CN110020190B - Multi-instance learning-based suspicious threat index verification method and system - Google Patents

Multi-instance learning-based suspicious threat index verification method and system Download PDF

Info

Publication number
CN110020190B
CN110020190B CN201810727300.8A CN201810727300A CN110020190B CN 110020190 B CN110020190 B CN 110020190B CN 201810727300 A CN201810727300 A CN 201810727300A CN 110020190 B CN110020190 B CN 110020190B
Authority
CN
China
Prior art keywords
suspicious
suspicious threat
threat index
verification
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810727300.8A
Other languages
Chinese (zh)
Other versions
CN110020190A (en
Inventor
柳厅文
张盼盼
亚静
李全刚
时金桥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201810727300.8A priority Critical patent/CN110020190B/en
Publication of CN110020190A publication Critical patent/CN110020190A/en
Application granted granted Critical
Publication of CN110020190B publication Critical patent/CN110020190B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/284Lexical analysis, e.g. tokenisation or collocates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks

Abstract

The invention discloses a suspicious threat index verification method and system based on multi-instance learning. The method comprises the following steps: processing the text content of the information related to each suspicious threat index to generate a word sequence containing the original semantic information; for each suspicious threat index, selecting a plurality of processed word sequences corresponding to the suspicious threat index, and applying a multi-example learning algorithm to train the selected word sequences corresponding to the suspicious indexes and generate a multi-example learning verification model; processing an information text of a suspicious threat index to be detected by adopting a natural language processing technology to generate a word sequence corresponding to the suspicious threat index to be detected; and then, performing predictive verification on the word sequence corresponding to the suspicious threat index to be predicted by using the multi-example learning verification model, and determining whether the suspicious threat index to be predicted is a malicious threat index. The invention can efficiently and accurately complete the verification of the suspicious threat index.

Description

Multi-instance learning-based suspicious threat index verification method and system
Technical Field
The invention relates to the field of network space security, in particular to a suspicious threat index verification method and system based on multi-instance learning.
Background
The suspicious threat index verification is to judge the maliciousness of the suspicious indexes appearing in the network or the log, namely to determine whether the suspicious indexes are real malicious threat indexes. And the suspicious threat index is verified, so that the network threat can be identified in time, and the network security is ensured.
Specific suspicious threat indicators can be verified according to the related intelligence information. Currently, there are three main types of authentication methods: one is a manual verification method based on a security expert, namely, the security expert is used for analyzing collected related information and manually determining the threat of suspicious indexes; one is a verification method based on rule matching, namely simply matching existing information by using a regular expression or a self-defined rule, and judging suspicious indexes according to matching results; one is based on the verification method of the particular context vocabulary, namely through checking whether the context of the suspicious threat index in the information contains the particular context vocabulary to study and judge whether the suspicious index is the real malicious threat index.
The manual verification method based on the safety experts usually depends on the experience accumulated by the safety experts, the existing information is manually analyzed and collated, and the labor cost is high.
The regular expression matching suspicious index is directly applied to the regular expression matching based verification method, and semantic information in the information is ignored, so that the false alarm rate of the verification is high.
According to the verification method based on the specific context vocabulary, the candidate context vocabulary needs to be collected in advance, and then the context vocabulary in the information is extracted for matching.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a suspicious threat index verification method and a suspicious threat index verification system based on multi-instance learning.
The technical scheme of the invention is as follows:
a suspicious threat index verification method based on multi-example learning comprises the following steps:
processing the information text content related to each suspicious threat index by adopting a natural language processing technology to generate a word sequence containing original semantic information, and replacing the suspicious threat index in each information text with a uniform set phrase; each suspicious threat index is a same type of suspicious threat index, and each suspicious threat index corresponds to a plurality of information texts;
for each suspicious threat index, selecting a plurality of processed word sequences corresponding to the suspicious threat index, and applying a multi-example learning algorithm to train the selected word sequences corresponding to the suspicious indexes and generate a multi-example learning verification model;
processing an information text of the suspicious threat index to be detected by adopting a natural language processing technology to generate a word sequence corresponding to the suspicious threat index to be detected; and then, performing predictive verification on the word sequence corresponding to the suspicious threat index to be predicted by using the multi-example learning verification model, and determining whether the suspicious threat index to be predicted is a malicious threat index.
Further, the method for generating the multi-example learning verification model comprises the following steps: taking each word sequence corresponding to each suspicious threat indicator as a packet, taking each word sequence as an example, and generating a training set corresponding to the suspicious threat indicator; and training each training set by using a multi-example learning algorithm to generate the multi-example learning verification model.
Further, the multi-instance learning algorithm is a multi-instance neural network model.
Further, the multi-example neural network model comprises an Embedding layer, a sub-neural network layer and a multi-example learning pooling layer; the multi-example neural network model firstly utilizes an Embedding layer to convert each input word sequence into a word vector and inputs the word vector into the sub-neural network layer, and the sub-neural network layer excavates and analyzes semantic features of the suspicious threat indicators; and finally, the multi-example learning pooling layer performs classification verification on the suspicious threat indicators according to the input semantic features.
Further, the sub-neural network layer is AlexNet or RCNN.
Furthermore, each suspicious threat index corresponds to a plurality of informative information texts.
A suspicious threat index verification system based on multi-instance learning is characterized by comprising an intelligence information preprocessing module, a multi-instance learning verification model training module and a verification model prediction module; wherein the content of the first and second substances,
the information preprocessing module is used for processing the information text content related to each suspicious threat index by adopting a natural language processing technology to generate a word sequence containing original semantic information and replacing the suspicious threat index in each information text into a uniform set phrase; each suspicious threat index is a same type of suspicious threat index, and each suspicious threat index corresponds to a plurality of information texts;
the multi-example learning verification model training module is used for applying a multi-example learning algorithm to train the word sequence corresponding to each suspicious index and generate a multi-example learning verification model; for each suspicious threat index, selecting a plurality of processed word sequences corresponding to the suspicious threat index for training;
the verification model prediction module is used for performing prediction verification on the word sequence corresponding to the suspicious threat index to be predicted by using the multi-example learning verification model and determining whether the suspicious threat index to be predicted is a malicious threat index; and processing the information text of the suspicious threat index to be detected by adopting a natural language processing technology to generate a word sequence corresponding to the suspicious threat index to be detected.
Further, the multi-example learning verification model training module trains each training set by using a multi-example learning algorithm to generate the multi-example learning verification model; and generating a training set corresponding to the suspicious threat indicators by taking each word sequence corresponding to each suspicious threat indicator as a packet and taking each word sequence as an example.
Further, the multi-instance learning algorithm is a multi-instance neural network model; the multi-example neural network model comprises an Embedding layer, a sub-neural network layer and a multi-example learning pooling layer; the multi-example neural network model firstly utilizes an Embedding layer to convert each input word sequence into a word vector and inputs the word vector into the sub-neural network layer, and the sub-neural network layer excavates and analyzes semantic features of the suspicious threat indicators; and finally, the multi-example learning pooling layer performs classification verification on the suspicious threat indicators according to the input semantic features.
Furthermore, each suspicious threat index corresponds to a plurality of informative information texts.
The invention provides a suspicious threat index verification method based on multi-instance learning, which mainly comprises the following steps as shown in figure 1: intelligence information preprocessing, multi-instance learning verification model training and verification model prediction.
And an information preprocessing step, namely processing the text content by adopting a natural language processing technology aiming at the information collected in advance and related to the suspicious threat index to generate a word sequence containing the original semantic information.
And a multi-example learning verification model training step, namely selecting a plurality of pieces of processed information word sequence information of the same index, applying a multi-example learning algorithm, training and generating an available multi-example learning verification model.
And a verification model prediction step, namely performing prediction verification on the verification model trained in the step and the information text of the suspicious threat index to be detected to determine whether the suspicious threat index to be detected is a malicious threat index.
Further, the information preprocessing specifically comprises: firstly, suspicious threat indexes in the existing information are identified and replaced into uniform specific phrases by utilizing a regular matching and replacing technology, and the influence of different index names on a verification result is avoided. And then, word segmentation technology in natural language processing is adopted to segment the text information, stop word removal and other processing are carried out, and the original semantic information of the text is kept as much as possible so as to facilitate later learning.
Further, the specific method for training the multi-example learning verification model includes: the marked indexes and related information (namely a training set) are used for training a verification model, in the training set, all processed related word sequences of each index are regarded as a 'packet', each word sequence is regarded as an 'example', a multi-example learning algorithm such as a multi-example neural network is selected, and a plurality of example information are considered together to generate the verification model with high verification accuracy. Each index has a plurality of different sample examples, the plurality of examples are subjected to word segmentation, and the processed word sequences are different.
Further, the verification model prediction specifically includes: and (3) preprocessing suspicious threat indexes to be verified and related threat intelligence (namely a test set) thereof to obtain related multi-example word sequence information, and then performing prediction verification on the maliciousness of the suspicious threat indexes by using a trained verification model.
The key points of the technology of the invention are as follows:
1) a suspicious threat index verification method based on multi-instance learning is defined, and suspicious threat indexes can be verified efficiently and accurately at low cost.
2) The method provides an information data processing mode, obtains related word sequences after processing, and reserves semantic information in the information as much as possible.
3) By utilizing a plurality of information related to the suspicious threat indicators, the potential characteristics of the suspicious threat indicators can be fully mined, and whether the suspicious threat indicators are malicious indicators or not can be more accurately judged.
4) A multi-example neural network structure is designed, verification can be automatically completed end to end, and manual investment and error interference are reduced.
Compared with the prior art, the invention has the following positive effects:
1. the method carries out serialization processing on related information, retains text semantic information and can improve the accuracy of verification of suspicious threat indexes.
2. The method comprehensively uses a plurality of pieces of related word sequence information, can strengthen the active analysis of suspicious indexes, and reduces the false alarm rate of verification.
3. The method designs an efficient multi-example neural network structure, can fully mine the potential characteristics of the word sequence, realizes automatic verification end to end and reduces the overhead cost.
4. The method can be applied to simple suspicious threat index verification and IOC index mining of network threat information, and can update the threat index after accurate verification to the existing information library.
Drawings
FIG. 1 is a flow diagram of a suspicious threat indicator verification method based on multi-instance learning.
FIG. 2 is a diagram of an example of a suspicious threat indicator verification method model based on multi-example learning.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention are described below with reference to the accompanying drawings so that those skilled in the art can better understand the present invention. It should be noted that in the following description, while detailed descriptions of known functions and designs may obscure the main contents of the present invention, the descriptions will be omitted herein.
Example 1 suspicious threat indicator verification method based on multi-example learning
The method and the device can be applied to automatic verification of various suspicious threat indicators. The example illustrates a specific application of the present invention by taking a suspected APT domain name as an example.
Aiming at some suspicious APT domain names and a plurality of threat intelligence information related to the suspicious APT domain names, whether the suspicious APT domain names are malicious domain names in APT attack can be automatically verified by using the method. The following steps are specific:
1) relevant intelligence information preprocessing
The preprocessing step IS explained by taking a suspicious APT DOMAIN name 'jerrytop. org' as an example, firstly, matching the suspicious APT DOMAIN name in each report in the prior 3 reports related to the suspicious APT DOMAIN name, and replacing the suspicious APT DOMAIN name with an 'IS _ APT _ DOMAIN' specific phrase so as to avoid the influence of different suspicious APT DOMAIN names on the later model training.
And then performing word segmentation on each article by using a word segmentation tool or an analysis algorithm of natural language processing. Finally, useless stop words are removed, semantic information of an original report is kept as much as possible, and a corresponding word sequence is obtained through sorting for later training and verification.
2) Validation model training for multi-instance learning
The domain name indexes marked by the existing categories, namely the known APT domain name and non-APT domain name, and the processed intelligence word sequences related to the known APT domain name and the non-APT domain name are selected as the input of the verification model and input into the designed multi-example neural network model, as shown in fig. 2.
A plurality of word sequences of a single index are integrally input into a model as a package, and the model firstly utilizes an Embedding layer to complete word vector conversion of each word sequence. Then the converted word vector is accessed into a subsequent sub-neural network layer, and the sub-neural network has a flexible structure, namely advanced established neural networks such as AlexNet and RCNN can be directly utilized; self-constructed neural networks, such as combinations of convolutional layers and fully-connected layers, can also be used, and the sub-neural networks are invisible feature extraction and learning, and automatically mine and analyze the semantic features of the domain name indexes. And finally, the multi-example learning pooling layer performs classification verification on the suspicious threat indexes by utilizing and learning the semantic features learned by the neural network.
Through the operation, the multi-example learning verification model with good classification effect can be obtained after training by using the training set. The model takes the word sequence vector of the domain name index and the information thereof as input and outputs the verification result of the domain name index.
3) Verification model prediction
With the pre-training model, the suspicious domain name indicators can be automatically verified. Aiming at the suspicious domain name and the information related to the suspicious domain name, firstly carrying out the step 1) operation on the suspicious domain name to obtain a corresponding information word sequence. Then inputting the data into the model trained in the step 2), and the model can automatically complete classification verification and output the final verification result.
In a specific experiment, a neural network layer structure in the model and a pooling method of a multi-example learning pooling layer are modified, so that various classification verification models can be obtained, and the verification accuracy of the classification verification models on suspicious domain names can reach more than 92% and can reach about 98% at most. The experimental result of the example also verifies the high efficiency and the accuracy of the suspicious threat index verification method based on multi-example learning.
Although the invention has been described with respect to specific illustrative embodiments thereof, it will be understood by those skilled in the art that the invention is not limited thereto, and that various changes, substitutions, and alterations can be made without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A suspicious threat index verification method based on multi-example learning comprises the following steps:
processing the information text content related to each suspicious threat index by adopting a natural language processing technology to generate a word sequence containing original semantic information, and replacing the suspicious threat index in each information text with a uniform set phrase; each suspicious threat index is a same type of suspicious threat index, and each suspicious threat index corresponds to a plurality of information texts;
for each suspicious threat index, selecting a plurality of processed word sequences corresponding to the suspicious threat index, and applying a multi-example learning algorithm to train the selected word sequences corresponding to the suspicious threat indexes and generate a multi-example learning verification model; the method for generating the multi-example learning verification model comprises the following steps: taking each word sequence corresponding to each suspicious threat indicator as a packet, taking each word sequence as an example, and generating a training set corresponding to the suspicious threat indicator;
training each training set by using a multi-example learning algorithm to generate the multi-example learning verification model;
the multi-instance learning algorithm is a multi-instance neural network model; the multi-example neural network model comprises an Embedding layer, a sub-neural network layer and a multi-example learning pooling layer; the multi-example neural network model firstly utilizes an Embedding layer to convert each input word sequence into a word vector and inputs the word vector into the sub-neural network layer, and the sub-neural network layer excavates and analyzes semantic features of the suspicious threat indicators; finally, the multi-example learning pooling layer carries out classification verification on the suspicious threat indicators according to the input semantic features;
processing an information text of the suspicious threat index to be detected by adopting a natural language processing technology to generate a word sequence corresponding to the suspicious threat index to be detected; and then, performing predictive verification on the word sequence corresponding to the suspicious threat index to be detected by using the multi-example learning verification model, and determining whether the suspicious threat index to be detected is a malicious threat index.
2. The method of claim 1, wherein the sub-neural network layer is AlexNet or RCNN.
3. The method of claim 1, wherein each of the suspicious threat indicators corresponds to a plurality of informative information texts.
4. A suspicious threat index verification system based on multi-instance learning is characterized by comprising an intelligence information preprocessing module, a multi-instance learning verification model training module and a verification model prediction module; wherein the content of the first and second substances,
the information preprocessing module is used for processing the information text content related to each suspicious threat index by adopting a natural language processing technology to generate a word sequence containing original semantic information and replacing the suspicious threat index in each information text into a uniform set phrase; each suspicious threat index is a same type of suspicious threat index, and each suspicious threat index corresponds to a plurality of information texts;
the multi-example learning verification model training module is used for applying a multi-example learning algorithm to train the word sequence corresponding to each suspicious threat index and generate a multi-example learning verification model; for each suspicious threat index, selecting a plurality of processed word sequences corresponding to the suspicious threat index for training; the multi-example learning verification model training module trains each training set by using a multi-example learning algorithm to generate the multi-example learning verification model; taking each word sequence corresponding to each suspicious threat indicator as a packet, taking each word sequence as an example, and generating a training set corresponding to the suspicious threat indicator;
the multi-instance learning algorithm is a multi-instance neural network model; the multi-example neural network model comprises an Embedding layer, a sub-neural network layer and a multi-example learning pooling layer; the multi-example neural network model firstly utilizes an Embedding layer to convert each input word sequence into a word vector and inputs the word vector into the sub-neural network layer, and the sub-neural network layer excavates and analyzes semantic features of the suspicious threat indicators; finally, the multi-example learning pooling layer carries out classification verification on the suspicious threat indicators according to the input semantic features;
the verification model prediction module is used for performing prediction verification on the word sequence corresponding to the suspicious threat index to be tested by using the multi-example learning verification model and determining whether the suspicious threat index to be tested is a malicious threat index; and processing the information text of the suspicious threat index to be detected by adopting a natural language processing technology to generate a word sequence corresponding to the suspicious threat index to be detected.
5. The system of claim 4, wherein each of the suspicious threat indicators corresponds to a plurality of informative information texts.
CN201810727300.8A 2018-07-05 2018-07-05 Multi-instance learning-based suspicious threat index verification method and system Active CN110020190B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810727300.8A CN110020190B (en) 2018-07-05 2018-07-05 Multi-instance learning-based suspicious threat index verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810727300.8A CN110020190B (en) 2018-07-05 2018-07-05 Multi-instance learning-based suspicious threat index verification method and system

Publications (2)

Publication Number Publication Date
CN110020190A CN110020190A (en) 2019-07-16
CN110020190B true CN110020190B (en) 2021-06-01

Family

ID=67188326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810727300.8A Active CN110020190B (en) 2018-07-05 2018-07-05 Multi-instance learning-based suspicious threat index verification method and system

Country Status (1)

Country Link
CN (1) CN110020190B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291378B (en) * 2019-12-05 2022-08-02 中国船舶重工集团公司第七0九研究所 Threat information judging and researching method and device
CN115225413B (en) * 2022-09-20 2022-12-23 北京微步在线科技有限公司 Method and device for extracting defect index, electronic equipment and storage medium
CN116723051B (en) * 2023-08-07 2023-10-27 北京安天网络安全技术有限公司 Domain name information generation method, device and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205113A (en) * 2015-09-01 2015-12-30 西安交通大学 System and method for excavating abnormal change process of time series data
CN106685996A (en) * 2017-02-23 2017-05-17 上海万雍科技股份有限公司 Method for detecting account abnormal logging based on HMM model

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8943558B2 (en) * 2013-03-08 2015-01-27 Next Level Security Systems, Inc. System and method for monitoring a threat
CN105955952A (en) * 2016-05-03 2016-09-21 成都数联铭品科技有限公司 Information extraction method based on bi-directional recurrent neural network
CN107241352B (en) * 2017-07-17 2020-01-21 浙江鹏信信息科技股份有限公司 Network security event classification and prediction method and system
CN107564526B (en) * 2017-07-28 2020-10-27 北京搜狗科技发展有限公司 Processing method, apparatus and machine-readable medium
CN107992746B (en) * 2017-12-14 2021-06-25 华中师范大学 Malicious behavior mining method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205113A (en) * 2015-09-01 2015-12-30 西安交通大学 System and method for excavating abnormal change process of time series data
CN106685996A (en) * 2017-02-23 2017-05-17 上海万雍科技股份有限公司 Method for detecting account abnormal logging based on HMM model

Also Published As

Publication number Publication date
CN110020190A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
CN110134757B (en) Event argument role extraction method based on multi-head attention mechanism
CN108763931B (en) Vulnerability detection method based on Bi-LSTM and text similarity
CN110147726B (en) Service quality inspection method and device, storage medium and electronic device
CN111783394B (en) Training method of event extraction model, event extraction method, system and equipment
CN110020190B (en) Multi-instance learning-based suspicious threat index verification method and system
CN109635288A (en) A kind of resume abstracting method based on deep neural network
CN111866004B (en) Security assessment method, apparatus, computer system, and medium
CN111651996A (en) Abstract generation method and device, electronic equipment and storage medium
CN109087667B (en) Voice fluency recognition method and device, computer equipment and readable storage medium
CN115292568B (en) Civil news event extraction method based on joint model
CN112035345A (en) Mixed depth defect prediction method based on code segment analysis
CN114416479A (en) Log sequence anomaly detection method based on out-of-stream regularization
CN116402630B (en) Financial risk prediction method and system based on characterization learning
CN115017015B (en) Method and system for detecting abnormal behavior of program in edge computing environment
CN117312562A (en) Training method, device, equipment and storage medium of content auditing model
CN116107834A (en) Log abnormality detection method, device, equipment and storage medium
CN116975161A (en) Entity relation joint extraction method, equipment and medium of power equipment partial discharge text
CN116720184A (en) Malicious code analysis method and system based on generation type AI
CN114492460B (en) Event causal relationship extraction method based on derivative prompt learning
CN115328753A (en) Fault prediction method and device, electronic equipment and storage medium
CN112466324A (en) Emotion analysis method, system, equipment and readable storage medium
CN114817934A (en) Vulnerability severity assessment method and system based on vulnerability event argument
CN113849634A (en) Method for improving interpretability of depth model recommendation scheme
CN117076596B (en) Data storage method, device and server applying artificial intelligence
KR102574512B1 (en) Apparatus for detecting metaphor and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant