device includes:
Module 31 is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures number
According to including mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module 32, for extracting the corresponding security postures feature of the marked security postures data;
Training module 33 is trained security postures analysis model for being based on the security postures feature;
Analysis module 34, the security postures analysis model for being obtained by training carry out security postures to mobile terminal
Analysis.
The analysis module 34 is also used to the security postures analysis model obtained by training, pacifies to mobile terminal
Full Study on Trend, obtains security postures analytical grade, and the security postures analytical grade includes: high-risk situation, middle danger situation, low
Situation of endangering or security postures.
Further, as shown in figure 4, described device further include:
Pushing module 41, for based on to mobile terminal security postures analysis as a result, push security threat data and/or
Warning information data.
Display module 42 is analyzed for the security postures to the mobile terminal as a result, and the security threat data
And/or warning information data are visualized;Wherein, the content of the visual presentation further include following any one or
Any combination: mobile terminal safety total number of events, the security incident quantity category statistics, security incident captured in predetermined period
Quantity is by threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness row
Name, mobile terminal are arranged by the service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal in region
Name.
The analysis module 34, is also used to obtain the mobile terminal data, and the mobile terminal data includes mobile whole
The user information at end moves software and hardware resources, system log, using log, alarm log and error log;And by the shifting
Dynamic terminal data inputs the security postures analysis model that the training obtains, and obtains the security postures analysis to the mobile terminal
As a result.
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature
Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene
The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through
Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes
Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal
Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
The embodiment of the present invention also provides another computer readable storage medium, which can be
Computer readable storage medium included in memory in above-described embodiment;It is also possible to individualism, eventually without supplying
Computer readable storage medium in end.The computer-readable recording medium storage has one or more than one program, institute
State that one or more than one program by one or more than one processor are used to execute Fig. 1, embodiment illustrated in fig. 2 provides
Mobile terminal security postures intelligent analysis method.
The side of above-mentioned offer may be implemented in the security postures intellectual analysis device of mobile terminal provided in an embodiment of the present invention
Method embodiment, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.It is provided in an embodiment of the present invention
Security postures intelligent analysis method, device and the storage medium of mobile terminal can be adapted for carrying out security postures to mobile terminal
Analysis, but it is not limited only to this.
As shown in figure 5, the security postures intellectual analysis device 500 of mobile terminal can be mobile phone, computer, number
Broadcast terminal, messaging devices, game console, tablet device, personal digital assistant etc..
Referring to Fig. 5, the security postures intellectual analysis device 500 of mobile terminal may include following one or more components:
Processing component 502, memory 504, power supply module 506, multimedia component 508, audio component 510, input/output (I/O)
Interface 512, sensor module 514 and communication component 516.
Processing component 502 usually control unmanned aerial vehicle (UAV) control device 500 integrated operation, such as with display, call, number
According to communication, camera operation and record operate associated operation.Processing component 502 may include one or more processors 520
To execute instruction.
In addition, processing component 502 may include one or more modules, convenient between processing component 502 and other assemblies
Interaction.For example, processing component 502 may include multi-media module, with facilitate multimedia component 508 and processing component 502 it
Between interaction.
Memory 504 is configured as storing various types of data to support the operation in unmanned aerial vehicle (UAV) control device 500.This
The example of a little data includes the instruction of any application or method for operating on unmanned aerial vehicle (UAV) control device 500, connection
Personal data, telephone book data, message, picture, video etc..Memory 504 can be by any kind of volatibility or non-volatile
It stores equipment or their combination is realized, such as static random access memory (SRAM), the read-only storage of electrically erasable
Device (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory
(ROM), magnetic memory, flash memory, disk or CD.
Power supply module 506 provides electric power for the various assemblies of unmanned aerial vehicle (UAV) control device 500.Power supply module 506 may include
Power-supply management system, one or more power supplys and other with for unmanned aerial vehicle (UAV) control device 500 generate, manage, and distribute electric power phase
Associated component.
Multimedia component 508 includes one output interface of offer between the unmanned aerial vehicle (UAV) control device 500 and user
Screen.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes
Touch panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more
A touch sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch
Or the boundary of sliding action, but also detect duration and pressure associated with the touch or slide operation.In some realities
It applies in example, multimedia component 508 includes a front camera and/or rear camera.When unmanned aerial vehicle (UAV) control device 500 is in
Operation mode, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multimedia
Data.Each front camera and rear camera can be a fixed optical lens system or there is focal length and optics to become
Burnt ability.
Audio component 510 is configured as output and/or input audio signal.For example, audio component 510 includes a Mike
Wind (MIC), when unmanned aerial vehicle (UAV) control device 500 is in operation mode, when such as call mode, recording mode, and voice recognition mode,
Microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory 504 or
It is sent via communication component 516.In some embodiments, audio component 510 further includes a loudspeaker, for exporting audio letter
Number.
I/O interface 512 provides interface between processing component 502 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 514 includes one or more sensors, for providing various aspects for unmanned aerial vehicle (UAV) control device 500
Status assessment.For example, sensor module 514 can detecte the state that opens/closes of unmanned aerial vehicle (UAV) control device 500, component
Relative positioning, such as the component is the display and keypad of unmanned aerial vehicle (UAV) control device 500, and sensor module 514 may be used also
To detect the position change of 500 1 components of unmanned aerial vehicle (UAV) control device 500 or unmanned aerial vehicle (UAV) control device, user and unmanned aerial vehicle (UAV) control
The existence or non-existence that device 500 contacts, 500 orientation of unmanned aerial vehicle (UAV) control device or acceleration/deceleration and unmanned aerial vehicle (UAV) control device 500
Temperature change.Sensor module 514 may include proximity sensor, be configured to examine without any physical contact
Survey presence of nearby objects.Sensor module 514 can also include that optical sensor is used for such as CMOS or ccd image sensor
It is used in imaging applications.In some embodiments, which can also include acceleration transducer, and gyroscope passes
Sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 516 is configured to facilitate wired or wireless way between unmanned aerial vehicle (UAV) control device 500 and other equipment
Communication.Unmanned aerial vehicle (UAV) control device 500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or they
Combination.In one exemplary embodiment, communication component 516 is received via broadcast channel from the wide of external broadcasting management system
Broadcast signal or broadcast related information.In one exemplary embodiment, the communication component 516 further includes near-field communication (NFC)
Module, to promote short range communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) can be based in NFC module
Technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, unmanned aerial vehicle (UAV) control device 500 can be by one or more application specific integrated circuit
(ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), scene can
Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are programmed to realize.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality
For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method
Part explanation.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (RandomAccess
Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (11)
1. a kind of security postures intelligent analysis method of mobile terminal characterized by comprising
The marked security postures data of mobile terminal are obtained, the marked security postures data include mobile terminal exception row
For data, mobile terminal potential threat data or running of mobile terminal situation data;
Extract the corresponding security postures feature of the marked security postures data;
Based on the security postures feature, security postures analysis model is trained;
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
2. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that described to pass through instruction
The security postures analysis model got carries out security postures analysis to mobile terminal, comprising:
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal, obtains security postures point
Grade is analysed, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger situation or security postures.
3. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that the method is also
Include:
Based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information data.
4. the security postures intelligent analysis method of mobile terminal according to claim 3, which is characterized in that the method is also
Include:
To the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or warning information data into
Row visualizes;
Wherein, the content of the visual presentation further includes following any one or any combination: the shifting captured in predetermined period
Dynamic terminal security total number of events, security incident quantity category statistics, security incident quantity are by threat degree statistics, safe early warning
Notification sum, safe early warning notification category statistics, mobile terminal liveness ranking, mobile terminal are united by the service condition in region
Meter, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
5. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that described to pass through instruction
The security postures analysis model got carries out security postures analysis to mobile terminal, comprising:
The mobile terminal data is obtained, the mobile terminal data includes the user information of mobile terminal, mobile software and hardware money
Source, system log, using log, alarm log and error log;
The mobile terminal data is inputted into the security postures analysis model that the training obtains, is obtained to the mobile terminal
Security postures analyze result.
6. a kind of security postures intellectual analysis device of mobile terminal characterized by comprising
Module is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures data include
Mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module, for extracting the corresponding security postures feature of the marked security postures data;
Training module is trained security postures analysis model for being based on the security postures feature;
Analysis module, the security postures analysis model for being obtained by training carry out security postures analysis to mobile terminal.
7. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that
The analysis module is also used to the security postures analysis model obtained by training, carries out security postures to mobile terminal
Analysis, obtains security postures analytical grade, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger state
Gesture or security postures.
8. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that described device is also
Include:
Pushing module, for being analyzed based on the security postures to mobile terminal as a result, push security threat data and/or early warning letter
Cease data.
9. the security postures intellectual analysis device of mobile terminal according to claim 8, which is characterized in that described device is also
Include:
Display module, for the security postures analysis to the mobile terminal as a result, and security threat data and/or pre-
Alert information data is visualized;Wherein, the content of the visual presentation further includes following any one or any group
Close: mobile terminal safety total number of events, security incident quantity category statistics, the security incident quantity captured in predetermined period is pressed
Threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness ranking, movement
Service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking of the terminal by region.
10. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that
The analysis module, is also used to obtain the mobile terminal data, and the mobile terminal data includes the use of mobile terminal
Family information moves software and hardware resources, system log, using log, alarm log and error log;And by the mobile terminal
Data input the security postures analysis model that the training obtains, and obtain analyzing result to the security postures of the mobile terminal.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed
The step of claim 1-5 the method is realized when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811356911.2A CN109598120A (en) | 2018-11-15 | 2018-11-15 | Security postures intelligent analysis method, device and the storage medium of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811356911.2A CN109598120A (en) | 2018-11-15 | 2018-11-15 | Security postures intelligent analysis method, device and the storage medium of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109598120A true CN109598120A (en) | 2019-04-09 |
Family
ID=65958352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811356911.2A Pending CN109598120A (en) | 2018-11-15 | 2018-11-15 | Security postures intelligent analysis method, device and the storage medium of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109598120A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110225543A (en) * | 2019-05-30 | 2019-09-10 | 上海交通大学 | Mobile terminal software quality Situation Awareness System and method based on network request packet |
CN111917785A (en) * | 2020-08-06 | 2020-11-10 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN113449537A (en) * | 2020-03-10 | 2021-09-28 | 奇安信科技集团股份有限公司 | Wireless network security situation perception visualization method and device and electronic equipment |
CN114139210A (en) * | 2021-12-15 | 2022-03-04 | 智谷互联网科技(廊坊)有限公司 | Big data security threat processing method and system based on intelligent service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795723A (en) * | 2014-01-28 | 2014-05-14 | 河南科技大学 | Distributed type internet-of-things safety situation awareness method |
CN105681303A (en) * | 2016-01-15 | 2016-06-15 | 中国科学院计算机网络信息中心 | Big data driven network security situation monitoring and visualization method |
CN108632081A (en) * | 2018-03-26 | 2018-10-09 | 中国科学院计算机网络信息中心 | Network Situation appraisal procedure, device and storage medium |
-
2018
- 2018-11-15 CN CN201811356911.2A patent/CN109598120A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795723A (en) * | 2014-01-28 | 2014-05-14 | 河南科技大学 | Distributed type internet-of-things safety situation awareness method |
CN105681303A (en) * | 2016-01-15 | 2016-06-15 | 中国科学院计算机网络信息中心 | Big data driven network security situation monitoring and visualization method |
CN108632081A (en) * | 2018-03-26 | 2018-10-09 | 中国科学院计算机网络信息中心 | Network Situation appraisal procedure, device and storage medium |
Non-Patent Citations (3)
Title |
---|
HANJI SHEN ET AL: ""Security Situation Assessment Method Based on States Transition*"", 《INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION》 * |
张琦: ""基于Android的移动互联网终端安全态势感知技术研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
邓晓东 等: ""大数据网络安全态势感知中数据融合技术研究"", 《数据安全与云计算》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110225543A (en) * | 2019-05-30 | 2019-09-10 | 上海交通大学 | Mobile terminal software quality Situation Awareness System and method based on network request packet |
CN110225543B (en) * | 2019-05-30 | 2021-11-30 | 上海交通大学 | Mobile terminal software quality situation perception system and method based on network request data |
CN113449537A (en) * | 2020-03-10 | 2021-09-28 | 奇安信科技集团股份有限公司 | Wireless network security situation perception visualization method and device and electronic equipment |
CN111917785A (en) * | 2020-08-06 | 2020-11-10 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN111917785B (en) * | 2020-08-06 | 2022-07-15 | 重庆邮电大学 | Industrial internet security situation prediction method based on DE-GWO-SVR |
CN114139210A (en) * | 2021-12-15 | 2022-03-04 | 智谷互联网科技(廊坊)有限公司 | Big data security threat processing method and system based on intelligent service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101852284B1 (en) | Alarming method and device | |
CN109598120A (en) | Security postures intelligent analysis method, device and the storage medium of mobile terminal | |
KR101932844B1 (en) | Device and method of making video calls and method of mediating video calls | |
US20210334325A1 (en) | Method for displaying information, electronic device and system | |
CN105930247B (en) | Processing method, device and the mobile terminal of system reboot problem | |
US20220067379A1 (en) | Category labelling method and device, and storage medium | |
CN109842612B (en) | Log security analysis method and device based on graph library model and storage medium | |
CN106231419A (en) | Operation performs method and device | |
CN111240482B (en) | Special effect display method and device | |
WO2021093427A1 (en) | Visitor information management method and apparatus, electronic device, and storage medium | |
CN105701997A (en) | Alarm method and device | |
CN110476141A (en) | Sight tracing and user terminal for executing this method | |
CN109951476A (en) | Attack Prediction method, apparatus and storage medium based on timing | |
CN109766473B (en) | Information interaction method and device, electronic equipment and storage medium | |
CN106325670A (en) | Message prompting method and device | |
CN108174026A (en) | The safety prompt function method, apparatus and electronic equipment of a kind of mobile terminal | |
CN110222706A (en) | Ensemble classifier method, apparatus and storage medium based on feature reduction | |
CN109614181A (en) | Security postures methods of exhibiting, device and the storage medium of mobile terminal | |
CN106331328B (en) | Information prompting method and device | |
CN115909127A (en) | Training method of abnormal video recognition model, abnormal video recognition method and device | |
CN109981624A (en) | Intrusion detection method, device and storage medium | |
KR20200078155A (en) | recommendation method and system based on user reviews | |
CN113032627A (en) | Video classification method and device, storage medium and terminal equipment | |
CN109542297A (en) | The method, apparatus and electronic equipment of operation guiding information are provided | |
CN109614794A (en) | Feature selection approach, device and storage medium based on information gain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |